Mock Version: 1.2.17 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.90.0-2.el7_9-20231018133612-10467/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=1005) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Wrote: /builddir/build/SRPMS/nss-3.90.0-2.el7_9.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.90.0-2.el7_9-20231018133612-10467/root'shell=Falseuid=1005env={'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_US.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: armv7hl Building for target armv7hl Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.eYhfge + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.90 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.90.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.90 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + echo 'Patch #2 (add-relro-linker-option.patch):' Patch #2 (add-relro-linker-option.patch): + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 188 (offset 14 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 72 (offset 5 lines). Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk + echo 'Patch #50 (iquote.patch):' Patch #50 (iquote.patch): + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file nss/coreconf/location.mk Hunk #1 succeeded at 72 (offset -3 lines). + pushd nss ~/build/BUILD/nss-3.90/nss ~/build/BUILD/nss-3.90 Patch #49 (nss-skip-bltest-and-fipstest.patch): + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file ./cmd/Makefile patching file ./cmd/shlibsign/Makefile Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch patching file lib/ssl/config.mk Hunk #1 succeeded at 49 (offset -4 lines). patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1437 (offset 32 lines). + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh + echo 'Patch #56 (p-ignore-setpolicy.patch):' Patch #56 (p-ignore-setpolicy.patch): + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1723 (offset 332 lines). Hunk #2 succeeded at 1734 (offset 332 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Hunk #1 succeeded at 373 (offset -1 lines). Hunk #2 succeeded at 421 (offset -1 lines). Hunk #3 succeeded at 435 (offset -1 lines). Hunk #4 succeeded at 472 (offset -1 lines). Hunk #5 succeeded at 1109 (offset 7 lines). Patch #100 (nss-3.79-version-range.patch): + echo 'Patch #100 (nss-3.79-version-range.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-version-range.patch + /usr/bin/patch -p1 -b --suffix .version-range --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 104 (offset 2 lines). + popd ~/build/BUILD/nss-3.90 Patch #108 (nss-sni-c-v-fix.patch): + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file nss/tests/ssl/sslauth.txt Hunk #1 succeeded at 72 (offset 8 lines). + pushd nss ~/build/BUILD/nss-3.90/nss ~/build/BUILD/nss-3.90 Patch #123 (nss-skip-util-gtest.patch): + echo 'Patch #123 (nss-skip-util-gtest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-util-gtest.patch + /usr/bin/patch -p1 -b --suffix .skip-util-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 55 (offset 20 lines). patching file gtests/ssl_gtest/manifest.mn Hunk #1 succeeded at 72 (offset 5 lines). Patch #126 (nss-reorder-cipher-suites.patch): + echo 'Patch #126 (nss-reorder-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 100 (offset 10 lines). Hunk #2 succeeded at 146 (offset 10 lines). patching file lib/ssl/sslenum.c Patch #127 (nss-disable-cipher-suites.patch): + echo 'Patch #127 (nss-disable-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .disable-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 106 (offset 10 lines). Hunk #2 succeeded at 118 (offset 10 lines). Patch #130 (nss-reorder-cipher-suites-gtests.patch): + echo 'Patch #130 (nss-reorder-cipher-suites-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites-gtests.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_auth_unittest.cc Hunk #1 succeeded at 1275 (offset 239 lines). Hunk #2 succeeded at 2231 (offset 398 lines). Hunk #3 succeeded at 2264 (offset 398 lines). patching file gtests/ssl_gtest/ssl_recordsize_unittest.cc patching file gtests/ssl_gtest/ssl_staticrsa_unittest.cc patching file gtests/ssl_gtest/tls_agent.cc Hunk #1 succeeded at 683 (offset 80 lines). Patch #136 (nss-sql-default.patch): + echo 'Patch #136 (nss-sql-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default.patch + /usr/bin/patch -p1 -b --suffix .sql-default --fuzz=0 patching file tests/all.sh Hunk #1 succeeded at 118 (offset 4 lines). Hunk #2 succeeded at 175 (offset 4 lines). patching file tests/merge/merge.sh Patch #139 (nss-modutil-skip-changepw-fips.patch): + echo 'Patch #139 (nss-modutil-skip-changepw-fips.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-modutil-skip-changepw-fips.patch + /usr/bin/patch -p1 -b --suffix .modutil-skip-changepw-fips --fuzz=0 patching file cmd/modutil/pk11.c Hunk #1 succeeded at 813 (offset 49 lines). + echo 'Patch #148 (nss-sysinit-userdb.patch):' Patch #148 (nss-sysinit-userdb.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-userdb.patch + /usr/bin/patch -p1 -b --suffix .sysinit-userdb --fuzz=0 -R patching file lib/sysinit/nsssysinit.c Hunk #1 succeeded at 36 (offset -1 lines). Hunk #2 succeeded at 49 (offset -1 lines). Patch #141 (nss-sysinit-getenv.patch): + echo 'Patch #141 (nss-sysinit-getenv.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-getenv.patch + /usr/bin/patch -p1 -b --suffix .sysinit-getenv --fuzz=0 patching file lib/sysinit/nsssysinit.c Hunk #3 succeeded at 100 (offset 1 line). + echo 'Patch #149 (nss-skip-sysinit-gtests.patch):' Patch #149 (nss-skip-sysinit-gtests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-skip-sysinit-gtests.patch + /usr/bin/patch -p1 -b --suffix .skip-sysinit-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 33 (offset 2 lines). Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch): + echo 'Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-ssl2-compatible-client-hello.patch + /usr/bin/patch -p1 -b --suffix .ssl2hello --fuzz=0 patching file lib/ssl/sslsock.c Patch #152 (nss-version-range-set.patch): + echo 'Patch #152 (nss-version-range-set.patch):' + /usr/bin/patch -p1 -b --suffix .version-range-set --fuzz=0 + /usr/bin/cat /builddir/build/SOURCES/nss-version-range-set.patch patching file gtests/ssl_gtest/ssl_versionpolicy_unittest.cc patching file lib/ssl/sslsock.c Hunk #1 succeeded at 2799 (offset 257 lines). Hunk #2 succeeded at 2807 (offset 257 lines). + echo 'Patch #156 (nss-skip-cavs-tests.patch):' Patch #156 (nss-skip-cavs-tests.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-skip-cavs-tests.patch + /usr/bin/patch -p1 -b --suffix .skip-cavs --fuzz=0 patching file tests/fips/fips.sh Patch #128 (nss-3.67-revert-sql-manage-change.patch): + echo 'Patch #128 (nss-3.67-revert-sql-manage-change.patch):' + /usr/bin/patch -p1 -b --suffix .sql-man-page --fuzz=0 -R + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-revert-sql-manage-change.patch patching file doc/certutil.xml patching file doc/html/certutil.html patching file doc/html/derdump.html patching file doc/html/modutil.html patching file doc/html/pk12util.html patching file doc/html/pp.html patching file doc/html/signver.html patching file doc/html/ssltap.html patching file doc/modutil.xml patching file doc/nroff/certutil.1 patching file doc/nroff/crlutil.1 patching file doc/nroff/derdump.1 patching file doc/nroff/modutil.1 patching file doc/nroff/pk12util.1 patching file doc/nroff/pp.1 patching file doc/nroff/signtool.1 patching file doc/nroff/signver.1 patching file doc/nroff/ssltap.1 patching file doc/nroff/vfychain.1 patching file doc/nroff/vfyserv.1 patching file doc/pk12util.xml patching file doc/signver.xml Patch #158 (nss-sql-default-tests.patch): + echo 'Patch #158 (nss-sql-default-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default-tests.patch + /usr/bin/patch -p1 -b --suffix .sql-default-tests --fuzz=0 patching file tests/all.sh patching file tests/common/init.sh Hunk #1 succeeded at 722 (offset 71 lines). patching file tests/remote/Makefile Patch #159 (nss-disable-dc.patch): + echo 'Patch #159 (nss-disable-dc.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-dc.patch + /usr/bin/patch -p1 -b --suffix .dc --fuzz=0 patching file gtests/ssl_gtest/manifest.mn patching file lib/ssl/sslsock.c Hunk #1 succeeded at 822 (offset 3 lines). Hunk #2 succeeded at 1348 (offset 11 lines). Patch #160 (nss-3.66-restore-old-pkcs12-default.patch): + echo 'Patch #160 (nss-3.66-restore-old-pkcs12-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-restore-old-pkcs12-default.patch + /usr/bin/patch -p1 -b --suffix .restore-pkcs12-defaults --fuzz=0 patching file cmd/pk12util/pk12util.c Hunk #1 succeeded at 1041 (offset 10 lines). Hunk #2 succeeded at 1159 (offset 10 lines). patching file tests/tools/tools.sh Patch #161 (nss-3.66-disable-external-host-test.patch): + echo 'Patch #161 (nss-3.66-disable-external-host-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-disable-external-host-test.patch + /usr/bin/patch -p1 -b --suffix .brew --fuzz=0 patching file tests/ssl/ssl.sh Hunk #1 succeeded at 1654 (offset 13 lines). Patch #162 (nss-3.79-distrusted-certs.patch): + echo 'Patch #162 (nss-3.79-distrusted-certs.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-distrusted-certs.patch + /usr/bin/patch -p1 -b --suffix .distrusted-certs --fuzz=0 -R patching file lib/ckfw/builtins/certdata.txt Hunk #1 succeeded at 7185 (offset -478 lines). Hunk #2 succeeded at 7499 (offset -838 lines). Hunk #3 succeeded at 8204 (offset -838 lines). Patch #163 (nss-3.90-no-dbm-25519.patch): + echo 'Patch #163 (nss-3.90-no-dbm-25519.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-no-dbm-25519.patch + /usr/bin/patch -p1 -b --suffix .no-dbm-25519 --fuzz=0 patching file tests/ec/ectest.sh Patch #164 (nss-3.90-certutil-dump-speed.patch): + echo 'Patch #164 (nss-3.90-certutil-dump-speed.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-certutil-dump-speed.patch + /usr/bin/patch -p1 -b --suffix .certutil-dump-speed --fuzz=0 patching file tests/dbtests/dbtests.sh Patch #165 (nss-3.67-cve-2021-43527-test.patch): + echo 'Patch #165 (nss-3.67-cve-2021-43527-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-cve-2021-43527-test.patch + /usr/bin/patch -p1 -b --suffix .cve-2021-43527-test --fuzz=0 patching file tests/cert/Leaf-bogus-dsa.crt patching file tests/cert/Leaf-bogus-rsa-pss.crt patching file tests/cert/cert.sh Patch #166 (nss-3.90-disable-ech.patch): + echo 'Patch #166 (nss-3.90-disable-ech.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-disable-ech.patch + /usr/bin/patch -p1 -b --suffix .disable-ech --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 4387 (offset -7 lines). patching file gtests/ssl_gtest/manifest.mn + echo 'Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch):' Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch): + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-r7-remove-explicit-ipv4.patch + /usr/bin/patch -p1 -b --suffix .remove-explicit-ipv4 --fuzz=0 patching file tests/ssl/ssl.sh Patch #301 (nss-3.90-add-ems-policy.patch): + echo 'Patch #301 (nss-3.90-add-ems-policy.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-add-ems-policy.patch + /usr/bin/patch -p1 -b --suffix .ems --fuzz=0 patching file lib/pk11wrap/pk11pars.c patching file lib/pk11wrap/secmodti.h patching file lib/ssl/ssl3con.c Hunk #2 succeeded at 3476 (offset -5 lines). patching file lib/util/secoid.c Hunk #2 succeeded at 2087 (offset -13 lines). patching file lib/util/secoidt.h + popd ~/build/BUILD/nss-3.90 + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low + pushd nss/tests/ssl ~/build/BUILD/nss-3.90/nss/tests/ssl ~/build/BUILD/nss-3.90 + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslcov.txt + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + popd ~/build/BUILD/nss-3.90 + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.1ETjWi + umask 022 + cd /builddir/build/BUILD + cd nss-3.90 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib + NSSUTIL_LIB_DIR=/usr/lib ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib + FREEBL_LIB_DIR=/usr/lib + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export POLICY_FILE=nss-rhel7.config + POLICY_FILE=nss-rhel7.config + export POLICY_PATH=/etc/pki/nss-legacy + POLICY_PATH=/etc/pki/nss-legacy + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + export NSS_DISABLE_GTESTS=1 + NSS_DISABLE_GTESTS=1 + /usr/bin/make -C ./nss all make: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsinstall.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pathsub.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pathsub.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for `export'. make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 page.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 extern.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 queue.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hash.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 search.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ncompat.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 winfile.h ../../../../dist/public/dbm make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard arena.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard error.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard errorval.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hashops.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard libc.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tracker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard item.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utf8.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/arena.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/error.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/errorval.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hashops.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libc.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tracker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/item.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utf8.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard alg1485.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdb.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certv3.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certxutl.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crl.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard genname.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard stanpcertdb.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard polcyxtn.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secname.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xauthkid.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xbsconst.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xconst.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdb.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certv3.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crl.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/genname.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secname.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xconst.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhtml.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certreq.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlv2.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocsp.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspsig.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certhigh.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfy.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certvfypkix.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard xcrldist.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certreq.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sechash.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard seckey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secsign.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secvfy.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dsautil.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sechash.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/seckey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secsign.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devslot.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devtoken.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard devutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckhelper.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devslot.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certselector.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcertselparams.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlselector.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_comcrlselparams.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_basicconstraintschecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_certchainchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_crlchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ekuchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_expirationchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_namechainingchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_nameconstraintschecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_ocspchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationmethod.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_revocationchecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policychecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_signaturechecker.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_targetcertchecker.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_trustanchor.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_procparams.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valparams.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_resourcelimits.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_buildresult.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_policynode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_valresult.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_verifynode.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_store.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_validate.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_lifecycle.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_build.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_tools.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_error.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_logger.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_list.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_errpaths.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_basicconstraints.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_cert.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyinfo.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicymap.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_certpolicyqualifier.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crl.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crldp.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_crlentry.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_date.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_generalname.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_infoaccess.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nameconstraints.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocsprequest.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspresponse.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_publickey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_x500name.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ocspcertid.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bigint.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_bytearray.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_common.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_error.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_hashtable.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_lifecycle.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mem.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_monitorlock.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_mutex.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_object.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_oid.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_primhash.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_rwlock.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_string.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_aiamgr.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_colcertstore.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpcertstore.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_httpdefaultclient.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaptemplates.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapcertstore.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapresponse.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldaprequest.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_ldapdefaultclient.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_nsscontext.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_pk11certstore.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix_pl_socket.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dev3hack.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11akey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11auth.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cert.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11cxt.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11err.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11hpke.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11kea.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11list.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11load.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mech.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11merge.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11nobj.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11obj.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pars.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pbe.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pk12.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11pqg.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11sdr.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11skey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11slot.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11util.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11hpke.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asymmkey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certificate.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cryptocontext.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symmkey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard trustdomain.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tdcache.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certdecode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkistore.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkibase.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pki3hack.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certificate.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssinit.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssoptions.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nssver.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard utilwrap.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crypto.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard find.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instance.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mutex.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard object.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard session.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sessobj.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard slot.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard token.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard wrap.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mechanism.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crypto.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/find.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/instance.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mutex.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/object.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/session.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/slot.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/token.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/wrap.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mechanism.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard anchor.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard constants.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bfind.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard binst.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bobject.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bsession.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard bslot.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoken.c perl certdata.perl certdata.txt Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bfind.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/binst.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bobject.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bsession.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bslot.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoken.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../anchor.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../bfind.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../binst.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../bobject.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../bsession.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../bslot.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../btoken.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../ckbiver.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard -I../../../../lib/ckfw/builtins Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/anchor.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bfind.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/binst.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bobject.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bsession.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bslot.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoken.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ckbiver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/constants.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfenc.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmftmpl.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfreq.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfpop.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfdec.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfget.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crmfcont.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfasn1.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfresp.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfrec.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmmfchal.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard servget.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcli.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard respcmn.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard challcli.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard asn1cmn.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/servget.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/respcli.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/challcli.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/asn1cmn.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarver.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarsign.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jar-ds.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarfile.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard jarint.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jar.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/jarint.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libjar.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12local.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12creat.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12dec.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12plcy.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12tmpl.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12e.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p12d.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12local.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12e.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12d.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certread.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7common.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7create.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7decode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7encode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7local.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmime.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certread.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7common.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7create.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7local.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmime.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsarray.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsasn1.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsattr.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscinfo.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmscipher.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdecode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsdigest.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsencode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsenvdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsmessage.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmspubkey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsrecinfo.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsreclist.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssigdata.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmssiginfo.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsudf.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimemessage.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimeutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard smimever.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimever.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smime.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard authcert.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmpcert.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtls13con.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dtlscon.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard prelib.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfencrypt.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3con.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ecc.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3ext.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3exthandle.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssl3gthr.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslauth.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslbloom.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcert.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslcon.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssldef.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslencode.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslenum.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerr.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslerrstrs.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslgrp.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinfo.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslinit.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslmutex.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslnonce.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslprimitive.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslreveal.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsecur.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsnce.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslsock.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslspec.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltrace.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sslver.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13con.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13ech.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13echv.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13exthandle.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13hashstate.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13hkdf.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13psk.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13replay.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tls13subcerts.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard unix_err.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/authcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/prelib.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sslver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nsssysinit.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.def rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.def -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/db.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard db.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_bigkey.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_func.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_func.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_log2.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_page.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard h_page.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard hash_buf.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mktemp.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dirent.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dirent.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/db.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_func.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_log2.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/h_page.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mktemp.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dirent.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libdbm.a ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard basicutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secpwd.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derprint.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard moreoids.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pppolicy.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ffs.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11table.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derprint.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ffs.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11table.o echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard mangle.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mangle cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mangle.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard shlibsign.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/shlibsign cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/shlibsign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard addbuiltin.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard atob.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/atob cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/atob.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard btoa.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoa cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoa.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certext.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard keystuff.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certutil cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certext.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/keystuff.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard chktest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/chktest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/chktest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen_lex.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlgen.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard crlutil.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlutil cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard testcrmf.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmftest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/testcrmf.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dbtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dbtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dbtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard derdump.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derdump cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derdump.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard digest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/digest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/digest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard httpserv.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/httpserv cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/httpserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard listsuites.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/listsuites cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/listsuites.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard makepqg.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/makepqg cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/makepqg.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard multinit.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/multinit cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/multinit.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nss-policy-check.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss-policy-check cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss-policy-check -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nss-policy-check ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspclnt.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ocspresp.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspresp cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspresp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard oidcalc.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/oidcalc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/oidcalc.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7content.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7content cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7content.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7env.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7env cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7env.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7sign.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7sign cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard p7verify.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7verify cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7verify.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk12util.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk12util cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk12util.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11importtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11importtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11importtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11importtest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11ectest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11ectest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11gcmtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11mode.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mode cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mode.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk1sign.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk1sign cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk1sign.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pp.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pp cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pp.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pwdecrypt.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsaperf.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard defkey.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsaperf cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/defkey.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /usr/lib/libfreebl.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /usr/lib/libfreebl.a -L/usr/lib -lsoftokn3 -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard rsapoptst.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsapoptst cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsapoptst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/rsapoptst ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdbthreadtst.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdbthreadtst cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdbthreadtst -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdbthreadtst ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sdrtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdrtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdrtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard selfserv.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfserv cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfserv.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signtool.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard certgen.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard javascript.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard list.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard sign.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard util.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard verify.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard zip.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signtool cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signtool.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/certgen.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/javascript.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/list.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/sign.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/util.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/verify.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/zip.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard signver.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk7print.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signver cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signver.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk7print.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard cmsutil.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard ssltap.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltap cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltap.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard strsclnt.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/strsclnt cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/strsclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard symkeyutil.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard baddbdir.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/baddbdir cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/baddbdir.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard conflict.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/conflict cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/conflict.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard dertimetest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dertimetest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dertimetest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard encodeinttest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard nonspr10.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nonspr10.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard remtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/remtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/remtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard secmodtest.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmodtest cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmodtest.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/baddbdir Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/conflict Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/dertimetest Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/remtest Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard tstclnt.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tstclnt cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tstclnt.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard validation.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/validation cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/validation -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/validation.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/validation ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfychain.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfychain cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfychain.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyserv.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard vfyutil.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyserv cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyutil.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard modutil.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pk11.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard instsec.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard installparse.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard install-ds.c cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard lex.Pk11Install_yy.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/modutil cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/modutil.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pk11.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/instsec.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/install.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/installparse.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard pkix-errcodes.c rm -f Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes cc -o Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -march=armv7-a -mfpu=vfpv3-d16 -mfloat-abi=hard Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -z noexecstack -Wl,-z,relro -z noexecstack -Wl,-z,relro ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /usr/lib/libfreebl.a -L../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib -L/usr/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' make: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' + /usr/bin/make -C ./nss latest make: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux4.19_arm_cc_glibc_PTH_OPT.OBJ > ./../dist/latest make: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss/doc ~/build/BUILD/nss-3.90/nss/doc ~/build/BUILD/nss-3.90 + rm -rf ./nroff + /usr/bin/make clean rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii + echo -n 'Nov 13 2013' + echo -n 3.90.0 + /usr/bin/make mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man cmsutil.xml Note: Writing cmsutil.1 xmlto -o nroff man crlutil.xml Note: Writing crlutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man ssltap.xml Note: Writing ssltap.1 xmlto -o nroff man derdump.xml Note: Writing derdump.1 xmlto -o nroff man signtool.xml Note: Writing signtool.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man pp.xml Note: Writing pp.1 xmlto -o nroff man vfychain.xml Note: Writing vfychain.1 xmlto -o nroff man vfyserv.xml Note: Writing vfyserv.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html signver.xml Writing index.html for refentry(signver) mv html/index.html html/signver.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html + popd ~/build/BUILD/nss-3.90 + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.90.0,g -e s,%NSPR_VERSION%,4.35.0,g -e s,%NSSUTIL_VERSION%,3.90.0,g -e s,%SOFTOKEN_VERSION%,3.90.0,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=90 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,90,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + echo -n 'Nov 13 2013' + echo -n 3.90.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.bV8Vxm + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm ++ dirname /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm + cd nss-3.90 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/libnssckbi.so + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/validation /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/lib/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/nss-policy-check.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/nss-policy-check.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/share/man/man5/secmod.db.5 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/etc/pki/nss-legacy + /usr/bin/install -p -m 644 /builddir/build/SOURCES/nss-rhel7.config /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/etc/pki/nss-legacy/nss-rhel7.config + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.90 extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/validation extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/lib/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.arm/usr/bin/nss-policy-check /usr/lib/rpm/sepdebugcrcfix: Updated 27 CRC32s, 0 CRC32s did match. cpio: nss-3.90/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.90/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 26669 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.WZVkiM + umask 022 + cd /builddir/build/BUILD + cd nss-3.90 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export 'NSS_FIPS_VERSION=nss\ 3.90.0-%{srpmhash}' + NSS_FIPS_VERSION='nss\ 3.90.0-%{srpmhash}' ++ sed -n 's/^\(\(NAME\|VERSION_ID\)=.*\)/OS_\1/p' /etc/os-release ++ sed -e 's/ /\\ /g' + eval 'OS_NAME="CentOS\' 'Linux"' 'OS_VERSION_ID="7"' ++ OS_NAME='CentOS\ Linux' ++ OS_VERSION_ID=7 + export 'FIPS_MODULE_OS=CentOS\ Linux\ 7' + FIPS_MODULE_OS='CentOS\ Linux\ 7' + export 'NSS_FIPS_MODULE_ID=CentOS\ Linux\ 7\ nss\ 3.90.0-%{srpmhash}' + NSS_FIPS_MODULE_ID='CentOS\ Linux\ 7\ nss\ 3.90.0-%{srpmhash}' + export SOFTOKEN_LIB_DIR=/usr/lib + SOFTOKEN_LIB_DIR=/usr/lib + export 'GTESTS=certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + GTESTS='certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + export GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 + export NSS_SKIP_PWDECRYPT_TIME=true + NSS_SKIP_PWDECRYPT_TIME=true ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + MYRAND=9355 + echo 9355 9355 selfserv_9355 + RANDSERV=selfserv_9355 + echo selfserv_9355 ++ ls -d ./dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin + echo ./dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin ./dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin ++ pwd + pushd /builddir/build/BUILD/nss-3.90 ~/build/BUILD/nss-3.90 ~/build/BUILD/nss-3.90 + cd ./dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9355 + popd ~/build/BUILD/nss-3.90 + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crt$' + grep -v '\.crl$' + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9355/g' + grep -vw CVS + killall selfserv_9355 selfserv_9355: no process found + : + rm -rf ./tests_results + pushd ./nss/tests/ ~/build/BUILD/nss-3.90/nss/tests ~/build/BUILD/nss-3.90 + export NSS_DEFAULT_DB_TYPE=dbm + NSS_DEFAULT_DB_TYPE=dbm + export NSS_EXPECTED_TIME=8 + NSS_EXPECTED_TIME=8 ++ rpm -q nss-softokn + soft=nss-softokn-3.90.0-6.el7_9.armv7hl + soft_minor=90 + nss_soft=3.90.0 + nss_soft_minor=90 + export 'NSS_CYCLES=standard pkix upgradedb sharedb threadunsafe' + NSS_CYCLES='standard pkix upgradedb sharedb threadunsafe' + export 'NSS_TESTS=libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}' + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}' + export NSS_SSL_RUN= + NSS_SSL_RUN= + export NSS_SSL_TESTS= + NSS_SSL_TESTS= + '[' 90 -lt 90 ']' + HOST=localhost + DOMSUF=localdomain + PORT=9355 + ./all.sh ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.90/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.90/tests_results/security ******************************************** Platform: Linux4.19_arm_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib: Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 13:41:19 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #81: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #84: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #109: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #114: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 34506e08ae14c180b86d52eb3345e52718049a36 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 7430ec0f3972bce95a48740cf9fbd182af3376ef -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:9b:1c:83:5f:78:af:f5:be:fb:64:1d:a8:2a:1b:b2: f2:81:1f:e1:68:22:53:01:53:55:03:46:12:d3:05:03: 4c:e7:be:88:37:65:e6:77:e5:08:ac:da:fe:3a:1f:24: d6:20:af:b5:c4:4d:70:5d:67:96:05:24:b3:7c:d9:f0: f5:07:71:52:3c:74:7c:1f:20:98:40:44:c0:0c:bf:af: 57:36:02:de:e4:9e:d7:8c:9c:22:68:a3:f1:01:81:9c: c6:f6:c5:32:4b:95:6a:a6:9e:e3:fe:70:b9:58:91:2d: f6:e8:49:62:e9:fe:ca:25:d5:39:2a:6c:ad:36:8c:55: 1f:8a:60:c3:49:2b:85:d4:a4:73:18:db:e9:c5:a2:23: 16:37:e1:58:46:95:2a:81:64:f0:a0:b7:bc:e7:95:c2: 93:83:f5:0e:42:af:9d:a9:29:f6:89:ac:aa:dc:41:a4: 06:e5:bb:b9:04:40:be:d5:02:76:65:a7:9a:a2:b0:88: 7a:86:ad:79:dc:f5:00:bd:f7:e0:19:54:f8:b9:6e:42: 63:2f:10:0b:6c:88:31:77:df:54:52:8a:f2:8a:d8:50: cf:b4:b9:56:90:55:e3:83:22:1b:be:6a:4d:ec:64:f8: e9:25:cc:96:53:f6:93:ee:95:b7:db:d4:4a:d1:2a:c9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:79:e4:81:83:48:39:f1:0e:f5:22:01:5e:f8:37:22: fb:ea:5c:aa:ba:45:6a:75:7e:d8:52:d8:63:f3:a5:be: 93:bb:3c:ea:de:af:05:c2:d4:32:51:43:45:fc:0f:34: 7a:1d:39:bc:7d:6d:0d:5c:05:26:98:32:a8:1a:12:ba: ad:96:7c:3e:d3:1d:0b:9f:cd:23:67:c3:54:56:2c:0a: d1:81:0c:e0:81:82:c0:03:77:f5:30:dc:6d:92:43:69: 3a:ba:02:87:51:cc:d6:96:46:46:5f:9e:f4:df:41:ec: 2b:cb:30:3f:f8:23:68:90:39:bc:b8:9e:df:eb:1a:24: fb:e4:b3:26:d0:94:f0:81:1d:c1:98:bc:dd:f3:a4:e2: bc:64:c6:a3:18:1e:e6:49:d8:4a:cd:b6:5f:25:a1:c6: b8:90:57:eb:18:c4:d3:9e:03:fb:d2:18:f2:1e:4e:5f: 05:b8:c4:f4:2c:d8:a3:8e:8c:4c:26:2a:80:f5:fb:07: 3e:5d:23:48:67:f4:85:45:26:99:65:7c:3a:59:17:0e: 82:93:00:27:6a:38:d8:ec:9a:30:8f:86:83:5a:27:97: 85:ec:4f:f4:04:62:67:ed:0d:43:bf:ab:08:ec:10:88: 3b:c4:dd:d3:d3:21:73:3a:35:4a:4d:66:f8:f9:b6:f6 Fingerprint (SHA-256): C5:91:DB:ED:18:04:4C:8A:13:28:88:31:F7:7C:EB:BF:26:4F:2F:F2:2B:CC:37:E4:A1:E8:61:B9:DC:B9:EE:52 Fingerprint (SHA1): 3D:C3:D0:3B:12:F4:02:5D:C7:5D:1D:3B:13:F5:3E:8E:E6:77:15:B4 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:e7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:25 2023 Not After : Thu Jan 18 13:42:25 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:75:ea:d3:5b:12:7a:0d:d4:90:91:68:e4:90:80:00: fb:89:79:7b:b6:00:b4:f2:40:58:74:6d:7e:1e:8b:04: 11:c8:48:c8:ff:c7:69:45:21:f7:0e:78:21:4a:c7:d7: b5:92:22:93:11:68:da:e8:2c:fe:40:7f:a9:f8:1d:aa: d6:05:7d:f8:41:b4:eb:3c:83:ab:9b:f6:d5:cc:3e:b6: 9f:d5:f5:b9:11:3b:09:2c:53:24:4d:12:ab:58:d6:8d: b9:c2:67:28:26:24:4c:e5:cc:31:4b:95:58:ac:53:65: 42:cb:82:7d:35:8f:c9:fa:da:0c:fa:6d:ad:7a:17:41: df:b9:b0:72:f2:45:fe:69:83:4e:25:4b:61:f4:74:b2: c0:f4:9a:e8:6c:6e:c3:8e:76:6e:d2:48:25:c3:fb:77: 3f:1e:6c:de:df:fa:43:3b:da:37:50:b6:a9:e2:f8:51: 4b:f0:48:6d:b0:ed:3e:c8:ee:19:3a:cb:9f:b0:69:aa: 84:51:b1:45:d4:b9:b5:ab:ee:31:ec:9e:d2:8f:1b:8d: 0c:c9:8d:42:19:88:3b:c1:5d:79:94:27:5a:61:b5:fd: 7b:fb:9d:19:eb:a4:20:9c:e3:42:9d:ba:a6:cb:b2:d9: 06:69:ec:a2:6c:e0:b9:9c:f6:a1:78:1d:35:b2:b6:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ad:ff:8d:71:5b:ae:9c:9d:b7:82:6f:c8:c7:be:86: c3:f6:9d:4b:38:d4:e2:1d:43:d9:3e:f2:5c:6d:e2:0d: d5:2b:26:af:bf:39:17:aa:b0:65:1b:3d:0d:39:c3:e1: fa:16:28:df:89:c4:08:fb:7c:a7:ca:b1:1e:b4:9e:57: 8e:f6:63:04:c2:f0:9c:b5:ac:1d:40:b3:bf:7c:b4:35: 70:15:e1:52:8a:35:54:cc:cd:24:6a:95:5e:5f:a5:dc: 45:f4:43:00:29:db:ee:d9:92:17:8d:1d:de:1e:24:84: 53:a7:61:03:b8:6c:47:ea:bf:35:9f:31:3a:0a:fc:51: 17:0a:c1:a3:10:c4:b6:4a:89:99:b9:6f:0e:de:30:34: 9a:62:45:f8:78:fd:3e:6b:43:e3:f8:27:99:0e:ca:0f: 85:b3:b8:7e:71:6f:75:26:32:fa:39:a5:12:c0:17:7c: 42:66:92:62:ef:d7:70:bc:f6:66:c3:e1:d8:ef:a2:88: b2:ea:5d:54:1b:38:65:23:4c:c6:95:d5:9d:cd:36:f7: 70:a0:6e:09:ca:be:d7:0b:9a:dc:0a:77:a3:ca:1b:cf: 1d:59:1c:ed:55:ad:c1:b7:e7:b2:0c:87:de:38:85:18: 29:d3:d6:a1:19:e6:f8:ea:bc:a9:5f:3c:12:29:e8:11 Fingerprint (SHA-256): CC:2A:37:B0:3C:EE:0C:84:04:FF:5E:C3:6E:98:F4:82:8D:BD:EC:79:C2:0D:24:74:66:0D:1F:5A:0D:DA:F0:97 Fingerprint (SHA1): 95:03:20:5E:CB:92:BE:24:06:4E:F2:66:96:6A:26:BD:46:21:E6:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:e9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:26 2023 Not After : Thu Jan 18 13:42:26 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:8c:6b:90:e3:5e:cb:81:6f:71:b0:55:71:64:d8:df: 77:f7:83:7f:68:3a:fe:d3:15:cd:a4:08:7b:34:13:9a: 47:09:a9:d3:90:58:8e:fa:71:96:78:59:86:17:47:07: 4f:bc:f0:ff:16:8e:d1:e7:cd:22:ba:ad:3e:e7:4a:cd: ef:20:ad:2d:d0:92:0d:cc:3b:f8:b1:db:b2:dd:41:e1: 3c:0e:89:ca:12:ba:33:80:0a:fd:5e:04:75:5f:5e:09: 90:b4:1e:61:e3:cb:bd:1d:58:6f:6b:15:02:7d:0e:01: 29:6f:5b:b3:98:59:b4:12:b7:30:66:74:f1:00:a1:95: 68:14:82:91:92:ac:df:25:44:57:3f:00:a4:95:f4:e1: 10:73:60:dc:f0:e4:46:e6:56:f3:45:fe:12:95:15:36: 33:5f:cf:c1:74:b1:e6:5f:33:6f:77:09:c1:89:15:79: da:08:ff:ec:d0:ac:6e:45:e3:7e:fb:ac:68:98:36:5d: 31:8b:e9:43:c3:cc:d9:29:b1:a9:7b:54:93:c3:92:e8: 8e:25:7b:c7:bd:ff:a4:2d:d1:2e:8c:46:0e:1c:59:05: 8d:0a:36:61:b6:e3:d1:16:38:64:3b:44:51:d1:d2:56: 49:af:13:a3:55:18:84:98:e7:b0:c7:86:9b:68:83:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:7a:bc:fd:92:a5:ea:81:41:bb:45:3c:63:9e:a5:d1: 0b:0d:60:1a:30:7a:9e:1a:a1:d4:59:29:8d:a4:cb:fb: b8:b8:10:ed:aa:c0:e5:32:00:28:bf:6e:a8:36:5f:43: 28:a1:d1:34:46:9f:e3:ce:33:98:27:d0:e8:bd:d3:50: 2d:97:81:67:70:7e:cd:09:4b:ff:b7:d2:79:f6:a0:6b: 2c:bb:9d:68:9e:40:0b:2e:f6:6b:ad:dc:f3:84:45:f1: f0:8e:c3:1a:0d:8c:9d:b0:cb:de:9a:3a:8c:34:29:95: af:68:4c:f3:d0:a2:21:d9:e5:be:36:c1:01:b5:a4:e0: d5:e1:c7:d0:95:7e:51:b8:14:eb:46:4a:8b:6f:03:1b: 47:8e:35:1e:77:fc:3a:27:6c:6f:ea:bc:94:05:9c:c4: 98:6c:e7:d0:de:23:9e:0d:8f:9d:c3:db:95:78:2c:5b: 75:6b:b8:c6:c2:5d:54:64:6b:15:ef:d4:7a:57:b0:57: ce:06:98:cc:77:0e:d6:06:05:49:44:0c:29:d2:fa:2d: b1:d8:a4:03:f6:f0:10:b7:ec:06:0b:7b:f9:60:23:19: 4d:4f:47:e6:ca:05:33:94:4e:c4:5c:41:90:3d:3f:66: 96:c9:7c:a5:5d:a7:2f:4e:52:91:17:cd:b0:d1:87:69 Fingerprint (SHA-256): 4E:7D:E5:37:9B:E2:13:05:BF:CF:DD:98:1B:25:38:0F:05:F6:9C:D7:10:34:F3:F2:72:46:4E:BD:3C:43:54:5C Fingerprint (SHA1): EF:1E:CB:45:EE:E8:F8:69:EE:E9:C3:F6:5D:C3:EC:FC:CF:0F:EE:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:eb Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:27 2023 Not After : Thu Jan 18 13:42:27 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:fd:4c:52:86:90:f5:95:e9:1e:f6:b4:a3:3a:98:65: 98:3f:57:69:a8:bf:d6:2c:06:3a:3e:39:b4:92:f5:96: f9:8d:99:47:e9:3f:d1:69:e6:0c:0b:aa:4b:28:90:26: be:7d:e3:a1:78:9e:d0:37:46:ff:d9:e5:85:3d:73:06: 39:6a:3c:ec:19:2f:da:68:0d:00:7b:af:86:ac:b3:56: 47:71:97:5d:f7:ab:64:2c:e9:70:53:38:6f:67:7e:f1: 4b:b3:c6:89:d4:14:21:d7:a4:9a:f1:8b:04:5e:a6:53: d0:80:b1:85:40:99:ca:bd:77:ba:f2:30:19:f1:71:d2: dc:6a:16:59:08:13:54:44:23:ff:f7:77:14:d2:29:b2: 51:7f:8f:5e:11:70:5a:06:bd:33:c7:ce:af:21:f1:c5: ad:7d:af:be:c3:14:67:31:ae:70:7d:c2:b9:ca:da:cb: 0c:09:0b:40:d2:6b:2a:22:e4:10:bc:13:1d:b5:2f:7b: 68:35:b5:4a:7b:8e:1d:f5:99:93:9c:4f:1e:e2:7a:8d: 5f:af:4c:25:0e:6c:10:47:c3:cb:1e:e6:01:aa:28:3d: e3:96:5a:5b:8c:f3:30:c3:52:61:87:6c:f2:0f:84:06: 16:69:36:65:98:aa:da:30:72:72:69:89:b4:b9:8b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:be:09:97:a8:db:47:d8:1e:2a:ec:e1:a6:de:ec:54: fa:75:d0:7b:6e:ac:de:bd:21:e7:7f:54:1f:86:3d:38: e0:b3:38:3b:bb:b4:71:5c:9c:6c:8c:fb:fa:89:f7:7f: f5:10:41:5a:a9:5a:b1:f7:97:c0:80:e9:4f:c3:19:9b: 73:26:d1:e4:be:cd:62:90:96:2c:6f:5a:83:29:9b:f4: 63:71:c9:db:6f:3a:10:2f:81:b4:f9:6b:2d:fd:a0:23: df:4e:86:d1:22:5f:e9:92:c8:92:0d:cd:70:4d:dd:d6: 4a:ad:b1:bb:e2:86:bb:c4:01:b8:99:ee:0d:c1:ec:44: cb:92:04:7a:29:ea:92:e9:a7:0f:3c:d7:f1:1c:b2:62: 9e:ea:f3:e5:ed:63:cf:6d:fc:d9:dd:f8:b4:41:81:06: 36:f6:15:3e:4e:e5:c0:25:66:cd:c2:29:b9:b7:e4:1c: c4:fd:94:e1:90:24:5f:a5:7e:e9:1f:03:69:ed:05:52: 83:e3:d1:89:59:22:41:36:ef:65:26:e8:99:f7:17:38: 13:a4:b1:c8:26:d2:ab:f0:ec:80:85:16:19:d2:1d:a4: 5b:cf:3b:c2:f3:06:c0:05:2e:ef:22:93:fa:63:14:f5: 37:19:c9:eb:99:3a:1b:f6:de:51:92:5f:cd:77:84:e3 Fingerprint (SHA-256): 18:34:CA:AC:8C:88:FB:98:BD:32:57:39:FE:32:8C:0B:E9:A7:21:AA:FC:70:48:64:C8:45:F9:E1:22:3D:D6:5B Fingerprint (SHA1): AC:F9:61:B0:80:DB:C6:2D:0B:E2:72:50:99:0B:B4:6E:D6:76:D9:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:ed Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:28 2023 Not After : Thu Jan 18 13:42:28 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:62:19:3c:ac:0d:20:24:42:60:dc:9a:f4:d0:1e:f0: c5:58:28:ce:80:a7:31:39:1a:66:94:97:72:00:d8:b0: a3:c6:2b:d1:35:d4:60:13:fa:0c:70:9b:c9:5f:f7:38: 97:e5:0d:31:c9:fa:09:4f:a1:8e:a6:b0:be:9f:78:bb: ce:db:07:3f:d1:68:1a:35:b4:26:c8:17:9e:aa:65:d6: 06:a1:a1:ac:b6:1f:12:06:f1:70:86:f7:d6:9f:42:31: 0f:33:7f:ad:6d:66:33:18:4d:cf:2a:11:66:1d:60:30: 0d:b4:f4:06:68:98:99:c2:76:0f:bf:97:2f:7c:b3:f0: 3d:88:bf:bc:09:94:01:bd:aa:5d:c7:67:38:61:ea:67: 23:96:60:df:49:d1:eb:4e:d5:77:77:bd:82:9b:4c:8b: 1b:9b:71:ae:c2:13:62:7c:38:fd:5a:58:3c:70:68:d1: 70:62:90:10:3b:b9:ea:03:31:1e:da:e5:fd:22:00:dd: 2c:6f:26:8c:98:47:9f:7c:5c:c2:84:12:01:d7:40:78: 9a:1a:49:7b:50:c1:68:45:22:fd:60:28:ff:fa:08:1a: f6:82:77:af:6c:b7:58:80:5e:ba:33:39:a1:b7:3b:13: 35:55:7c:8d:ea:0a:6f:d4:ff:40:05:f2:a4:48:1b:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:54:b4:cc:80:37:98:31:84:f3:78:a4:e1:27:7e:ea: 58:4d:6c:0c:98:8b:36:ee:81:4f:04:e8:c3:d4:cf:8b: 5d:ed:92:17:5f:a1:fd:a6:bb:b6:ba:da:6c:d4:02:c0: e4:31:27:bc:4c:40:1b:6f:af:af:22:f2:02:c3:f7:b5: bb:e6:de:d4:58:28:8a:cb:68:56:c2:a9:33:32:bd:90: 5d:44:75:23:bd:f0:a4:0c:ee:e2:4f:a6:a8:14:db:d5: 8d:7f:4a:d0:6e:2d:e0:79:95:cc:5d:6a:37:eb:77:0d: 6c:55:7e:4c:dd:86:6f:41:3b:96:72:9e:1c:c0:0d:10: d9:9e:2b:49:d7:33:ef:3d:6f:7c:47:f7:d5:0a:40:a0: 49:76:b5:2b:c3:64:05:3d:a6:f4:5f:30:ae:5a:39:f0: 16:a2:6e:5c:9e:39:c7:c7:3b:c1:1a:69:31:8b:98:51: 29:5e:6b:00:49:8f:5f:22:1b:f8:5e:2a:7c:71:17:64: 67:ba:a0:17:fe:6d:57:af:23:33:b0:32:79:76:93:99: f2:8a:0a:4c:b9:f9:15:c2:75:7a:27:d6:b7:98:0d:be: 16:6b:78:bc:dd:55:f6:09:ac:da:1d:5a:a1:55:7d:c4: 44:f5:87:3d:2d:3a:ca:a8:88:5a:e6:25:ba:b6:fc:cc Fingerprint (SHA-256): AB:6F:1D:A2:6C:05:3E:F8:65:82:81:F4:53:59:12:9E:0B:8A:A0:1F:F1:BD:21:0F:57:ED:A0:F5:CA:CE:95:1D Fingerprint (SHA1): 00:A0:F6:64:F0:C3:CB:D0:F9:A3:1C:37:81:C4:AB:1D:3E:29:A4:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:ef Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:31 2023 Not After : Thu Jan 18 13:42:31 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:fe:e3:a0:09:ba:06:27:98:8a:ca:99:f1:4d:56:d8: 73:51:ae:a3:dc:e8:3a:ce:d8:4d:1d:52:81:7b:1d:60: ce:e9:d6:45:1b:7c:ba:e1:0c:22:ce:4e:03:bc:d7:a3: fe:ea:28:1c:43:9c:93:f6:54:80:e6:0e:48:8c:93:67: df:d3:16:b5:96:ac:62:6f:3c:08:6a:2a:ef:1f:6e:a0: 38:c5:31:2d:21:e9:27:c6:3b:87:a3:d9:47:86:30:b5: db:f2:81:0c:1d:47:c1:0d:d7:62:68:82:d9:ee:76:98: e4:a0:56:64:db:6f:04:c0:72:0e:a4:49:00:64:f7:fc: 3e:7f:81:a2:58:8e:10:9c:b4:f8:cb:ca:40:ee:c3:e3: d5:0d:a3:a2:d9:46:40:99:eb:8e:26:5e:0c:b0:ef:5f: 1c:db:0a:de:93:2b:d8:5a:20:ee:4f:f9:e4:c8:63:26: 69:34:f5:ca:94:39:30:ae:ae:be:98:07:59:99:12:70: ba:6f:c6:e4:f5:f7:c1:93:62:06:54:2b:45:5b:39:00: 8a:5d:d9:f6:78:e7:c5:6b:95:12:51:1c:e1:70:c3:5f: 0e:fd:05:04:0b:9c:49:cc:6a:42:84:07:5d:19:02:4c: d0:0e:61:f4:f4:f2:a3:b4:db:fc:ba:0b:e8:82:93:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:0c:69:40:b1:d6:ec:21:af:5a:bd:61:41:de:1c:5b: f0:ef:af:43:af:f8:24:a2:73:35:a1:e4:25:fb:18:17: 77:f0:81:9e:e7:97:e0:6d:76:d2:23:40:95:74:1a:2b: 27:79:44:bd:1d:26:b0:50:11:86:b5:c4:ef:00:eb:2c: 1d:42:79:b0:5d:b8:d4:59:44:b1:bb:d3:c3:fa:c5:c1: 70:58:9c:5b:e7:66:6c:e2:af:f0:cd:da:1d:da:21:27: e2:50:ed:d0:d7:41:c4:21:a6:e1:9c:12:bc:2a:0d:ef: 59:29:b3:1f:8a:e7:6a:a6:de:83:d6:a9:9c:ab:95:52: 9b:52:03:7f:d6:69:66:a6:b2:3d:6b:9e:71:75:6f:35: 36:d1:a6:60:6a:29:38:aa:f9:22:b7:49:f8:f1:b6:cc: 9c:06:0d:be:c9:c8:ad:d4:fb:43:fb:5b:bf:6f:7d:55: ec:61:1d:9c:84:f2:fe:0d:73:a4:49:9c:5f:fe:da:3e: cb:24:8a:1b:62:63:39:9d:ba:82:94:48:57:ca:39:2e: d2:d4:8c:5d:76:96:71:6a:c6:1b:e3:cd:80:12:f0:7b: 67:f0:97:3a:01:e7:3b:83:59:ad:6b:34:82:04:6d:cd: c2:2e:92:9d:4c:01:c1:54:35:76:6c:57:92:c9:9e:66 Fingerprint (SHA-256): 5E:55:AB:D1:B0:96:FF:7F:31:D1:DC:FA:FD:24:6F:F4:24:A5:4E:F8:00:DB:7F:9C:69:FE:4A:65:83:FA:4A:AD Fingerprint (SHA1): 31:5F:DB:4F:49:CE:39:61:4D:59:3F:72:99:EF:2D:FC:E4:32:6A:A9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:f4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:32 2023 Not After : Thu Jan 18 13:42:32 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:07:3d:5e:fc:31:ed:c2:a8:3b:e0:8c:e2:4f:eb:84: 0d:87:9f:db:b3:f5:1d:8d:d7:96:b5:d1:fe:ee:7b:66: df:fc:7c:b0:40:54:81:e0:a2:48:fc:2e:a6:95:9f:f9: 49:5f:62:f6:4b:46:be:2b:96:fe:4a:d3:7c:39:04:52: 66:34:24:22:3b:2f:97:c0:f4:65:13:26:68:89:28:27: 7e:28:fc:ab:b9:8d:e4:8b:3f:30:dd:10:c7:c8:dc:ce: 76:37:01:d4:b4:6a:95:66:a8:bb:b7:84:23:fd:45:dd: a7:62:eb:16:ac:3c:fe:21:d5:f4:de:28:a4:9c:89:05: 79:8e:4e:6f:46:09:90:b4:a0:d9:fa:19:70:6d:ad:ea: d6:f3:1b:c1:94:9e:7d:60:c6:84:df:1e:48:37:e3:25: b5:be:52:2b:42:c8:8a:83:5f:00:24:5a:55:ff:f0:a7: b0:04:ae:9f:59:c2:c1:5e:f0:d8:9a:eb:ce:68:c4:29: 92:4d:18:f0:1a:f1:bb:e9:e4:be:07:f8:f0:90:15:58: de:20:d7:3c:70:81:39:19:da:e0:74:55:76:3d:c7:a3: 07:10:4c:5f:6e:9c:fb:a5:55:8f:8d:54:ae:a0:98:a6: 81:81:b3:27:91:47:86:8a:0b:96:7d:01:39:ad:90:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:51:19:e2:f6:6b:51:ca:5b:e4:db:dd:a1:f0:d3:7b: d6:f0:7a:3f:0f:c1:38:60:0e:cd:9f:4f:ad:f3:34:6d: 70:eb:63:03:74:5c:b0:f5:ea:df:e1:c1:5c:02:2e:7e: 3a:2d:0d:8b:9b:ee:8b:e0:3a:80:ed:59:c8:6b:83:73: 53:dd:a8:52:d3:72:5f:90:15:3d:67:63:cf:e5:cf:8d: 63:78:47:6f:fa:6d:c2:e2:f5:37:e3:d5:e5:86:83:b1: 9c:60:2d:c1:de:20:b3:ca:ef:9d:21:92:5f:da:71:37: 36:71:06:15:dc:bb:9e:36:39:9c:05:33:a4:de:ce:a6: 1b:0f:8f:19:67:5f:cd:86:3b:a9:58:57:b4:b4:d9:15: 6f:48:85:d2:05:1c:99:d0:58:39:71:6b:2d:75:a1:64: 72:28:ae:ad:7a:d1:f0:e9:14:ac:f8:57:e6:13:ff:64: 84:9b:85:25:ae:5f:2a:45:19:5b:ea:be:a6:87:70:f0: 87:34:96:b0:71:b4:c9:cd:11:9a:d6:50:95:3f:a8:0d: 3a:66:1c:4e:8e:10:50:1f:f6:52:67:f5:10:01:f8:3a: 50:3b:44:50:f2:ca:4e:0c:5b:61:ca:c7:1a:b8:c0:9f: 01:b3:ea:36:b2:a7:e7:ab:49:a3:a5:17:f2:ea:95:8c Fingerprint (SHA-256): F1:2D:A7:63:B8:52:42:A7:64:C6:5B:03:8C:9E:BE:A5:2F:2B:B2:57:A3:51:AC:41:69:8D:A5:B5:5B:27:50:2B Fingerprint (SHA1): A0:36:4F:DF:14:E4:C5:6C:22:93:2D:D6:1C:FC:63:75:04:17:A8:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:f5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:33 2023 Not After : Thu Jan 18 13:42:33 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:b2:da:5a:ce:f4:e4:e3:34:f7:d1:c2:c6:7e:6e:53: b5:9d:96:93:de:de:31:fb:1b:42:2f:a5:ba:dc:0b:59: ff:46:d1:cf:fc:4e:0d:7e:b2:cc:9c:73:2b:dd:75:a5: 09:8b:45:da:28:35:3a:88:79:38:84:81:67:f8:4a:f7: f2:d7:9b:a7:7c:19:e9:ae:db:5d:dd:8d:ff:f7:13:9f: 9f:ce:81:53:48:99:9e:f9:e5:24:56:40:b8:70:33:9a: 63:28:37:75:34:14:f0:fe:45:78:91:e1:40:49:ac:6c: 9e:ac:3f:f8:2f:7c:96:af:5c:3c:05:c7:b8:74:aa:98: 5f:29:44:c4:41:c5:a8:04:2d:7e:2d:f2:73:aa:16:9f: e4:5d:d9:3a:68:c9:35:ae:e1:ab:b3:31:d3:e4:55:9d: 2c:cc:0b:2a:e2:47:54:f9:23:99:39:91:47:ff:ea:58: 50:23:48:33:c1:89:f7:6a:51:c9:03:24:1b:4a:d5:4e: c5:ac:96:f5:0f:85:e2:76:2b:2a:17:15:b5:0d:f5:2c: ad:26:6f:be:01:2a:34:1c:34:58:aa:4f:20:14:e9:21: c8:f0:35:a0:57:0f:13:e2:05:4f:18:81:bc:5a:d9:f8: 0a:ce:4f:d9:2e:d4:66:23:ed:dd:0c:d5:95:c1:93:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:04:07:23:50:b0:30:3b:dd:ac:10:bd:01:9a:a2:db: f6:c6:23:65:89:ce:4d:64:14:e1:d9:11:fc:f9:6a:fa: 9c:e8:2a:0e:9b:14:29:95:9b:9f:49:46:03:c5:a4:77: ea:07:59:85:7c:7f:ea:f4:18:aa:c1:6d:2f:a8:0f:7d: d2:ae:cb:ac:ca:54:30:c8:5d:08:4a:75:e2:1c:33:8e: 91:8c:a3:e7:b2:00:52:c0:b2:e0:1a:75:53:37:e7:2d: 2b:43:5c:e0:f9:28:e5:97:00:76:4d:e6:ea:7c:ed:a9: c5:f8:13:82:01:9f:03:5f:da:86:1a:85:58:24:ed:d5: 96:62:96:aa:5c:3d:ef:70:b0:5c:fb:58:fd:09:8a:60: 2e:51:c4:55:f2:ad:4f:55:5e:54:62:e0:0f:7e:f5:ca: 61:07:10:35:60:02:65:83:16:cc:9e:a7:59:62:e7:9c: 26:2b:e6:a4:56:1b:44:e2:d7:b1:bf:e8:e7:87:dd:1b: 7f:d0:e9:47:e2:d1:ba:23:3f:46:2d:f5:fe:1a:98:6a: fd:e0:47:86:9d:e5:10:82:d4:90:1c:0e:df:b0:37:40: 84:cc:4f:1e:e2:b1:b2:ea:8e:17:d4:5f:38:ff:98:78: 2c:e2:93:ec:1d:74:c2:c4:77:a2:38:f3:e3:b5:81:f3 Fingerprint (SHA-256): 56:35:F4:DA:9B:99:2D:85:66:88:17:9B:D7:BB:F3:6D:76:66:5F:8E:30:A6:43:C3:9A:CB:B3:29:66:20:67:B5 Fingerprint (SHA1): B9:E7:C4:7F:3C:18:C8:3C:DD:96:C5:B6:80:65:D0:6A:0D:D6:DE:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:f8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:34 2023 Not After : Thu Jan 18 13:42:34 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:68:f4:43:f9:97:32:10:77:aa:cb:6c:62:af:21:6d: ef:4e:95:54:f1:bc:27:25:86:f1:4a:50:39:6a:f4:a1: 97:e2:be:c8:07:ec:ed:7d:0d:44:38:e1:93:0c:6e:01: 6c:ac:86:57:69:54:58:19:71:85:ed:17:bd:10:1c:99: 15:b3:a7:84:e9:d4:b2:5e:7e:43:0a:c8:d8:e8:49:c9: fe:93:2a:ce:dc:ca:47:bc:64:c7:58:a0:a9:ff:a0:cd: 46:61:bb:47:39:56:c8:a8:47:b8:4b:55:37:4a:45:9c: 90:3b:07:d7:5e:3b:0f:5f:67:f2:97:1e:ed:2b:a7:f1: 74:e0:c2:44:8c:25:de:70:ed:31:c7:70:88:40:10:b3: 6d:68:2d:07:f4:91:d2:03:2a:dd:7a:42:2f:b0:5c:4e: 4d:8c:c9:93:de:ae:9d:50:29:1b:37:d6:00:42:e8:10: ac:01:3f:cf:c8:b6:4f:61:01:aa:37:23:2b:85:7a:42: 35:78:1b:ed:f2:10:02:08:16:ea:13:2d:74:be:3a:46: 76:7d:c0:ff:84:5a:04:24:1b:6a:60:88:c0:c6:04:a9: e8:c6:b9:84:01:d9:d6:9e:77:df:80:1c:90:7f:d2:92: df:96:ff:ab:3f:b5:ea:87:95:a4:1c:d4:6d:ff:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 55:31:06:40:d4:4c:2f:b6:34:0b:3d:7e:ee:0a:16:e9: e6:08:71:3f:59:3f:69:75:40:4c:03:5e:ec:36:08:6a: 47:8c:93:84:fd:b5:08:7f:30:0d:65:cd:5e:03:60:cc: b6:7d:1a:ea:52:99:67:51:89:52:0b:ad:dc:a4:c5:47: b6:36:6b:77:f5:e6:f1:f0:d9:78:06:c3:5a:cc:53:e6: 89:d0:dd:99:0e:3e:a8:21:8f:67:a9:b4:97:3d:90:20: 5d:6c:fd:c7:c1:b8:84:c6:06:11:a5:41:43:11:59:12: 90:2d:25:52:db:d8:72:40:ae:0f:e6:28:7a:72:2f:24: 16:60:67:3d:3f:95:6a:f1:c4:09:1d:0f:34:d8:d9:82: ef:23:2f:fa:ab:bc:67:c9:64:b0:cd:fd:69:d3:49:d6: 7a:5e:b8:82:b0:8a:58:d0:43:25:9b:b5:4d:dd:55:bb: 85:40:4d:75:d3:d6:09:7e:fe:dc:47:2e:cd:f7:57:24: d4:dd:11:77:f0:b0:82:dd:15:0d:0b:b6:21:48:f7:fa: e3:30:eb:2b:ac:2f:97:58:10:2b:7c:a1:eb:15:33:ee: 77:10:45:63:78:89:f0:dd:fb:fa:b2:ce:d6:26:bf:0e: 7f:28:38:1c:77:3e:80:39:d4:d2:a5:5a:91:6a:60:56 Fingerprint (SHA-256): 20:88:5C:70:B3:FC:1C:51:B3:4E:A8:06:ED:19:62:E4:F7:A1:9F:B0:6B:BD:49:B4:B8:AA:7C:2C:87:78:68:ED Fingerprint (SHA1): 11:98:5D:9D:7B:78:3B:B1:CD:62:E4:78:15:CB:3E:D8:AF:B4:AC:B1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:fa Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:35 2023 Not After : Thu Jan 18 13:42:35 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:aa:8f:5a:9a:14:f7:a3:60:0f:0e:3c:57:b0:46:f6: 89:cc:fb:4e:30:2a:a0:8f:ec:42:a1:99:b0:34:20:b8: 35:8f:77:7e:f6:11:5e:d4:31:0e:8e:a3:e5:9d:d1:83: dc:ba:96:e6:c9:99:6b:40:29:95:49:86:3d:e5:d0:10: c9:e9:21:76:81:4f:17:c8:94:2e:1d:a9:9a:c0:fe:d3: 53:34:ab:a1:68:6b:59:b6:e4:91:5b:d0:eb:58:21:7d: 60:51:69:30:99:88:70:c7:3e:f9:d1:c4:ba:85:6b:19: a6:41:81:1c:00:37:46:db:07:0b:41:f2:69:62:a5:7e: 63:e8:65:b2:9c:1f:b7:5e:d3:e2:6d:f3:51:92:3c:cd: bf:24:17:6d:a1:bc:11:80:da:4e:16:7e:9e:ff:d6:96: 8d:db:2a:ae:55:13:54:5c:04:40:1e:3d:25:6a:80:06: 23:69:78:6f:5f:9e:64:29:e3:cd:c3:89:37:bd:ca:ab: 65:c0:1e:2c:b1:4d:69:d7:46:97:9d:d2:23:a3:5a:d6: 88:25:1a:df:41:fd:cf:45:b7:fc:d2:1d:5f:fe:4c:d7: 0a:19:65:5d:0f:ea:9d:37:9f:dc:0e:90:fb:56:59:8a: 6f:bc:eb:12:71:bc:11:3d:27:6a:27:42:f0:0d:8b:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:bd:73:2c:ba:86:ac:a4:e8:87:1c:34:2e:d6:6a:bc: c1:9b:1a:b5:1b:9e:a2:a5:e1:f1:26:8d:c4:74:dc:2b: a5:46:91:7c:26:36:bf:48:08:d6:cc:1b:00:f8:bd:62: 21:de:4d:d4:9f:e7:3b:d4:de:c2:7f:60:65:47:b1:58: 39:28:bc:c2:f1:c6:20:5e:82:e7:30:95:69:5e:ad:42: 10:d0:1a:5b:27:1f:aa:e0:d5:f5:a7:36:a2:d5:67:a8: ff:2c:81:11:35:a7:a2:ca:b0:7b:1a:1d:d8:39:2e:5e: e3:76:16:84:1c:44:09:bd:de:4b:55:b3:f8:69:be:b5: 38:8a:89:49:12:35:73:81:cb:f9:85:1e:ec:2c:f6:06: 9b:fb:10:dd:42:06:91:61:bb:f5:a0:74:9c:e9:2a:1b: f1:1d:f5:b9:c8:19:50:6e:e2:0c:7d:00:a6:a0:b0:20: ee:da:53:d6:c2:20:b2:86:0c:e0:9b:80:82:0d:78:27: 95:08:ad:ef:88:b1:2f:c0:3a:f8:1c:aa:59:ae:b9:cb: ed:2f:ff:a4:8a:34:38:a8:3b:89:9e:53:90:ca:d6:f7: c5:ff:7e:ce:64:5d:41:dc:27:94:1d:75:19:d1:d1:99: d1:78:d3:ff:d8:a9:b5:41:1b:9e:f1:8e:61:de:40:da Fingerprint (SHA-256): 5B:B7:C6:B1:72:DD:37:BF:B2:59:5F:8C:61:22:5E:02:23:64:5E:B1:46:BC:BC:82:19:C7:5D:1C:A3:36:13:86 Fingerprint (SHA1): C2:18:74:0D:25:24:90:A8:E8:5A:AB:E6:45:D7:39:83:64:A8:3F:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:fc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:36 2023 Not After : Thu Jan 18 13:42:36 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:61:d0:5a:28:3d:7b:0a:7f:96:45:5a:3c:22:cd:68: d3:ae:b7:55:9e:2f:11:f1:f4:fd:d0:07:66:e2:3f:43: 39:54:27:9e:08:ec:18:d6:0e:85:93:bc:78:1c:8f:10: 00:68:f2:d6:8c:3e:4c:a4:84:ca:94:8d:3c:d0:8b:08: 9e:17:e7:99:2b:d9:64:f1:04:fa:bb:49:26:da:e8:52: c2:a5:72:a7:94:38:a1:7d:d2:52:f5:e9:d7:9f:e7:39: 02:e1:07:81:96:1e:8c:53:a5:c6:e4:5d:ab:7c:35:ca: 8a:db:4d:9d:b0:eb:eb:23:bf:72:37:c1:66:69:c7:4a: 00:e9:40:9f:59:9e:66:e6:80:71:97:03:3c:fb:24:a1: 5e:c6:4f:7a:21:d6:b6:dd:df:63:7e:b5:0f:f3:2c:cb: 03:7e:f1:e8:c7:00:ff:05:21:08:b2:d0:5e:cf:05:f0: 07:ee:11:e6:d2:e5:3b:9c:eb:47:6d:d0:b3:f6:d2:9d: 53:5e:ff:34:24:ee:65:92:69:9e:4f:51:f5:79:ef:fe: d4:0c:67:98:01:90:e2:3f:c4:38:76:5d:9f:63:60:08: 24:11:7f:48:1c:b2:b9:c7:42:f4:98:e4:fb:30:2a:8e: 4c:2a:12:4a:45:95:56:5f:52:99:5f:b9:60:6d:99:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:9e:93:ab:53:39:77:57:3a:25:c2:3f:a6:c7:1e:0c: 42:15:65:26:aa:48:32:e2:e6:e5:0e:b8:71:bd:88:6c: 60:82:5e:54:45:bd:0d:92:77:1f:3c:f1:ae:dc:fc:bf: fa:32:ee:b5:cf:21:7c:a7:dd:bd:28:ad:fb:d5:b9:ea: 0a:5f:4e:ef:87:39:e9:c3:b0:ee:ec:dc:cc:40:ae:1a: b9:e5:b8:f4:df:3e:34:c7:cc:c1:6b:5e:61:fd:dd:3c: b3:06:2b:16:87:14:68:30:7c:2a:30:fb:93:80:96:db: 20:e0:39:ac:b0:e1:66:84:c6:7c:ed:ad:96:8a:c0:27: 7f:de:35:7c:2e:22:fe:c3:5f:60:71:5a:ee:9d:4a:88: 4a:2c:95:28:75:74:ea:d1:70:b4:77:ca:fb:24:99:bb: d1:0c:61:76:e9:e0:0b:c4:14:69:51:64:b4:ab:da:71: 4b:c3:a5:dd:fc:a4:5c:dd:5e:17:e3:2c:88:7e:50:36: a3:2c:02:04:ff:ae:38:90:78:69:9d:16:97:d9:9a:51: a1:1e:53:5b:44:84:38:d8:e6:52:e5:aa:27:3e:4f:fb: 38:52:18:ac:bb:57:65:d9:24:e1:a1:88:45:1d:f3:27: 11:d5:18:7b:4e:7f:25:85:e8:2a:67:b7:8f:83:82:6a Fingerprint (SHA-256): D4:52:19:E1:84:13:52:F6:DF:04:40:7F:81:A0:24:DF:D8:D9:A6:11:79:AE:D6:8A:24:2F:CB:F6:00:76:16:0C Fingerprint (SHA1): 0E:80:F1:87:A6:75:A7:6C:3E:83:86:9F:F3:D9:45:27:79:F3:41:F0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:b9:fe Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:38 2023 Not After : Thu Jan 18 13:42:38 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:44:5b:b2:23:df:d7:21:05:44:aa:21:20:49:35:36: 7a:1f:9f:9e:74:03:cc:a4:2f:12:a9:e9:c5:63:0e:2e: ab:23:95:05:04:04:9d:16:d6:3f:7c:d0:b4:ad:46:ab: 5b:35:b6:f5:bc:7f:d0:2a:57:dd:7a:a6:a2:ae:7e:89: 6c:4f:0e:ff:42:ae:a3:be:33:d0:e1:7a:d7:10:51:b3: 76:c3:75:93:c7:48:73:5d:f0:33:4f:1e:5d:39:a0:47: dc:40:e5:72:c5:c3:f9:c5:d0:d7:94:1b:2d:68:4e:8c: 5d:9b:9c:be:7c:94:59:9c:68:22:5d:bf:a5:f0:cc:07: 0c:44:eb:1d:8b:c2:01:36:26:fd:b9:4a:80:54:88:26: f9:0a:88:d9:70:df:39:92:17:14:62:ff:6e:7e:49:89: b8:50:50:27:7e:24:79:ec:40:e8:0c:e6:49:2d:8e:8e: 0c:02:4c:dc:54:71:97:0a:75:51:1a:4d:b8:91:d9:35: 20:70:2b:81:57:42:25:08:27:7f:03:70:e2:a2:0b:e0: 51:5c:78:5a:6d:e2:bb:b0:8f:e9:da:67:5a:de:d8:42: c7:f3:ca:25:27:fe:a5:fe:71:9e:0a:ec:7a:7c:6b:42: 5a:05:d2:dd:cf:2e:72:a1:7e:1c:96:12:a5:69:cc:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:9a:04:0b:38:a0:69:2a:13:05:46:a6:bb:1f:e0:3e: 80:13:9f:1e:f2:a3:af:a6:9c:3b:70:36:32:72:0b:ed: 5e:e9:a8:fb:2f:ab:25:13:5a:f1:20:eb:a9:36:79:80: 6b:3d:ac:28:1f:dd:ad:78:d3:e9:3e:15:a4:71:3a:86: 90:eb:60:4d:fc:5b:fe:bb:33:71:5c:68:24:67:fc:e8: 54:d8:21:08:23:ee:cd:51:5b:e4:a4:de:b8:eb:e0:f0: 54:56:fc:a0:6e:92:32:9d:18:c1:e1:e1:b1:c6:7e:b0: d8:e9:bb:ca:b4:9a:ec:98:8b:a6:76:a1:3e:42:a5:1e: 6d:3c:69:10:a9:d5:11:fd:09:9a:79:77:5c:fd:0e:03: 33:39:20:56:46:cd:09:19:bb:da:04:2a:a4:d3:7a:2f: 10:e3:f2:3c:c8:48:c3:13:b6:b9:59:9d:f0:d1:d8:e7: ff:a9:c6:cd:88:dc:11:38:8f:02:73:20:00:52:19:b3: 58:39:55:ce:ce:cf:f2:f8:18:f8:b2:41:2d:7a:b4:c9: 56:0f:13:ac:07:7f:9f:23:6c:af:48:b3:a4:d4:a6:6b: a9:b0:64:3f:f0:47:89:5c:ff:c8:64:22:56:12:29:d4: 52:bd:08:f2:af:82:f2:f7:dd:93:40:90:71:47:8a:be Fingerprint (SHA-256): EE:E0:93:45:50:01:AB:E9:BD:C7:F1:B9:B4:D2:21:EE:5F:32:65:05:A7:F1:77:93:C3:7A:3D:2C:59:C2:BE:58 Fingerprint (SHA1): 21:51:2C:6B:1B:18:87:2C:AA:26:82:C3:A8:E6:21:01:30:F7:9D:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:03 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 13:42:41 2023 Not After : Thu Jan 18 13:42:41 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:34:b4:62:1e:34:b4:1f:b6:ac:bf:c5:75:47:d6:68: 65:70:36:cf:0d:aa:34:bc:30:e9:1a:3b:65:0c:84:94: 6a:de:d0:f8:06:f5:a8:94:ac:87:1b:d5:f9:de:5c:bf: 3e:44:33:e4:56:1a:40:16:62:0d:2c:9e:67:b1:cf:dd: 5f:05:1b:15:27:05:2a:2d:89:2a:27:50:af:26:b4:a2: 37:6a:bb:52:ba:66:a0:e8:4c:7f:ce:34:15:87:e8:ac: de:e4:77:72:ea:f6:7d:39:36:a7:3f:6a:1e:d8:41:52: 04:54:a4:bd:19:a2:b8:6e:bb:f2:7b:8a:c2:d7:1e:c3: 1e:93:92:43:a5:46:e2:28:d9:d5:6d:5a:89:14:bf:4f: b3:e6:86:be:d5:a3:e5:1e:d4:37:c3:39:d2:79:ae:b3: 59:40:1f:71:30:be:89:01:a8:e3:07:30:db:6b:ad:12: 50:3b:7b:75:ea:ca:21:e7:7c:82:e0:db:f9:3f:c1:99: f3:19:50:a8:df:6f:de:c6:36:46:e8:23:47:c7:f4:cc: eb:4f:8d:4b:95:a3:f6:31:91:3b:86:63:e1:54:72:65: cc:b2:1e:6f:90:6d:4a:d0:b3:05:0e:83:2c:f7:99:90: 2f:e9:3a:03:04:4f:ab:b6:c4:fc:54:38:51:8c:83:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:15:72:20:9a:5f:2c:d8:cd:3f:59:92:90:a8:0d:4d: c8:51:59:ee:a9:c4:88:70:fa:e0:31:b6:8a:fd:d2:fe: 10:a0:6d:97:83:76:20:ec:6a:48:9d:d0:21:5b:7c:99: 03:bf:25:db:cb:d4:53:0e:90:48:97:29:62:35:26:45: 5b:b7:81:f2:14:48:32:35:ee:40:ae:8c:50:a4:2b:6b: 99:fa:b2:e7:4b:19:ee:d7:64:ef:65:a0:38:f6:ba:f0: 3a:bb:32:e7:bb:10:9d:2c:f6:da:56:d0:54:97:67:98: be:89:1c:41:56:6a:4c:ab:15:b3:17:3e:f3:17:92:6c: a3:66:66:bb:e0:fb:d2:31:9f:b8:54:38:03:8e:27:bf: 36:2d:77:d1:07:1b:e8:79:e1:63:aa:ee:b3:a5:76:39: 05:2e:0e:0d:72:b2:84:b8:2c:6e:98:72:92:8a:b8:13: 3b:7f:32:6a:00:28:c6:5c:3d:09:7a:66:4a:86:b8:2c: 26:07:7e:4b:64:40:b5:d9:bf:00:24:24:c7:62:3e:e3: 8e:ec:a7:e9:ff:09:b2:c9:9e:78:f2:f7:7f:41:a6:54: 82:f4:2c:84:05:d5:28:df:c5:04:c9:07:56:50:66:8e: 94:01:3b:2e:a5:ba:8f:11:9e:4b:80:d5:5e:2d:68:84 Fingerprint (SHA-256): 63:2F:A8:3F:A7:33:77:1F:04:5B:AF:38:4F:08:6A:59:18:B0:5A:BA:12:83:E0:C1:6F:86:62:F5:CA:A2:C8:AF Fingerprint (SHA1): 99:12:A1:CB:E5:85:3C:D1:5D:E5:8F:03:42:2B:38:3E:51:1C:3F:7B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:0e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Thu Jan 18 13:42:46 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:8c:76:3b:17:bb:6f:b4:89:8f:1a:f6:8e:5a:20:40: 98:77:40:68:2c:8a:65:79:03:fd:71:bf:6a:a9:5f:ca: a7:89:ad:68:94:05:35:1c:57:80:35:94:2f:6a:53:0c: c0:ed:23:d9:36:8f:00:4c:c6:b7:68:1c:75:d9:ca:bb: b2:9c:29:2b:70:63:fa:f5:0b:22:ec:fd:9a:b0:ad:b2: f6:17:96:5e:c8:3e:0a:f5:cd:fa:01:a0:e5:ea:2f:aa: 7e:89:5f:98:cc:ca:42:1d:77:a6:d9:4a:c7:ad:22:ac: 29:fe:ba:43:3c:2c:5e:1a:ee:ba:c6:14:2c:a6:78:49: 85:ff:8f:2b:1b:d8:bc:f3:2a:78:ab:a4:96:35:3e:e5: bd:c2:a1:d7:56:31:d3:44:4f:f6:38:0a:df:57:f8:70: ea:81:59:4e:89:29:cc:54:15:61:75:50:a3:4b:fb:72: 67:74:ee:fd:1e:e6:2d:5d:05:9a:0d:c4:67:5f:7a:e0: 87:7a:4d:80:33:6d:a3:93:2e:c6:1b:26:6d:65:ca:be: b2:87:0b:44:1e:d3:0e:8e:02:61:49:03:8a:7b:54:66: ec:48:02:d3:4c:4f:3f:5d:5d:cc:be:79:c0:59:d9:c9: d8:f7:96:57:30:94:5b:db:14:47:2d:f1:86:e4:c0:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:3d:34:fb:43:1f:87:c2:0d:80:7c:f1:9c:a6:da:e0: 9b:d0:12:51:60:36:ce:75:e3:0f:2a:36:8d:15:bd:06: fb:0f:a0:ce:2a:4b:93:a8:5d:e1:70:bd:ca:dc:13:dc: 11:16:e2:05:24:d9:9f:83:be:ab:e5:e6:02:84:49:46: d1:4b:db:73:71:63:36:93:47:5f:bf:5b:b9:ea:1e:a2: 5f:3b:7a:7e:bc:69:f7:4e:1f:b7:29:ec:94:17:69:e0: 8d:fd:5b:97:0b:af:d9:bb:39:29:2e:cb:8d:0e:e9:bb: 89:d7:d1:3b:71:97:3a:7b:1e:49:a6:d5:2d:d6:d2:0d: 8a:b8:64:da:44:66:f9:8b:c3:b1:a4:81:30:3f:6a:a6: d6:1a:a5:28:63:42:bb:2f:9e:b6:70:1a:59:50:c0:9e: 07:cf:36:74:d1:40:cb:18:c3:01:fb:bf:d4:4e:54:77: d2:17:a5:2b:38:fb:69:3c:17:0f:d7:47:a3:9c:7b:26: 85:79:cb:f5:b0:2a:e6:df:a0:59:66:62:4e:57:2c:20: 8b:82:03:2f:49:52:53:d3:96:92:e2:e9:f6:81:e1:c0: 41:fe:0e:9f:16:3e:2d:24:db:be:93:c2:45:ad:b6:7d: 25:bd:5a:4b:26:3a:ce:0b:fc:9b:14:40:09:e8:d3:54 Fingerprint (SHA-256): 85:B7:8F:FA:96:B9:C1:52:CA:18:56:F1:64:BD:75:5B:9F:DF:2E:5A:FE:60:AE:8E:2D:7A:32:93:81:8F:EE:21 Fingerprint (SHA1): 6B:47:29:26:ED:AE:4C:8F:F4:4D:60:0D:EC:FF:8A:C5:F9:F6:5B:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa 3ecec5b0ebd942cbae49334b5a7905e5df2de0ef NSS Certificate DB:localhost.localdomain-dsamixed < 1> ec b0d6ee4a3a84a28f1ec82c76100aca9862dea606 NSS Certificate DB:localhost-sni.localdomain-ec < 2> ec 4a00e65b44e445565c5937dd4c8f623ce71d3ed5 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 3> rsa f2791f3bc260f27f5b526106a1166bec99dc607b NSS Certificate DB:localhost.localdomain < 4> rsa 860e1455ca3ba99096cf68b256641be4a140e9fa NSS Certificate DB:localhost-sni.localdomain < 5> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> ec c15efdbf60e74a4f8ae44758c3488e697d4eb804 NSS Certificate DB:localhost.localdomain-ec < 7> ec 6897b0e2f97831fa0a8706767693551cea3a29e0 NSS Certificate DB:localhost.localdomain-ecmixed < 8> dsa 5a07bb36efd2f558a930e326bc5238415b3ee491 NSS Certificate DB:localhost-sni.localdomain-dsa < 9> dsa 5d1021ca14679caf6c3e27d7db04b4595530ab8c NSS Certificate DB:localhost-sni.localdomain-dsamixed <10> dsa 9a728dd340663a370141071d4992ef1479232435 NSS Certificate DB:localhost.localdomain-dsa <11> rsa 7430ec0f3972bce95a48740cf9fbd182af3376ef (orphan) cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 13:44:08 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed Oct 18 13:44:08 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1228 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1427 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 581 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 360448 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 180224 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 728 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Oct 18 13:44 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:06 2023 Not After : Wed Oct 18 13:42:06 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:8d:be:2c:3e:65:16:fd:3d:9a:60:fd:6c:13:c8:3f: 6d:19:1b:ce:66:0e:e7:34:28:a1:e5:67:8e:74:40:03: ac:cc:a4:78:49:a2:ee:ce:87:05:c1:2e:f9:b7:e5:a1: 82:e8:67:22:6d:54:38:d2:be:cf:44:c9:93:36:97:9f: 11:21:ea:7b:c1:4c:d2:e9:c1:b6:18:2c:b9:c2:79:31: 0d:d2:8d:5a:27:99:d4:e5:99:f1:ac:2e:a0:35:47:15: 12:10:eb:5f:77:94:4f:19:80:54:23:b0:30:f5:79:66: dd:75:7b:85:71:3c:dc:31:0c:be:b9:27:f6:ba:de:a9: 85:5e:83:cd:0e:c2:75:08:3b:52:af:66:78:af:2a:ee: da:9f:68:99:b3:e4:f0:7b:9b:ec:16:cc:1e:43:e5:fb: dd:cb:6d:41:dc:6a:08:84:ba:61:f9:90:8f:a5:31:e4: a8:18:c5:9f:0a:96:4c:86:39:59:e7:67:0b:7d:93:c7: 04:15:1e:53:18:a6:14:da:a5:5b:1a:5e:48:95:d8:3e: 33:45:d8:ea:5d:6b:27:7a:55:12:8a:ff:51:39:2a:5e: c3:c7:ed:3e:c4:87:8c:31:80:d0:3e:f0:14:5b:39:6f: ec:0e:0a:e0:16:8a:cd:35:68:64:30:eb:55:49:34:a5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:13:c4:eb:33:d1:b5:77:90:cb:67:7a:fe:4e:a3:b2: 31:83:9c:00:dc:b8:22:d1:cb:c1:7f:b6:84:92:bb:ba: af:61:cf:7e:72:ae:06:38:4a:67:e7:92:a9:c4:fa:46: 7f:49:bb:3c:1b:e0:d0:4c:33:58:ca:3e:14:b3:b8:49: f4:5c:61:ba:87:43:eb:d7:33:60:9a:1b:9e:da:84:49: de:ff:89:42:64:b9:4e:77:9d:ad:31:84:6c:4a:7c:46: cc:cc:6d:f0:ff:3d:5f:88:85:35:1a:50:9e:27:32:f7: e2:4a:b9:29:1d:c0:81:fe:52:92:2e:9f:28:c6:9c:d7: 04:2e:cd:20:c9:ba:50:7d:7b:da:b4:1d:69:50:47:d5: 88:77:ab:3b:5d:da:23:e0:b5:71:36:d0:2b:c4:16:fe: 6b:09:c8:2f:15:1f:f6:50:91:1f:58:85:19:28:d9:f1: bd:31:6b:02:0f:0b:cb:e0:a7:b6:46:cb:09:2d:62:8f: 9d:b0:c8:7e:56:3a:7a:a5:d2:24:a5:f6:52:f8:fc:d6: 46:7d:1e:d2:05:9e:91:ec:ac:52:32:17:32:87:49:57: 0f:64:47:b5:d7:0d:8c:7e:c8:0a:7e:5d:62:39:65:77: 03:54:d6:e6:0f:eb:1e:b3:70:64:50:84:bc:93:aa:66 Fingerprint (SHA-256): 34:B8:63:95:53:AD:42:A3:7A:9F:89:04:FC:E8:C2:9B:8E:69:CB:E0:75:90:A9:9C:FC:44:5E:80:79:93:D1:8D Fingerprint (SHA1): B8:87:AE:95:31:9E:C8:89:6E:11:F8:C8:D9:75:0D:43:3D:44:F9:13 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { e0, 3c, b7, 7f, df, da, fd, 8d, e1, b8, d4, 49, bc, 11, 57, da 5b, f9, 7e, 18, 3a, 13, 59, 2e, 60, f6, 04, 0c, fc, 64, 63, e3 52, f1, e9, 02, e6, f8, 38, d6, 4c, d6, 09, 0d, e0, 1a, a8, 8e 2a, 43, 8f, 76, b6, 03, 17, cc, cb, 0c, 85, 64, 74, 8d, 26, db c5, 2e, 2a, 23, 77, 21, 9c, e2, fc, 7b, 18, bb, 42, f5, 1a, bf 5b, 1e, c6, 2c, 8f, 3b, d2, cf, bc, e2, 84, 39, e2, 1a, b7, 09 94, 7e, 5f, ed, b7, df, 89, 8c, 4e, 14, a5, 56, c1, 02, 38, 75 ef, fc, 69, 5a, 90, e2, 0e, 52, a6, b9, 9b, c3, 9d, f3, 44, 07}; privKey CKA_ID = [20 bytes] { c9, d3, 84, ba, 5b, 92, 84, 38, 6b, f8, dd, 8f, 00, 7e, 9b, 29 cc, e4, 49, 59}; pubKey CKA_ID = [20 bytes] { c9, d3, 84, ba, 5b, 92, 84, 38, 6b, f8, dd, 8f, 00, 7e, 9b, 29 cc, e4, 49, 59}; matching public key found pubValue = [128 bytes] { 01, c8, be, 3f, 8b, bc, cd, 7a, b7, 55, e8, 52, d6, c0, 15, 18 f0, 04, 5c, 32, c6, 17, 4c, 2e, 0b, ec, 87, 05, a2, c8, 25, 13 48, 8a, bd, a6, 1c, 30, e9, 2f, 67, 19, 1b, 49, 2a, e4, 6b, 1a 79, 1f, a4, ce, a6, 32, cb, d1, da, a4, 0d, bb, 25, 92, 19, 99 ab, 65, 55, 58, 0a, d8, 5e, f5, 6e, 72, 72, 84, 51, 68, c3, 6d ca, b6, 36, cf, 77, 43, c9, b2, b7, 00, 62, 0c, f9, aa, 27, bd aa, a0, a5, 59, 3e, c6, a3, 9a, be, a5, 1c, e7, a6, 6f, 5d, 20 a4, 57, 3e, a7, 14, 3b, 6d, d4, 20, b2, 42, 87, fb, 03, a1, 3b}; privKey CKA_ID = [20 bytes] { 19, 31, c7, 69, 98, 03, cb, 51, 71, e7, 7b, 89, a3, ca, 98, 15 8c, 84, 90, 7e}; pubKey CKA_ID = [20 bytes] { c9, d3, 84, ba, 5b, 92, 84, 38, 6b, f8, dd, 8f, 00, 7e, 9b, 29 cc, e4, 49, 59}; pubKey CKA_ID = [20 bytes] { 19, 31, c7, 69, 98, 03, cb, 51, 71, e7, 7b, 89, a3, ca, 98, 15 8c, 84, 90, 7e}; matching public key found pubValue = [65 bytes] { 04, 8b, 18, c4, b8, a3, c8, a8, a1, 70, f5, 06, 3f, 15, 46, 4f 5c, 31, c3, d4, 0b, c0, a9, ba, bd, 4e, ac, c8, 44, 06, 81, 0d 18, 74, 98, de, f7, 79, f4, 76, de, ca, 3e, a5, 4c, 5a, 6c, dd 23, 02, 1b, 3c, 52, f7, aa, 58, db, 3d, 9f, 92, 58, 0f, 6d, 2f e0}; privKey CKA_ID = [20 bytes] { 24, f9, 38, 1d, cd, 0f, 7b, 8f, 81, e3, 8a, 74, 28, fe, 39, 27 9d, fd, 81, 48}; pubKey CKA_ID = [20 bytes] { c9, d3, 84, ba, 5b, 92, 84, 38, 6b, f8, dd, 8f, 00, 7e, 9b, 29 cc, e4, 49, 59}; pubKey CKA_ID = [20 bytes] { 19, 31, c7, 69, 98, 03, cb, 51, 71, e7, 7b, 89, a3, ca, 98, 15 8c, 84, 90, 7e}; pubKey CKA_ID = [20 bytes] { 24, f9, 38, 1d, cd, 0f, 7b, 8f, 81, e3, 8a, 74, 28, fe, 39, 27 9d, fd, 81, 48}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 --------------------------------------------------------------- | skipping key corruption test: requires sql database --------------------------------------------------------------- TIMESTAMP dbtests END: Wed Oct 18 13:44:17 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 13:44:17 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 75:57:6f:72:27:18:93:51:cb:20:dd:42:1d:6e:19:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:7b:89:74:4b:41:7e:08:4b:7d:86:b0:03:2a:e9:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:41:32 2023 Not After : Wed Oct 18 13:41:32 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:4c:75:ca:64:73:13:ed:f5:d9:61:2b:87:72:36: a9:54:e8:95:46:7e:07:84:2c:85:e8:57:f8:d2:36:60: 76:9f:54:0d:53:c5:c8:f5:63:bd:05:4a:ef:f1:52:70: c7:24:1f:23:fd:c5:ee:e7:5e:32:d7:c1:be:19:2d:9b: 5e:8f:37:01:c7:94:5c:f0:70:8b:cb:66:ce:60:97:07: 98:5f:d7:90:95:c6:75:23:c0:e4:b0:76:48:c4:06:8a: a1:8b:cc:cb:b4:d7:f2:2c:e9:34:12:32:5e:98:92:d9: 34:ef:15:37:40:84:c5:be:52:c1:4f:56:2a:23:44:0a: 35:ff:91:86:d0 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:ad:b5:ad:0b:8a:7c:4a:59:d1:ef: 55:e3:18:9e:81:49:bd:be:bc:e7:a2:63:0e:26:4f:e6: 65:30:b7:8c:b6:45:c4:15:28:e5:fd:41:f9:19:d8:4d: 0a:1d:ab:2a:6a:43:2a:aa:55:08:61:69:72:26:e3:b0: 6a:79:9e:7e:ba:15:8a:02:42:01:a1:8e:36:6a:61:d6: 05:3d:2b:82:ab:f4:66:6a:48:77:8b:9c:ea:d1:94:e8: c6:2c:96:3b:7e:cc:ac:70:55:6f:96:2c:a5:5c:2d:65: f6:9a:a1:bf:70:9e:ff:d1:59:b5:6a:1a:f7:4b:08:39: 19:ee:a1:e6:4a:ec:7f:f5:e5:bb:e9 Fingerprint (SHA-256): C7:50:EC:9E:22:47:17:32:34:81:8F:97:40:B0:A9:36:46:EA:2D:28:1E:77:DB:0C:73:46:63:5A:00:A4:CD:C5 Fingerprint (SHA1): A5:19:EA:8E:C9:A7:86:80:3D:E2:07:0F:AB:FB:17:32:11:A2:B4:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:03 2023 Not After : Wed Oct 18 13:42:03 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9a:57:ab:01:ef:da:8b:b1:20:b1:7d:f6:de:4e:b9: f4:af:65:34:7b:eb:85:7d:2c:8a:d4:4b:01:93:9f:44: 7e:59:19:f4:4d:c7:c8:cd:48:40:b5:72:b1:f6:8c:e5: 37:73:ea:cf:cc:17:93:cf:15:bf:d8:d0:61:78:e6:f5: 55:c8:7e:24:91:64:c2:d8:94:e1:ac:9a:53:2b:9f:48: 7b:b0:15:49:1e:4e:4b:82:23:fe:a4:35:36:32:90:16: 09 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e9:f4:e2:92:19:d7:ef:b5:19:b7: 76:f1:f6:38:b1:10:ae:59:24:b1:5c:67:a4:07:09:ca: 37:de:f5:d7:ed:5d:73:05:8b:12:03:4f:9f:97:ff:8d: 7f:46:2e:36:bc:aa:c4:e0:cc:30:56:41:3e:6a:51:0f: 91:ca:d4:42:b1:9a:f6:02:42:01:81:94:3f:73:14:89: 80:2a:e8:d1:92:17:02:ec:01:e0:07:03:71:bb:70:71: ad:f0:4e:51:25:31:f7:68:8e:79:fd:2c:29:e1:1b:73: d5:37:0c:de:b9:df:bf:52:63:5e:35:d2:52:f4:ce:fa: 8a:aa:f3:aa:0b:cd:c2:c8:57:48:d4 Fingerprint (SHA-256): F4:39:E3:F1:79:7D:5D:D0:7B:69:1C:86:92:77:62:14:E2:1B:7F:9C:C4:5C:5C:D2:79:C4:86:F5:4E:4D:68:A2 Fingerprint (SHA1): 30:12:3C:82:56:81:8E:CF:1C:D7:BB:ED:1E:D9:27:1A:7B:71:15:61 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:3e:2c:1e:e7:65:81:bd:b4:79:6f:25:05:0d:e2:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:41:32 2023 Not After : Wed Oct 18 13:41:32 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:4c:75:ca:64:73:13:ed:f5:d9:61:2b:87:72:36: a9:54:e8:95:46:7e:07:84:2c:85:e8:57:f8:d2:36:60: 76:9f:54:0d:53:c5:c8:f5:63:bd:05:4a:ef:f1:52:70: c7:24:1f:23:fd:c5:ee:e7:5e:32:d7:c1:be:19:2d:9b: 5e:8f:37:01:c7:94:5c:f0:70:8b:cb:66:ce:60:97:07: 98:5f:d7:90:95:c6:75:23:c0:e4:b0:76:48:c4:06:8a: a1:8b:cc:cb:b4:d7:f2:2c:e9:34:12:32:5e:98:92:d9: 34:ef:15:37:40:84:c5:be:52:c1:4f:56:2a:23:44:0a: 35:ff:91:86:d0 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:ad:b5:ad:0b:8a:7c:4a:59:d1:ef: 55:e3:18:9e:81:49:bd:be:bc:e7:a2:63:0e:26:4f:e6: 65:30:b7:8c:b6:45:c4:15:28:e5:fd:41:f9:19:d8:4d: 0a:1d:ab:2a:6a:43:2a:aa:55:08:61:69:72:26:e3:b0: 6a:79:9e:7e:ba:15:8a:02:42:01:a1:8e:36:6a:61:d6: 05:3d:2b:82:ab:f4:66:6a:48:77:8b:9c:ea:d1:94:e8: c6:2c:96:3b:7e:cc:ac:70:55:6f:96:2c:a5:5c:2d:65: f6:9a:a1:bf:70:9e:ff:d1:59:b5:6a:1a:f7:4b:08:39: 19:ee:a1:e6:4a:ec:7f:f5:e5:bb:e9 Fingerprint (SHA-256): C7:50:EC:9E:22:47:17:32:34:81:8F:97:40:B0:A9:36:46:EA:2D:28:1E:77:DB:0C:73:46:63:5A:00:A4:CD:C5 Fingerprint (SHA1): A5:19:EA:8E:C9:A7:86:80:3D:E2:07:0F:AB:FB:17:32:11:A2:B4:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:03 2023 Not After : Wed Oct 18 13:42:03 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9a:57:ab:01:ef:da:8b:b1:20:b1:7d:f6:de:4e:b9: f4:af:65:34:7b:eb:85:7d:2c:8a:d4:4b:01:93:9f:44: 7e:59:19:f4:4d:c7:c8:cd:48:40:b5:72:b1:f6:8c:e5: 37:73:ea:cf:cc:17:93:cf:15:bf:d8:d0:61:78:e6:f5: 55:c8:7e:24:91:64:c2:d8:94:e1:ac:9a:53:2b:9f:48: 7b:b0:15:49:1e:4e:4b:82:23:fe:a4:35:36:32:90:16: 09 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e9:f4:e2:92:19:d7:ef:b5:19:b7: 76:f1:f6:38:b1:10:ae:59:24:b1:5c:67:a4:07:09:ca: 37:de:f5:d7:ed:5d:73:05:8b:12:03:4f:9f:97:ff:8d: 7f:46:2e:36:bc:aa:c4:e0:cc:30:56:41:3e:6a:51:0f: 91:ca:d4:42:b1:9a:f6:02:42:01:81:94:3f:73:14:89: 80:2a:e8:d1:92:17:02:ec:01:e0:07:03:71:bb:70:71: ad:f0:4e:51:25:31:f7:68:8e:79:fd:2c:29:e1:1b:73: d5:37:0c:de:b9:df:bf:52:63:5e:35:d2:52:f4:ce:fa: 8a:aa:f3:aa:0b:cd:c2:c8:57:48:d4 Fingerprint (SHA-256): F4:39:E3:F1:79:7D:5D:D0:7B:69:1C:86:92:77:62:14:E2:1B:7F:9C:C4:5C:5C:D2:79:C4:86:F5:4E:4D:68:A2 Fingerprint (SHA1): 30:12:3C:82:56:81:8E:CF:1C:D7:BB:ED:1E:D9:27:1A:7B:71:15:61 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bb:2d:04:6f:c0:80:82:8a:94:09:f1:80:56:e0:54:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 09:7b:24:5c:ba:a7:dc:3d:0f:a7:86:e2:82:22:f1:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:82:82:ae:71:8f:6d:22:0e:a1:08:eb:8a:3e:e0:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6e:0a:ee:9d:0f:7e:de:9d:f7:10:ce:ee:5d:a1:ee:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:7b:67:3e:67:fa:b3:8b:c5:df:7c:35:fc:48:41:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ba:e6:ca:f7:39:98:25:17:9a:1a:a1:ca:cb:87: 2a:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 47:f0:9a:6f:17:2f:5c:8a:51:45:12:f1:e9:7d:ad:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:0e:85:0d:bf:61:77:27:7b:4e:14:6b:b4:da:7b:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 69:fd:8b:3e:1f:d2:97:ee:41:ba:c3:ec:1e:db:c8:b4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 35:a2:c2:d6:ad:c3:14:2b:a3:66:1b:4b:0f:a5:f7:04 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: df:ef:47:7b:32:bd:b1:d0:bc:56:0e:19:a0:67:14:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:7d:c7:72:cd:32:b8:6d:27:7b:a6:04:f4:a5:9e:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 67:28:1a:79:2c:d6:9b:fd:3c:42:a9:70:d2:8b:76:f4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:ea:0a:68:84:20:ea:39:f2:3d:36:4e:bb:75:46:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 01:fd:56:f8:c3:7b:39:c0:56:83:52:48:22:dc:ca:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:c0:d1:c2:24:a2:c3:6d:25:6d:21:e0:89:21:f9:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:42:3f:9e:fb:96:c6:5b:92:46:a1:5f:d2:cc:9f: b7:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9c:ae:24:a6:b3:03:2a:8c:3c:9b:68:93:78:a7:32:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:49:3e:24:9c:a5:5b:bf:76:f1:e2:a4:84:72:a8:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b4:34:22:4c:87:1b:ac:d0:57:94:72:6f:72:99:4c:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 13:93:7e:e2:9b:c0:66:bc:78:0e:f9:9c:37:b1:64:f3 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 1b:de:99:97:85:2d:01:90:78:9d:89:75:10:4a:34:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:fb:51:55:b0:d5:2d:8e:b0:0c:3a:c7:6b:5e:db:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7a:95:fb:aa:90:d2:b0:e4:ef:bf:aa:d0:32:87:4a:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: eb:3b:54:e5:68:30:71:29:c2:3c:a7:a3:12:cc:b7:a9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8e:53:a3:52:60:cc:93:f8:60:a3:77:92:07:bd: e5:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a2:c1:5d:bb:7d:8a:1c:0b:bf:99:a6:c1:f1:9d:ea:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:54:a4:18:54:d8:28:67:88:62:fa:15:4c:f3:6b:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ea:54:46:79:e9:45:5c:48:d1:fb:17:3a:4e:b3:35:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a2:58:88:68:ac:e5:c7:32:6a:ea:22:26:a6:a9:29:5e Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:c8:d8:7e:44:d2:62:8c:cd:4d:67:c6:c0:53:83:f7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:fd:fd:f6:94:93:3a:25:6b:5b:f7:76:59:ba:dd:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 4d:cb:2a:be:79:0e:50:7f:cf:cf:25:6a:78:06:9e:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:57:a7:10:47:25:07:1e:68:f5:ea:29:b3:69:77:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 4d:12:a9:8b:ec:0d:cc:2c:1e:1c:68:d9:58:7c:01:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:02:13:61:38:d2:62:fd:47:ac:7e:1b:4e:4e:e4:10 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d1:0d:72:ee:50:be:b1:17:5a:db:02:b5:a8:5c: b4:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 11:eb:11:e1:24:73:32:39:cd:8a:de:5d:e7:6e:7a:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:a0:1f:42:82:3c:55:69:e5:41:1c:15:54:07:bc:69 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ed:02:f3:f0:13:92:9b:af:9f:ec:53:5d:8e:00:f6:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c4:97:4a:a2:20:b0:8f:0d:3b:d7:90:26:42:fb:5a:51 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e1:28:1c:ff:1e:f2:a7:03:5c:b0:1f:e0:06:2e:d5:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 93:a5:48:33:fd:bd:ca:cc:d2:d8:cc:cf:57:1c:da:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d8:08:b2:e5:73:30:2e:52:47:97:e8:84:4f:09:0a:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:91:c2:1f:0d:3d:07:00:81:d1:4f:f4:a1:64:b0:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 3d:94:64:f7:7b:7d:bc:b3:64:d9:4e:fa:c5:16:c1:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:5d:5f:94:f1:8a:02:fc:3a:1d:3f:de:63:54:e5:39 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a5:49:29:30:94:84:aa:27:d2:49:2f:f2:01:a5: ed:d8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a4:7a:09:36:20:11:40:0e:41:51:5c:07:71:60:df:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 05:52:e5:72:06:87:7d:be:74:7a:7b:13:28:0f:93:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 1b:25:97:5d:49:fe:f9:de:95:4f:37:5c:7d:6c:a6:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b8:7d:a5:78:0c:4a:6f:0b:66:b2:77:94:37:48:28:bf Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 04:34:15:45:de:cf:c1:e3:72:23:39:2a:5d:7a:c3:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d7:04:a2:8a:4c:65:74:05:83:39:e0:b8:67:e5:d4:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:a4:01:9e:20:8e:9e:0c:8e:e2:36:13:37:de:94:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:b3:d5:90:f9:5d:21:c0:48:3c:e8:c0:33:24:ed:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:66:e2:87:1f:77:34:b2:b5:13:51:0b:38:26:df: 91:85 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:fa:4a:61:29:cf:75:21:af:f4:a1:fe:30:8e:17:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:a6:d3:e6:0b:2b:02:f0:23:28:de:8a:aa:96:d7:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:84:a4:54:45:6a:9b:08:1f:1c:56:be:3c:64:10:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:de:3e:0b:58:02:6c:be:be:61:2d:26:f6:a0:65:d3 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:62:34:63:71:38:28:e6:e7:da:eb:d4:62:eb:ba:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c9:68:ff:37:79:22:db:ee:57:bd:03:d2:8b:c3:40:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e4:48:b2:2f:35:f0:d1:f6:b9:39:62:a5:90:cc:b4:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f6:dc:2c:11:83:4a:a8:6b:a2:c4:79:bb:aa:0b:9c:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: cd:10:1f:58:ae:28:68:21:2d:ae:54:c4:da:f3:81:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9a:26:2d:d1:ca:13:dc:34:92:ad:c9:68:3c:f2:a4:74 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:23:07:6e:3c:62:d3:e0:c6:49:d1:a9:23:76:46: 95:8d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 51:a4:99:de:d0:f5:d2:3b:db:93:1d:d1:fd:6c:c0:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:22:fa:bb:ee:f5:59:b4:91:61:81:c9:77:c8:d2:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0e:1a:ba:d5:55:c9:85:75:ac:07:e0:82:80:e5:2b:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e4:f6:d2:43:cb:08:58:e5:dd:74:4d:d9:94:ca:c1:9a Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3a:71:90:87:78:87:7f:51:b1:29:32:7f:a2:ef:38:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 14:db:14:6b:ca:53:63:3d:58:1c:49:2d:7d:dd:f3:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 2f:30:7b:2d:17:6e:5f:4d:49:d9:14:e9:55:8f:e5:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:c6:7c:ec:d0:d1:bf:3b:6e:d8:e0:e2:bc:14:14:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: da:70:c2:7a:96:bf:a8:7a:8c:b2:f0:02:07:3c:54:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:4f:e2:a0:18:0b:cf:ec:54:da:ab:a3:c6:84:6c:e2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3d:8b:a3:ea:10:b8:50:67:af:9b:b9:62:1c:f2: a8:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 37:3b:ff:3c:75:5e:b9:81:6a:3c:9c:36:8c:62:e9:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:73:b6:b6:9c:4c:3b:b7:59:a3:55:72:df:e2:72:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 5c:40:49:a2:b4:42:a9:c8:70:b1:4f:c3:5e:41:99:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 51:e9:60:bf:c6:b1:b1:30:d7:db:17:db:8c:06:c2:c7 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 64:20:b9:d2:9d:bd:6d:ec:01:d7:f0:6f:ef:23:57:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a3:95:a0:ea:0e:db:aa:2f:aa:d5:23:e0:d4:44:c8:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6a:70:9c:20:b0:f8:b4:71:c0:59:9e:eb:46:48:1d:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: be:35:49:54:c1:b6:32:90:f1:20:3d:0c:15:f0:18:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d6:27:c3:ac:4e:d4:04:28:99:aa:3c:cc:85:56:49:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:d8:31:e4:9e:83:0d:2d:47:31:29:33:36:6a:55:7d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e8:60:dc:74:80:e0:8c:77:65:7a:60:cf:37:21: 69:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 71:ad:22:28:ab:29:7b:b9:a7:78:cb:f2:94:2b:11:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:67:0d:94:0d:49:e0:64:e5:d6:79:fe:46:90:aa:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8e:52:4c:01:14:71:26:ec:56:65:6c:ac:c6:4c:e3:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ce:ba:2a:b1:9d:13:5e:00:4f:aa:03:b9:17:48:59:c9 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8d:52:3e:f7:56:39:04:2b:46:ae:9e:a0:d4:0f:64:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6c:cf:98:62:bd:e1:43:f3:80:e0:85:2d:91:ba:43:ea Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:e3:77:c7:a1:8b:69:b6:93:c8:bf:6d:b0:68:85:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:fe:5e:b6:e1:e9:63:b4:5e:a9:96:05:2c:de:84:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fd:82:6f:8f:22:0c:94:5f:da:07:8e:98:71:fd:96:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:b4:42:1d:98:d4:54:b8:ce:dd:e4:5b:57:5d:cf:73 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:34:be:0c:d8:1d:a4:cb:ef:70:28:23:45:a1:3c: b2:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:1f:74:93:e4:11:25:dd:33:0f:90:25:86:09:27:73 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:94:06:d7:61:e9:6c:7c:d6:42:fd:54:b7:40:03:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:d9:b6:19:79:6e:3a:e4:1a:76:2a:16:83:d2:ea:ec Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2a:64:cf:69:e6:69:9d:4a:32:47:f3:59:c0:bf:a8:bd Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:a3:e6:f8:1f:2e:18:bb:5e:c2:b8:d1:ee:de:b4:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3f:c8:07:ef:f2:8e:f5:d5:31:2e:8d:98:a0:52:d8:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:38:bc:b7:12:07:c1:10:71:ef:f0:59:15:97:a4:7c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:ec:f6:78:18:18:0a:d4:34:19:e8:bc:cb:f2:af: 97:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:26:60:d6:9e:d5:d1:b3:59:b0:b5:41:b4:81:23:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:22:04:5c:1a:2a:fa:5d:21:dd:c2:04:2d:54:4f:89 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:a5:f7:c3:00:03:d9:5f:16:11:1b:50:68:ba:32: 2c:fd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:77:3f:f0:fa:79:af:14:0b:a2:fc:59:a8:1b:56:0d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:5e:89:ae:e7:2f:81:97:a7:10:81:d0:ee:a9: 55:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e8:7b:96:a9:70:fe:59:f5:6f:fe:b0:e4:50:d9:d3:03 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:17:49:98:5d:84:94:b3:ea:09:e5:10:93:64:f8: bc:ac Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e6:94:61:a4:ec:14:b2:79:31:1a:e6:f1:12:3e:37:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:fe:7c:d7:c9:3b:60:ba:57:37:5b:d2:43:4f:2d:dc Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:63:b7:bc:a5:bc:39:ec:79:ac:ce:dd:ea:e2:a1: ce:20 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 03:df:74:6b:e8:2a:b6:bb:6b:9d:f5:f2:3b:ae:fe:0a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:50:75:24:14:16:fa:91:8b:3a:48:a2:1d:3f:75: 0e:1f tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:05:bd:5d:a0:65:90:b2:06:07:99:fd:11:5f:6a:ea Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:d2:1f:1d:03:35:96:c1:19:7d:00:2f:77:f1:cd: 2d:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a5:5b:5d:d9:34:53:51:09:44:bb:6b:6c:05:a2:3b:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:55:2b:63:ef:ca:d2:45:e1:1b:21:49:52:03:71:ce Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:d3:93:c3:d8:e8:17:9e:d0:c4:e5:f0:4a:d8:af: e1:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 32:50:db:7c:e1:f6:6a:c6:8e:88:40:73:1f:35:94:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 95:ca:bf:9e:85:de:27:0f:41:f9:ef:ba:e2:59:f8:bd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:7f:fe:3e:b9:ab:c3:56:ea:61:04:99:9a:ff:12: 8b:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1a:c7:30:29:c5:ab:fe:39:96:ce:a2:a4:1c:d0:35:d2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:01:38:a9:4f:89:75:de:5b:91:d2:4e:be:88:9f: 22:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:ba:0f:49:db:12:e7:a7:e8:29:ab:b2:1f:9b:d8:d5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:d0:a4:4c:a3:42:28:e8:6f:86:87:62:e9:10:bf: b6:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 02:f5:25:2f:0b:63:75:10:e1:5e:ce:c9:03:56:a6:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:30:e7:3c:e3:1e:d5:48:68:85:20:b4:68:27:61:af Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:53:6f:90:1d:f1:f1:26:80:d2:9a:75:ca:91:da: 71:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:11:39:6a:8a:d7:1c:cd:50:88:e3:82:18:79:ec:a1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:fe:e5:bf:bb:3b:61:ee:82:44:67:9b:71:e7:08: 3b:c7 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:fa:47:d9:d6:a9:aa:51:df:fa:28:01:26:55:cd:b4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:1a:94:e0:52:2b:dd:65:54:14:03:31:ef:b0:ce: 5a:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7e:31:7d:f2:1a:a3:7a:5f:6c:c2:1f:21:f2:70:9b:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cf:11:c1:eb:07:9f:d4:e3:92:95:11:86:f0:bd:57:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a7:e2:16:6d:7d:38:b9:54:07:3c:4f:b0:44:95: 50:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:a0:4f:56:2c:b8:56:81:1b:66:21:a3:9a:a2:51:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:d5:0f:51:3d:c2:9a:cd:02:10:82:f9:ec:d9:95:c1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:88:38:24:5a:c8:3a:d0:b1:5d:0f:4b:c0:90:a8: d0:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:6b:c2:98:88:ad:a5:f8:f4:cc:93:1c:43:36:81:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:82:28:3b:89:82:2e:6f:25:0c:1a:e7:6c:ed:39:e4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:d8:f8:92:5f:c4:7a:0d:5a:e6:62:62:e9:95:e1: f1:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:a2:ce:72:65:7b:8e:6b:28:bf:d7:75:75:fb:1f:1d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:10:97:a7:fb:9a:9e:11:48:09:7d:1b:65:ff:fe: 2b:1e tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:e1:30:80:23:47:b2:9e:1e:32:f1:40:40:a4:03:8a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:9a:da:61:18:d6:2b:10:3a:74:af:6e:05:d4:dc: 64:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4c:fe:a7:ea:1e:d8:ab:45:e8:94:4d:82:85:af:90:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:c8:d0:cc:d4:c4:ee:12:3b:7f:5e:68:fe:f1:bb:d6 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:cf:72:83:02:03:c3:75:ca:e2:7d:03:06:96:d3: a1:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:5f:92:f6:4d:ad:a0:63:b4:0e:61:06:97:2e:f9:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3d:75:f1:89:c0:bb:f6:45:83:2e:af:d6:08:34:d7:f0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:4b:60:8d:ed:3a:9a:42:d8:22:31:1c:07:5f:d9: 90:86 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:e0:4a:f1:7f:3a:34:23:e2:4b:35:09:50:bf:fd:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dd:0a:bc:56:eb:29:11:1e:fa:29:df:fe:b0:7f: 85:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:b4:c1:bd:20:3d:8c:34:e2:64:50:1d:a9:f2:51:ec Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:e6:29:39:50:65:e8:0f:ad:72:a0:bb:19:e2:d6: 61:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5b:23:a8:14:68:44:b1:aa:dd:ac:1d:75:8c:f0:cb:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:bd:cc:7d:9d:9a:d5:62:ef:fa:02:3b:5c:8c:4b:22 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:aa:61:96:19:7e:07:22:6e:da:cf:b9:29:e0:9e: 98:31 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 65:a0:f1:b9:f0:e6:32:f7:fc:6e:89:5f:ae:9c:7b:40 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:e6:fe:48:53:6b:ba:d2:5a:f3:8e:66:b2:14:9d: 78:e3 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ba:f5:91:ac:99:f1:5d:16:8e:f2:4d:0d:11:08:85:49 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:22:ed:57:2e:e0:6e:b7:7a:90:e6:93:f9:78:ab: 72:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7f:d2:63:93:0c:eb:8c:6f:94:54:b1:01:fb:99:c7:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e0:3b:d7:28:d2:1b:d0:78:21:a1:48:a4:e1:d6:2b:a4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:a3:ba:37:c7:f1:31:58:1c:31:11:84:66:33:f6: 97:c7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:f7:80:c3:80:d4:3e:99:01:33:c3:0d:bf:e2:0b:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:08:de:04:a8:28:80:1a:0c:6c:7e:21:b8:49:e9:46 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:49:90:a7:45:aa:29:52:bb:bc:03:11:f9:6c:67: 23:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:f4:ef:36:ee:ae:2c:d0:a7:9f:42:fa:35:0e:6b:4c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a3:4a:1e:28:d5:41:5a:be:f4:9a:9a:68:f1:75: a7:aa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:8f:41:f9:ba:c0:43:44:e5:90:87:82:60:9a:8f:30 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:e3:9b:03:ec:d4:dd:01:69:9a:4e:68:25:8e:cb: fe:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:82:99:bb:bb:63:ec:69:cf:3a:f6:8e:0c:cf:36:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:b2:e6:a5:fe:6f:59:5c:3d:55:a7:5b:04:a3:3c:58 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:1f:25:51:63:2f:f7:63:5a:3c:9a:d1:c3:24:1f: 48:5e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:de:6f:da:1f:20:e9:d5:6e:97:ed:7e:12:48:12:b6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:34:08:30:12:b0:c9:95:4b:5e:f5:13:30:01:e4: a4:53 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f1:e3:aa:19:20:5d:99:a5:6c:07:b0:cc:5e:52:16:1b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:0c:d5:6c:5c:5f:4b:77:87:79:4a:56:c8:57:eb: 3f:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bd:b5:5d:4a:c2:22:f2:f4:02:3e:a0:42:9d:d1:7b:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:89:f0:53:1b:98:53:e4:72:da:ee:b7:96:f4:7d:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:77:e2:9b:1a:24:5e:93:5a:6d:de:fc:25:28:54: 3e:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:de:ba:4f:35:a8:ab:36:45:74:fc:52:65:14:09:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:33:42:e2:a1:13:70:ac:62:43:a0:45:fb:96:be:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:29:87:c1:7b:b1:12:21:c7:44:0b:04:03:56:05: 76:23 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:fa:11:4d:48:a3:58:3d:cb:15:6f:bc:b2:ed:8e:f6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b1:c4:4d:72:c6:c2:dc:53:c9:06:a4:cd:4e:83: a9:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5f:54:09:19:a1:56:de:a7:1c:f3:2a:7d:24:7d:39:74 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d7:06:ed:34:85:2a:cd:a8:3a:67:d6:ac:48:58: 6d:7b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: eb:23:bb:42:2c:ba:ef:07:49:52:88:f2:8f:42:26:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:2c:90:75:b2:2e:64:d9:fa:ab:63:22:cb:4b:6b:d0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:55:e4:16:bb:e7:4f:1c:b6:d0:36:66:39:f2:b1: 9b:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:45:89:e4:02:e8:1e:63:8d:87:46:27:75:cf:19:e0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:0d:a1:ce:bd:5e:d1:aa:c4:68:01:12:ab:52:90: c9:b3 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:f3:38:5e:3e:10:84:b4:d8:b1:a3:f7:4d:7c:c8:0c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:13:bb:4d:e5:d2:ca:a2:06:b7:0e:3c:2c:91:30: f3:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c2:75:b9:91:07:c6:0d:02:6b:fe:97:82:fa:6d:7f:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5a:92:74:3a:00:c1:98:19:15:61:db:12:d1:3e:23:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0b:ba:9f:9b:51:62:91:71:aa:a0:44:10:eb:99:fc:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:1a:f5:8e:97:22:00:bf:14:ff:86:d8:b3:39:2e:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:5b:88:ab:12:89:8a:b6:84:79:4c:18:ca:5d:c8:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cc:ff:de:f7:19:d4:a9:59:57:6e:af:f9:bf:70:14:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:bd:6f:85:d6:de:79:11:07:58:7e:ab:19:0b:32:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1c:0f:6f:0f:06:cc:a5:52:e7:00:c7:6d:08:19:ff:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: eb:8d:75:f8:5e:a0:a7:8c:d7:6a:f6:7c:fe:fe:e9:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5c:a2:ce:fc:3c:8e:96:13:93:82:f7:5b:60:15:bd:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:a9:37:ca:62:e2:d1:d3:3c:7e:ac:64:e0:ed:00:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f6:14:98:28:97:12:b5:8a:f5:ba:42:0e:6e:6b:c9:63 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b9:ba:91:d7:8d:a1:98:0d:fd:a7:a4:7f:77:75:78:7d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3c:34:82:fa:f5:5a:a4:af:9c:08:69:2f:5f:f3: 07:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:21:02:ff:27:37:f5:14:87:8a:dc:9f:4d:c1:64:b0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:5f:bf:6c:44:e8:8b:20:b2:1a:a6:fd:3e:df:a1: 0b:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:f5:38:52:d4:f6:1e:5e:00:be:7c:25:4c:44:80:82 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a4:8e:47:18:d5:a9:37:9e:93:8a:46:7e:ce:bf: df:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:e5:60:e1:9e:9e:7f:4a:fc:d5:55:65:41:da:5a:1f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:53:d1:42:43:fa:4d:e7:8d:95:a0:21:4f:e3:df: 0a:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:b5:cb:4f:e9:0f:36:39:63:ea:ce:1b:37:22:17:6c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:cf:c7:1d:5a:af:36:38:8a:9a:bd:fa:b8:a4:08: 02:75 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:00:9b:d0:bf:2e:66:64:e0:b4:64:07:ad:0e:9b:9f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:30:c2:f9:d4:b1:5d:80:2b:15:6f:14:2c:77:88: 05:22 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 48:13:71:3d:eb:33:40:3c:1e:72:88:b4:75:0d:26:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:ee:5f:bb:71:39:06:f5:b0:c7:f5:2c:e2:81:19:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:7a:15:ca:f5:74:53:7b:6c:b6:f8:f4:7e:23:7b:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:31:fd:80:c9:b5:33:5a:a9:2d:76:08:11:69:de:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:d7:db:20:6d:f9:4c:bc:51:8d:2d:ea:c2:c1:54:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5b:75:ce:42:72:60:fe:98:fa:fb:45:99:9b:38:43:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 14:03:52 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 14:03:52 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle Changing byte 0x00042d80 (273792): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 14:04:21 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Wed Oct 18 14:04:21 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.27434 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v2.27434 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.27434 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.27434 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v2.27434 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.27434 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/combined.27434 -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/decoded.27434 -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/log.27434 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/decoded.27434 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/log.27434 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.21 user 0.20 sys 0.00 0 seconds sdr.sh: #9: pwdecrypt no time regression - PASSED TIMESTAMP sdr END: Wed Oct 18 14:04:23 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 14:04:23 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 14:04:23 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 14:04:23 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 14:04:53 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 14:04:53 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7317 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7317 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9355 with PID 7317 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7317 at Wed Oct 18 14:04:53 UTC 2023 kill -USR1 7317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7317 killed at Wed Oct 18 14:04:53 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7369 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7369 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9355 with PID 7369 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7369 at Wed Oct 18 14:04:54 UTC 2023 kill -USR1 7369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7369 killed at Wed Oct 18 14:04:54 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7421 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7421 found at Wed Oct 18 14:04:54 UTC 2023 selfserv_9355 with PID 7421 started at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7421 at Wed Oct 18 14:04:55 UTC 2023 kill -USR1 7421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7421 killed at Wed Oct 18 14:04:55 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:04:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7487 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7487 found at Wed Oct 18 14:04:55 UTC 2023 selfserv_9355 with PID 7487 started at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7487 at Wed Oct 18 14:04:55 UTC 2023 kill -USR1 7487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7487 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7539 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7539 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9355 with PID 7539 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7539 at Wed Oct 18 14:04:56 UTC 2023 kill -USR1 7539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7539 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7591 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7591 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9355 with PID 7591 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7591 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 7591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7591 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7657 found at Wed Oct 18 14:04:57 UTC 2023 selfserv_9355 with PID 7657 started at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7657 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 7657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7657 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7709 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9355 with PID 7709 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7709 at Wed Oct 18 14:04:58 UTC 2023 kill -USR1 7709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7709 killed at Wed Oct 18 14:04:58 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7761 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9355 with PID 7761 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7761 at Wed Oct 18 14:04:59 UTC 2023 kill -USR1 7761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7761 killed at Wed Oct 18 14:04:59 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7827 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7827 found at Wed Oct 18 14:04:59 UTC 2023 selfserv_9355 with PID 7827 started at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7827 at Wed Oct 18 14:04:59 UTC 2023 kill -USR1 7827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7827 killed at Wed Oct 18 14:04:59 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:04:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7879 found at Wed Oct 18 14:05:00 UTC 2023 selfserv_9355 with PID 7879 started at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7879 at Wed Oct 18 14:05:00 UTC 2023 kill -USR1 7879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7879 killed at Wed Oct 18 14:05:00 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7931 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7931 found at Wed Oct 18 14:05:00 UTC 2023 selfserv_9355 with PID 7931 started at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7931 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 7931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7931 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7997 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9355 with PID 7997 started at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7997 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 7997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7997 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8049 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8049 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9355 with PID 8049 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8049 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 8049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8049 killed at Wed Oct 18 14:05:02 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8101 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8101 found at Wed Oct 18 14:05:02 UTC 2023 selfserv_9355 with PID 8101 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8101 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 8101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8101 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8167 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8167 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9355 with PID 8167 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8167 at Wed Oct 18 14:05:03 UTC 2023 kill -USR1 8167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8167 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8219 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9355 with PID 8219 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8219 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 8219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8219 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8271 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9355 with PID 8271 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8271 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 8271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8271 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8337 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8337 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9355 with PID 8337 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8337 at Wed Oct 18 14:05:05 UTC 2023 kill -USR1 8337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8337 killed at Wed Oct 18 14:05:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8389 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8389 found at Wed Oct 18 14:05:05 UTC 2023 selfserv_9355 with PID 8389 started at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8389 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 8389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8389 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8441 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8441 found at Wed Oct 18 14:05:06 UTC 2023 selfserv_9355 with PID 8441 started at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8441 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 8441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8441 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8507 found at Wed Oct 18 14:05:07 UTC 2023 selfserv_9355 with PID 8507 started at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8507 at Wed Oct 18 14:05:07 UTC 2023 kill -USR1 8507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8507 killed at Wed Oct 18 14:05:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8559 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8559 found at Wed Oct 18 14:05:07 UTC 2023 selfserv_9355 with PID 8559 started at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8559 at Wed Oct 18 14:05:07 UTC 2023 kill -USR1 8559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8559 killed at Wed Oct 18 14:05:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8611 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9355 with PID 8611 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8611 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 8611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8611 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8677 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9355 with PID 8677 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8677 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 8677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8677 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8729 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8729 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9355 with PID 8729 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8729 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 8729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8729 killed at Wed Oct 18 14:05:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8781 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8781 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9355 with PID 8781 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8781 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 8781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8781 killed at Wed Oct 18 14:05:10 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8847 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9355 with PID 8847 started at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8847 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 8847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8847 killed at Wed Oct 18 14:05:10 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8899 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8899 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9355 with PID 8899 started at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8899 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 8899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8899 killed at Wed Oct 18 14:05:11 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8951 found at Wed Oct 18 14:05:11 UTC 2023 selfserv_9355 with PID 8951 started at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 8951 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 8951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8951 killed at Wed Oct 18 14:05:11 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9017 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9017 found at Wed Oct 18 14:05:12 UTC 2023 selfserv_9355 with PID 9017 started at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9017 at Wed Oct 18 14:05:12 UTC 2023 kill -USR1 9017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9017 killed at Wed Oct 18 14:05:12 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9069 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9069 found at Wed Oct 18 14:05:12 UTC 2023 selfserv_9355 with PID 9069 started at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9069 at Wed Oct 18 14:05:12 UTC 2023 kill -USR1 9069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9069 killed at Wed Oct 18 14:05:12 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9121 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9121 found at Wed Oct 18 14:05:13 UTC 2023 selfserv_9355 with PID 9121 started at Wed Oct 18 14:05:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9121 at Wed Oct 18 14:05:13 UTC 2023 kill -USR1 9121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9121 killed at Wed Oct 18 14:05:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9187 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9187 found at Wed Oct 18 14:05:13 UTC 2023 selfserv_9355 with PID 9187 started at Wed Oct 18 14:05:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9187 at Wed Oct 18 14:05:13 UTC 2023 kill -USR1 9187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9187 killed at Wed Oct 18 14:05:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9239 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9239 found at Wed Oct 18 14:05:14 UTC 2023 selfserv_9355 with PID 9239 started at Wed Oct 18 14:05:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9239 at Wed Oct 18 14:05:14 UTC 2023 kill -USR1 9239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9239 killed at Wed Oct 18 14:05:14 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9291 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9291 found at Wed Oct 18 14:05:14 UTC 2023 selfserv_9355 with PID 9291 started at Wed Oct 18 14:05:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9291 at Wed Oct 18 14:05:14 UTC 2023 kill -USR1 9291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9291 killed at Wed Oct 18 14:05:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9357 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9357 found at Wed Oct 18 14:05:15 UTC 2023 selfserv_9355 with PID 9357 started at Wed Oct 18 14:05:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9357 at Wed Oct 18 14:05:15 UTC 2023 kill -USR1 9357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9357 killed at Wed Oct 18 14:05:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9409 found at Wed Oct 18 14:05:16 UTC 2023 selfserv_9355 with PID 9409 started at Wed Oct 18 14:05:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9409 at Wed Oct 18 14:05:16 UTC 2023 kill -USR1 9409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9409 killed at Wed Oct 18 14:05:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9466 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9466 found at Wed Oct 18 14:05:16 UTC 2023 selfserv_9355 with PID 9466 started at Wed Oct 18 14:05:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9466 at Wed Oct 18 14:05:17 UTC 2023 kill -USR1 9466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9466 killed at Wed Oct 18 14:05:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9532 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9532 found at Wed Oct 18 14:05:17 UTC 2023 selfserv_9355 with PID 9532 started at Wed Oct 18 14:05:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9532 at Wed Oct 18 14:05:18 UTC 2023 kill -USR1 9532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9532 killed at Wed Oct 18 14:05:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9584 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9584 found at Wed Oct 18 14:05:18 UTC 2023 selfserv_9355 with PID 9584 started at Wed Oct 18 14:05:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9584 at Wed Oct 18 14:05:19 UTC 2023 kill -USR1 9584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9584 killed at Wed Oct 18 14:05:19 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9636 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9636 found at Wed Oct 18 14:05:19 UTC 2023 selfserv_9355 with PID 9636 started at Wed Oct 18 14:05:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9636 at Wed Oct 18 14:05:19 UTC 2023 kill -USR1 9636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9636 killed at Wed Oct 18 14:05:19 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9702 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9702 found at Wed Oct 18 14:05:20 UTC 2023 selfserv_9355 with PID 9702 started at Wed Oct 18 14:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9702 at Wed Oct 18 14:05:20 UTC 2023 kill -USR1 9702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9702 killed at Wed Oct 18 14:05:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9754 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9754 found at Wed Oct 18 14:05:21 UTC 2023 selfserv_9355 with PID 9754 started at Wed Oct 18 14:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9754 at Wed Oct 18 14:05:21 UTC 2023 kill -USR1 9754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9754 killed at Wed Oct 18 14:05:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9808 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9808 found at Wed Oct 18 14:05:21 UTC 2023 selfserv_9355 with PID 9808 started at Wed Oct 18 14:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9808 at Wed Oct 18 14:05:22 UTC 2023 kill -USR1 9808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9808 killed at Wed Oct 18 14:05:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9876 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9876 found at Wed Oct 18 14:05:22 UTC 2023 selfserv_9355 with PID 9876 started at Wed Oct 18 14:05:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9876 at Wed Oct 18 14:05:23 UTC 2023 kill -USR1 9876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9876 killed at Wed Oct 18 14:05:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9928 found at Wed Oct 18 14:05:23 UTC 2023 selfserv_9355 with PID 9928 started at Wed Oct 18 14:05:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9928 at Wed Oct 18 14:05:24 UTC 2023 kill -USR1 9928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9928 killed at Wed Oct 18 14:05:24 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9982 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9982 found at Wed Oct 18 14:05:24 UTC 2023 selfserv_9355 with PID 9982 started at Wed Oct 18 14:05:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9982 at Wed Oct 18 14:05:25 UTC 2023 kill -USR1 9982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9982 killed at Wed Oct 18 14:05:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10048 found at Wed Oct 18 14:05:25 UTC 2023 selfserv_9355 with PID 10048 started at Wed Oct 18 14:05:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10048 at Wed Oct 18 14:05:25 UTC 2023 kill -USR1 10048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10048 killed at Wed Oct 18 14:05:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10100 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10100 found at Wed Oct 18 14:05:26 UTC 2023 selfserv_9355 with PID 10100 started at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10100 at Wed Oct 18 14:05:26 UTC 2023 kill -USR1 10100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10100 killed at Wed Oct 18 14:05:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10152 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10152 found at Wed Oct 18 14:05:26 UTC 2023 selfserv_9355 with PID 10152 started at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10152 at Wed Oct 18 14:05:27 UTC 2023 kill -USR1 10152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10152 killed at Wed Oct 18 14:05:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10218 found at Wed Oct 18 14:05:27 UTC 2023 selfserv_9355 with PID 10218 started at Wed Oct 18 14:05:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10218 at Wed Oct 18 14:05:27 UTC 2023 kill -USR1 10218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10218 killed at Wed Oct 18 14:05:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10270 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10270 found at Wed Oct 18 14:05:28 UTC 2023 selfserv_9355 with PID 10270 started at Wed Oct 18 14:05:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10270 at Wed Oct 18 14:05:28 UTC 2023 kill -USR1 10270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10270 killed at Wed Oct 18 14:05:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10322 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10322 found at Wed Oct 18 14:05:29 UTC 2023 selfserv_9355 with PID 10322 started at Wed Oct 18 14:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10322 at Wed Oct 18 14:05:29 UTC 2023 kill -USR1 10322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10322 killed at Wed Oct 18 14:05:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10388 found at Wed Oct 18 14:05:29 UTC 2023 selfserv_9355 with PID 10388 started at Wed Oct 18 14:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10388 at Wed Oct 18 14:05:30 UTC 2023 kill -USR1 10388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10388 killed at Wed Oct 18 14:05:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10440 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10440 found at Wed Oct 18 14:05:30 UTC 2023 selfserv_9355 with PID 10440 started at Wed Oct 18 14:05:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10440 at Wed Oct 18 14:05:31 UTC 2023 kill -USR1 10440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10440 killed at Wed Oct 18 14:05:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10492 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10492 found at Wed Oct 18 14:05:31 UTC 2023 selfserv_9355 with PID 10492 started at Wed Oct 18 14:05:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10492 at Wed Oct 18 14:05:32 UTC 2023 kill -USR1 10492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10492 killed at Wed Oct 18 14:05:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10558 found at Wed Oct 18 14:05:32 UTC 2023 selfserv_9355 with PID 10558 started at Wed Oct 18 14:05:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10558 at Wed Oct 18 14:05:32 UTC 2023 kill -USR1 10558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10558 killed at Wed Oct 18 14:05:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10610 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10610 found at Wed Oct 18 14:05:33 UTC 2023 selfserv_9355 with PID 10610 started at Wed Oct 18 14:05:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10610 at Wed Oct 18 14:05:33 UTC 2023 kill -USR1 10610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10610 killed at Wed Oct 18 14:05:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10662 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10662 found at Wed Oct 18 14:05:33 UTC 2023 selfserv_9355 with PID 10662 started at Wed Oct 18 14:05:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10662 at Wed Oct 18 14:05:34 UTC 2023 kill -USR1 10662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10662 killed at Wed Oct 18 14:05:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10728 found at Wed Oct 18 14:05:34 UTC 2023 selfserv_9355 with PID 10728 started at Wed Oct 18 14:05:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10728 at Wed Oct 18 14:05:35 UTC 2023 kill -USR1 10728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10728 killed at Wed Oct 18 14:05:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10780 found at Wed Oct 18 14:05:35 UTC 2023 selfserv_9355 with PID 10780 started at Wed Oct 18 14:05:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10780 at Wed Oct 18 14:05:35 UTC 2023 kill -USR1 10780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10780 killed at Wed Oct 18 14:05:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10832 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10832 found at Wed Oct 18 14:05:36 UTC 2023 selfserv_9355 with PID 10832 started at Wed Oct 18 14:05:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10832 at Wed Oct 18 14:05:36 UTC 2023 kill -USR1 10832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10832 killed at Wed Oct 18 14:05:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10898 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10898 found at Wed Oct 18 14:05:37 UTC 2023 selfserv_9355 with PID 10898 started at Wed Oct 18 14:05:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10898 at Wed Oct 18 14:05:37 UTC 2023 kill -USR1 10898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10898 killed at Wed Oct 18 14:05:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10950 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10950 found at Wed Oct 18 14:05:37 UTC 2023 selfserv_9355 with PID 10950 started at Wed Oct 18 14:05:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10950 at Wed Oct 18 14:05:38 UTC 2023 kill -USR1 10950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10950 killed at Wed Oct 18 14:05:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11002 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11002 found at Wed Oct 18 14:05:38 UTC 2023 selfserv_9355 with PID 11002 started at Wed Oct 18 14:05:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11002 at Wed Oct 18 14:05:39 UTC 2023 kill -USR1 11002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11002 killed at Wed Oct 18 14:05:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11068 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11068 found at Wed Oct 18 14:05:39 UTC 2023 selfserv_9355 with PID 11068 started at Wed Oct 18 14:05:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11068 at Wed Oct 18 14:05:40 UTC 2023 kill -USR1 11068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11068 killed at Wed Oct 18 14:05:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11120 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11120 found at Wed Oct 18 14:05:40 UTC 2023 selfserv_9355 with PID 11120 started at Wed Oct 18 14:05:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11120 at Wed Oct 18 14:05:40 UTC 2023 kill -USR1 11120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11120 killed at Wed Oct 18 14:05:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11172 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11172 found at Wed Oct 18 14:05:41 UTC 2023 selfserv_9355 with PID 11172 started at Wed Oct 18 14:05:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11172 at Wed Oct 18 14:05:41 UTC 2023 kill -USR1 11172 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11172 killed at Wed Oct 18 14:05:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11238 found at Wed Oct 18 14:05:41 UTC 2023 selfserv_9355 with PID 11238 started at Wed Oct 18 14:05:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11238 at Wed Oct 18 14:05:42 UTC 2023 kill -USR1 11238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11238 killed at Wed Oct 18 14:05:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11290 found at Wed Oct 18 14:05:42 UTC 2023 selfserv_9355 with PID 11290 started at Wed Oct 18 14:05:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11290 at Wed Oct 18 14:05:43 UTC 2023 kill -USR1 11290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11290 killed at Wed Oct 18 14:05:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11342 found at Wed Oct 18 14:05:43 UTC 2023 selfserv_9355 with PID 11342 started at Wed Oct 18 14:05:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11342 at Wed Oct 18 14:05:43 UTC 2023 kill -USR1 11342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11342 killed at Wed Oct 18 14:05:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11408 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11408 found at Wed Oct 18 14:05:44 UTC 2023 selfserv_9355 with PID 11408 started at Wed Oct 18 14:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11408 at Wed Oct 18 14:05:44 UTC 2023 kill -USR1 11408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11408 killed at Wed Oct 18 14:05:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11460 found at Wed Oct 18 14:05:44 UTC 2023 selfserv_9355 with PID 11460 started at Wed Oct 18 14:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11460 at Wed Oct 18 14:05:45 UTC 2023 kill -USR1 11460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11460 killed at Wed Oct 18 14:05:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11512 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11512 found at Wed Oct 18 14:05:45 UTC 2023 selfserv_9355 with PID 11512 started at Wed Oct 18 14:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11512 at Wed Oct 18 14:05:46 UTC 2023 kill -USR1 11512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11512 killed at Wed Oct 18 14:05:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11578 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11578 found at Wed Oct 18 14:05:46 UTC 2023 selfserv_9355 with PID 11578 started at Wed Oct 18 14:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11578 at Wed Oct 18 14:05:46 UTC 2023 kill -USR1 11578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11578 killed at Wed Oct 18 14:05:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11630 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11630 found at Wed Oct 18 14:05:46 UTC 2023 selfserv_9355 with PID 11630 started at Wed Oct 18 14:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11630 at Wed Oct 18 14:05:47 UTC 2023 kill -USR1 11630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11630 killed at Wed Oct 18 14:05:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11682 found at Wed Oct 18 14:05:47 UTC 2023 selfserv_9355 with PID 11682 started at Wed Oct 18 14:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11682 at Wed Oct 18 14:05:47 UTC 2023 kill -USR1 11682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11682 killed at Wed Oct 18 14:05:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11748 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11748 found at Wed Oct 18 14:05:48 UTC 2023 selfserv_9355 with PID 11748 started at Wed Oct 18 14:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11748 at Wed Oct 18 14:05:48 UTC 2023 kill -USR1 11748 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11748 killed at Wed Oct 18 14:05:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11800 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11800 found at Wed Oct 18 14:05:48 UTC 2023 selfserv_9355 with PID 11800 started at Wed Oct 18 14:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11800 at Wed Oct 18 14:05:48 UTC 2023 kill -USR1 11800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11800 killed at Wed Oct 18 14:05:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11852 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11852 found at Wed Oct 18 14:05:49 UTC 2023 selfserv_9355 with PID 11852 started at Wed Oct 18 14:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11852 at Wed Oct 18 14:05:49 UTC 2023 kill -USR1 11852 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11852 killed at Wed Oct 18 14:05:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11918 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11918 found at Wed Oct 18 14:05:49 UTC 2023 selfserv_9355 with PID 11918 started at Wed Oct 18 14:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11918 at Wed Oct 18 14:05:50 UTC 2023 kill -USR1 11918 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11918 killed at Wed Oct 18 14:05:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11970 found at Wed Oct 18 14:05:50 UTC 2023 selfserv_9355 with PID 11970 started at Wed Oct 18 14:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11970 at Wed Oct 18 14:05:51 UTC 2023 kill -USR1 11970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11970 killed at Wed Oct 18 14:05:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12022 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12022 found at Wed Oct 18 14:05:51 UTC 2023 selfserv_9355 with PID 12022 started at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12022 at Wed Oct 18 14:05:51 UTC 2023 kill -USR1 12022 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12022 killed at Wed Oct 18 14:05:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12088 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12088 found at Wed Oct 18 14:05:52 UTC 2023 selfserv_9355 with PID 12088 started at Wed Oct 18 14:05:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12088 at Wed Oct 18 14:05:52 UTC 2023 kill -USR1 12088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12088 killed at Wed Oct 18 14:05:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12140 found at Wed Oct 18 14:05:52 UTC 2023 selfserv_9355 with PID 12140 started at Wed Oct 18 14:05:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12140 at Wed Oct 18 14:05:52 UTC 2023 kill -USR1 12140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12140 killed at Wed Oct 18 14:05:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:05:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12192 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12192 found at Wed Oct 18 14:05:53 UTC 2023 selfserv_9355 with PID 12192 started at Wed Oct 18 14:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12192 at Wed Oct 18 14:05:53 UTC 2023 kill -USR1 12192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12192 killed at Wed Oct 18 14:05:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12258 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12258 found at Wed Oct 18 14:05:53 UTC 2023 selfserv_9355 with PID 12258 started at Wed Oct 18 14:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12258 at Wed Oct 18 14:05:54 UTC 2023 kill -USR1 12258 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12258 killed at Wed Oct 18 14:05:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12310 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12310 found at Wed Oct 18 14:05:54 UTC 2023 selfserv_9355 with PID 12310 started at Wed Oct 18 14:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12310 at Wed Oct 18 14:05:54 UTC 2023 kill -USR1 12310 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12310 killed at Wed Oct 18 14:05:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12362 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12362 found at Wed Oct 18 14:05:54 UTC 2023 selfserv_9355 with PID 12362 started at Wed Oct 18 14:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12362 at Wed Oct 18 14:05:55 UTC 2023 kill -USR1 12362 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12362 killed at Wed Oct 18 14:05:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12428 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12428 found at Wed Oct 18 14:05:55 UTC 2023 selfserv_9355 with PID 12428 started at Wed Oct 18 14:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12428 at Wed Oct 18 14:05:55 UTC 2023 kill -USR1 12428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12428 killed at Wed Oct 18 14:05:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12480 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12480 found at Wed Oct 18 14:05:56 UTC 2023 selfserv_9355 with PID 12480 started at Wed Oct 18 14:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12480 at Wed Oct 18 14:05:56 UTC 2023 kill -USR1 12480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12480 killed at Wed Oct 18 14:05:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12532 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12532 found at Wed Oct 18 14:05:56 UTC 2023 selfserv_9355 with PID 12532 started at Wed Oct 18 14:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12532 at Wed Oct 18 14:05:56 UTC 2023 kill -USR1 12532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12532 killed at Wed Oct 18 14:05:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12598 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12598 found at Wed Oct 18 14:05:57 UTC 2023 selfserv_9355 with PID 12598 started at Wed Oct 18 14:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12598 at Wed Oct 18 14:05:57 UTC 2023 kill -USR1 12598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12598 killed at Wed Oct 18 14:05:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12650 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12650 found at Wed Oct 18 14:05:57 UTC 2023 selfserv_9355 with PID 12650 started at Wed Oct 18 14:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12650 at Wed Oct 18 14:05:58 UTC 2023 kill -USR1 12650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12650 killed at Wed Oct 18 14:05:58 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12702 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12702 found at Wed Oct 18 14:05:58 UTC 2023 selfserv_9355 with PID 12702 started at Wed Oct 18 14:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12702 at Wed Oct 18 14:05:58 UTC 2023 kill -USR1 12702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12702 killed at Wed Oct 18 14:05:58 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12768 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12768 found at Wed Oct 18 14:05:58 UTC 2023 selfserv_9355 with PID 12768 started at Wed Oct 18 14:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12768 at Wed Oct 18 14:05:59 UTC 2023 kill -USR1 12768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12768 killed at Wed Oct 18 14:05:59 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:05:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:05:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12820 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12820 found at Wed Oct 18 14:05:59 UTC 2023 selfserv_9355 with PID 12820 started at Wed Oct 18 14:05:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12820 at Wed Oct 18 14:05:59 UTC 2023 kill -USR1 12820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12820 killed at Wed Oct 18 14:05:59 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12872 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12872 found at Wed Oct 18 14:06:00 UTC 2023 selfserv_9355 with PID 12872 started at Wed Oct 18 14:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12872 at Wed Oct 18 14:06:00 UTC 2023 kill -USR1 12872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12872 killed at Wed Oct 18 14:06:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12938 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12938 found at Wed Oct 18 14:06:00 UTC 2023 selfserv_9355 with PID 12938 started at Wed Oct 18 14:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12938 at Wed Oct 18 14:06:01 UTC 2023 kill -USR1 12938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12938 killed at Wed Oct 18 14:06:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12990 found at Wed Oct 18 14:06:01 UTC 2023 selfserv_9355 with PID 12990 started at Wed Oct 18 14:06:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12990 at Wed Oct 18 14:06:01 UTC 2023 kill -USR1 12990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12990 killed at Wed Oct 18 14:06:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13042 found at Wed Oct 18 14:06:02 UTC 2023 selfserv_9355 with PID 13042 started at Wed Oct 18 14:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13042 at Wed Oct 18 14:06:02 UTC 2023 kill -USR1 13042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13042 killed at Wed Oct 18 14:06:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13108 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13108 found at Wed Oct 18 14:06:02 UTC 2023 selfserv_9355 with PID 13108 started at Wed Oct 18 14:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13108 at Wed Oct 18 14:06:03 UTC 2023 kill -USR1 13108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13108 killed at Wed Oct 18 14:06:03 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13160 found at Wed Oct 18 14:06:03 UTC 2023 selfserv_9355 with PID 13160 started at Wed Oct 18 14:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13160 at Wed Oct 18 14:06:03 UTC 2023 kill -USR1 13160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13160 killed at Wed Oct 18 14:06:03 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13212 found at Wed Oct 18 14:06:03 UTC 2023 selfserv_9355 with PID 13212 started at Wed Oct 18 14:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13212 at Wed Oct 18 14:06:04 UTC 2023 kill -USR1 13212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13212 killed at Wed Oct 18 14:06:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13278 found at Wed Oct 18 14:06:04 UTC 2023 selfserv_9355 with PID 13278 started at Wed Oct 18 14:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13278 at Wed Oct 18 14:06:04 UTC 2023 kill -USR1 13278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13278 killed at Wed Oct 18 14:06:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13330 found at Wed Oct 18 14:06:05 UTC 2023 selfserv_9355 with PID 13330 started at Wed Oct 18 14:06:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13330 at Wed Oct 18 14:06:05 UTC 2023 kill -USR1 13330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13330 killed at Wed Oct 18 14:06:05 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13382 found at Wed Oct 18 14:06:05 UTC 2023 selfserv_9355 with PID 13382 started at Wed Oct 18 14:06:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13382 at Wed Oct 18 14:06:06 UTC 2023 kill -USR1 13382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13382 killed at Wed Oct 18 14:06:06 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13448 found at Wed Oct 18 14:06:06 UTC 2023 selfserv_9355 with PID 13448 started at Wed Oct 18 14:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13448 at Wed Oct 18 14:06:06 UTC 2023 kill -USR1 13448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13448 killed at Wed Oct 18 14:06:06 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13500 found at Wed Oct 18 14:06:07 UTC 2023 selfserv_9355 with PID 13500 started at Wed Oct 18 14:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13500 at Wed Oct 18 14:06:07 UTC 2023 kill -USR1 13500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13500 killed at Wed Oct 18 14:06:07 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13552 found at Wed Oct 18 14:06:07 UTC 2023 selfserv_9355 with PID 13552 started at Wed Oct 18 14:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13552 at Wed Oct 18 14:06:08 UTC 2023 kill -USR1 13552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13552 killed at Wed Oct 18 14:06:08 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13618 found at Wed Oct 18 14:06:08 UTC 2023 selfserv_9355 with PID 13618 started at Wed Oct 18 14:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13618 at Wed Oct 18 14:06:08 UTC 2023 kill -USR1 13618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13618 killed at Wed Oct 18 14:06:08 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13670 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13670 found at Wed Oct 18 14:06:08 UTC 2023 selfserv_9355 with PID 13670 started at Wed Oct 18 14:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13670 at Wed Oct 18 14:06:09 UTC 2023 kill -USR1 13670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13670 killed at Wed Oct 18 14:06:09 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13722 found at Wed Oct 18 14:06:09 UTC 2023 selfserv_9355 with PID 13722 started at Wed Oct 18 14:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13722 at Wed Oct 18 14:06:09 UTC 2023 kill -USR1 13722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13722 killed at Wed Oct 18 14:06:10 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13788 found at Wed Oct 18 14:06:10 UTC 2023 selfserv_9355 with PID 13788 started at Wed Oct 18 14:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13788 at Wed Oct 18 14:06:10 UTC 2023 kill -USR1 13788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13788 killed at Wed Oct 18 14:06:10 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13840 found at Wed Oct 18 14:06:10 UTC 2023 selfserv_9355 with PID 13840 started at Wed Oct 18 14:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13840 at Wed Oct 18 14:06:11 UTC 2023 kill -USR1 13840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13840 killed at Wed Oct 18 14:06:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13892 found at Wed Oct 18 14:06:11 UTC 2023 selfserv_9355 with PID 13892 started at Wed Oct 18 14:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13892 at Wed Oct 18 14:06:11 UTC 2023 kill -USR1 13892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13892 killed at Wed Oct 18 14:06:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13958 found at Wed Oct 18 14:06:11 UTC 2023 selfserv_9355 with PID 13958 started at Wed Oct 18 14:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13958 at Wed Oct 18 14:06:12 UTC 2023 kill -USR1 13958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13958 killed at Wed Oct 18 14:06:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14010 found at Wed Oct 18 14:06:12 UTC 2023 selfserv_9355 with PID 14010 started at Wed Oct 18 14:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14010 at Wed Oct 18 14:06:12 UTC 2023 kill -USR1 14010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14010 killed at Wed Oct 18 14:06:13 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14062 found at Wed Oct 18 14:06:13 UTC 2023 selfserv_9355 with PID 14062 started at Wed Oct 18 14:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14062 at Wed Oct 18 14:06:13 UTC 2023 kill -USR1 14062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14062 killed at Wed Oct 18 14:06:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14128 found at Wed Oct 18 14:06:13 UTC 2023 selfserv_9355 with PID 14128 started at Wed Oct 18 14:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14128 at Wed Oct 18 14:06:14 UTC 2023 kill -USR1 14128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14128 killed at Wed Oct 18 14:06:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14180 found at Wed Oct 18 14:06:14 UTC 2023 selfserv_9355 with PID 14180 started at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14180 at Wed Oct 18 14:06:14 UTC 2023 kill -USR1 14180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14180 killed at Wed Oct 18 14:06:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14232 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14232 found at Wed Oct 18 14:06:14 UTC 2023 selfserv_9355 with PID 14232 started at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14232 at Wed Oct 18 14:06:15 UTC 2023 kill -USR1 14232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14232 killed at Wed Oct 18 14:06:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14301 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14301 found at Wed Oct 18 14:06:15 UTC 2023 selfserv_9355 with PID 14301 started at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14301 at Wed Oct 18 14:06:15 UTC 2023 kill -USR1 14301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14301 killed at Wed Oct 18 14:06:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14353 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14353 found at Wed Oct 18 14:06:15 UTC 2023 selfserv_9355 with PID 14353 started at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14353 at Wed Oct 18 14:06:16 UTC 2023 kill -USR1 14353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14353 killed at Wed Oct 18 14:06:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14407 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14407 found at Wed Oct 18 14:06:16 UTC 2023 selfserv_9355 with PID 14407 started at Wed Oct 18 14:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14407 at Wed Oct 18 14:06:16 UTC 2023 kill -USR1 14407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14407 killed at Wed Oct 18 14:06:16 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14473 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14473 found at Wed Oct 18 14:06:17 UTC 2023 selfserv_9355 with PID 14473 started at Wed Oct 18 14:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14473 at Wed Oct 18 14:06:17 UTC 2023 kill -USR1 14473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14473 killed at Wed Oct 18 14:06:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14525 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14525 found at Wed Oct 18 14:06:17 UTC 2023 selfserv_9355 with PID 14525 started at Wed Oct 18 14:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14525 at Wed Oct 18 14:06:17 UTC 2023 kill -USR1 14525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14525 killed at Wed Oct 18 14:06:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14577 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14577 found at Wed Oct 18 14:06:18 UTC 2023 selfserv_9355 with PID 14577 started at Wed Oct 18 14:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14577 at Wed Oct 18 14:06:18 UTC 2023 kill -USR1 14577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14577 killed at Wed Oct 18 14:06:18 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14644 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14644 found at Wed Oct 18 14:06:18 UTC 2023 selfserv_9355 with PID 14644 started at Wed Oct 18 14:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14644 at Wed Oct 18 14:06:18 UTC 2023 kill -USR1 14644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14644 killed at Wed Oct 18 14:06:18 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14696 found at Wed Oct 18 14:06:19 UTC 2023 selfserv_9355 with PID 14696 started at Wed Oct 18 14:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14696 at Wed Oct 18 14:06:19 UTC 2023 kill -USR1 14696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14696 killed at Wed Oct 18 14:06:19 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14748 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14748 found at Wed Oct 18 14:06:19 UTC 2023 selfserv_9355 with PID 14748 started at Wed Oct 18 14:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14748 at Wed Oct 18 14:06:20 UTC 2023 kill -USR1 14748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14748 killed at Wed Oct 18 14:06:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14814 found at Wed Oct 18 14:06:20 UTC 2023 selfserv_9355 with PID 14814 started at Wed Oct 18 14:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14814 at Wed Oct 18 14:06:20 UTC 2023 kill -USR1 14814 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14814 killed at Wed Oct 18 14:06:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14866 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14866 found at Wed Oct 18 14:06:21 UTC 2023 selfserv_9355 with PID 14866 started at Wed Oct 18 14:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14866 at Wed Oct 18 14:06:21 UTC 2023 kill -USR1 14866 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14866 killed at Wed Oct 18 14:06:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14920 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14920 found at Wed Oct 18 14:06:21 UTC 2023 selfserv_9355 with PID 14920 started at Wed Oct 18 14:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14920 at Wed Oct 18 14:06:22 UTC 2023 kill -USR1 14920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14920 killed at Wed Oct 18 14:06:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14988 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14988 found at Wed Oct 18 14:06:22 UTC 2023 selfserv_9355 with PID 14988 started at Wed Oct 18 14:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14988 at Wed Oct 18 14:06:23 UTC 2023 kill -USR1 14988 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14988 killed at Wed Oct 18 14:06:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15040 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15040 found at Wed Oct 18 14:06:23 UTC 2023 selfserv_9355 with PID 15040 started at Wed Oct 18 14:06:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15040 at Wed Oct 18 14:06:23 UTC 2023 kill -USR1 15040 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15040 killed at Wed Oct 18 14:06:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15092 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15092 found at Wed Oct 18 14:06:24 UTC 2023 selfserv_9355 with PID 15092 started at Wed Oct 18 14:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15092 at Wed Oct 18 14:06:24 UTC 2023 kill -USR1 15092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15092 killed at Wed Oct 18 14:06:24 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15160 found at Wed Oct 18 14:06:24 UTC 2023 selfserv_9355 with PID 15160 started at Wed Oct 18 14:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15160 at Wed Oct 18 14:06:25 UTC 2023 kill -USR1 15160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15160 killed at Wed Oct 18 14:06:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15212 found at Wed Oct 18 14:06:25 UTC 2023 selfserv_9355 with PID 15212 started at Wed Oct 18 14:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15212 at Wed Oct 18 14:06:26 UTC 2023 kill -USR1 15212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15212 killed at Wed Oct 18 14:06:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15264 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15264 found at Wed Oct 18 14:06:26 UTC 2023 selfserv_9355 with PID 15264 started at Wed Oct 18 14:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15264 at Wed Oct 18 14:06:26 UTC 2023 kill -USR1 15264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15264 killed at Wed Oct 18 14:06:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15330 found at Wed Oct 18 14:06:27 UTC 2023 selfserv_9355 with PID 15330 started at Wed Oct 18 14:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15330 at Wed Oct 18 14:06:27 UTC 2023 kill -USR1 15330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15330 killed at Wed Oct 18 14:06:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15382 found at Wed Oct 18 14:06:27 UTC 2023 selfserv_9355 with PID 15382 started at Wed Oct 18 14:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15382 at Wed Oct 18 14:06:28 UTC 2023 kill -USR1 15382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15382 killed at Wed Oct 18 14:06:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15434 found at Wed Oct 18 14:06:28 UTC 2023 selfserv_9355 with PID 15434 started at Wed Oct 18 14:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15434 at Wed Oct 18 14:06:29 UTC 2023 kill -USR1 15434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15434 killed at Wed Oct 18 14:06:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15500 found at Wed Oct 18 14:06:29 UTC 2023 selfserv_9355 with PID 15500 started at Wed Oct 18 14:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15500 at Wed Oct 18 14:06:29 UTC 2023 kill -USR1 15500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15500 killed at Wed Oct 18 14:06:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15552 found at Wed Oct 18 14:06:30 UTC 2023 selfserv_9355 with PID 15552 started at Wed Oct 18 14:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15552 at Wed Oct 18 14:06:30 UTC 2023 kill -USR1 15552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15552 killed at Wed Oct 18 14:06:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15604 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15604 found at Wed Oct 18 14:06:30 UTC 2023 selfserv_9355 with PID 15604 started at Wed Oct 18 14:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15604 at Wed Oct 18 14:06:31 UTC 2023 kill -USR1 15604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15604 killed at Wed Oct 18 14:06:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15670 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15670 found at Wed Oct 18 14:06:31 UTC 2023 selfserv_9355 with PID 15670 started at Wed Oct 18 14:06:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15670 at Wed Oct 18 14:06:32 UTC 2023 kill -USR1 15670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15670 killed at Wed Oct 18 14:06:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15722 found at Wed Oct 18 14:06:32 UTC 2023 selfserv_9355 with PID 15722 started at Wed Oct 18 14:06:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15722 at Wed Oct 18 14:06:33 UTC 2023 kill -USR1 15722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15722 killed at Wed Oct 18 14:06:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15774 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15774 found at Wed Oct 18 14:06:33 UTC 2023 selfserv_9355 with PID 15774 started at Wed Oct 18 14:06:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15774 at Wed Oct 18 14:06:33 UTC 2023 kill -USR1 15774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15774 killed at Wed Oct 18 14:06:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15840 found at Wed Oct 18 14:06:34 UTC 2023 selfserv_9355 with PID 15840 started at Wed Oct 18 14:06:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15840 at Wed Oct 18 14:06:34 UTC 2023 kill -USR1 15840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15840 killed at Wed Oct 18 14:06:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15892 found at Wed Oct 18 14:06:34 UTC 2023 selfserv_9355 with PID 15892 started at Wed Oct 18 14:06:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15892 at Wed Oct 18 14:06:35 UTC 2023 kill -USR1 15892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15892 killed at Wed Oct 18 14:06:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15944 found at Wed Oct 18 14:06:35 UTC 2023 selfserv_9355 with PID 15944 started at Wed Oct 18 14:06:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15944 at Wed Oct 18 14:06:35 UTC 2023 kill -USR1 15944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15944 killed at Wed Oct 18 14:06:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16010 found at Wed Oct 18 14:06:36 UTC 2023 selfserv_9355 with PID 16010 started at Wed Oct 18 14:06:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16010 at Wed Oct 18 14:06:36 UTC 2023 kill -USR1 16010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16010 killed at Wed Oct 18 14:06:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16062 found at Wed Oct 18 14:06:36 UTC 2023 selfserv_9355 with PID 16062 started at Wed Oct 18 14:06:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16062 at Wed Oct 18 14:06:37 UTC 2023 kill -USR1 16062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16062 killed at Wed Oct 18 14:06:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16114 found at Wed Oct 18 14:06:37 UTC 2023 selfserv_9355 with PID 16114 started at Wed Oct 18 14:06:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16114 at Wed Oct 18 14:06:38 UTC 2023 kill -USR1 16114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16114 killed at Wed Oct 18 14:06:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16180 found at Wed Oct 18 14:06:38 UTC 2023 selfserv_9355 with PID 16180 started at Wed Oct 18 14:06:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16180 at Wed Oct 18 14:06:38 UTC 2023 kill -USR1 16180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16180 killed at Wed Oct 18 14:06:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16232 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16232 found at Wed Oct 18 14:06:39 UTC 2023 selfserv_9355 with PID 16232 started at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16232 at Wed Oct 18 14:06:39 UTC 2023 kill -USR1 16232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16232 killed at Wed Oct 18 14:06:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16284 found at Wed Oct 18 14:06:39 UTC 2023 selfserv_9355 with PID 16284 started at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16284 at Wed Oct 18 14:06:39 UTC 2023 kill -USR1 16284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16284 killed at Wed Oct 18 14:06:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16350 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16350 found at Wed Oct 18 14:06:40 UTC 2023 selfserv_9355 with PID 16350 started at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16350 at Wed Oct 18 14:06:40 UTC 2023 kill -USR1 16350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16350 killed at Wed Oct 18 14:06:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16402 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16402 found at Wed Oct 18 14:06:40 UTC 2023 selfserv_9355 with PID 16402 started at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16402 at Wed Oct 18 14:06:41 UTC 2023 kill -USR1 16402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16402 killed at Wed Oct 18 14:06:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16454 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16454 found at Wed Oct 18 14:06:41 UTC 2023 selfserv_9355 with PID 16454 started at Wed Oct 18 14:06:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16454 at Wed Oct 18 14:06:41 UTC 2023 kill -USR1 16454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16454 killed at Wed Oct 18 14:06:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16520 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16520 found at Wed Oct 18 14:06:42 UTC 2023 selfserv_9355 with PID 16520 started at Wed Oct 18 14:06:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16520 at Wed Oct 18 14:06:42 UTC 2023 kill -USR1 16520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16520 killed at Wed Oct 18 14:06:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16572 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16572 found at Wed Oct 18 14:06:42 UTC 2023 selfserv_9355 with PID 16572 started at Wed Oct 18 14:06:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16572 at Wed Oct 18 14:06:43 UTC 2023 kill -USR1 16572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16572 killed at Wed Oct 18 14:06:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:06:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16624 found at Wed Oct 18 14:06:43 UTC 2023 selfserv_9355 with PID 16624 started at Wed Oct 18 14:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16624 at Wed Oct 18 14:06:43 UTC 2023 kill -USR1 16624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16624 killed at Wed Oct 18 14:06:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16690 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16690 found at Wed Oct 18 14:06:43 UTC 2023 selfserv_9355 with PID 16690 started at Wed Oct 18 14:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16690 at Wed Oct 18 14:06:44 UTC 2023 kill -USR1 16690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16690 killed at Wed Oct 18 14:06:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16742 found at Wed Oct 18 14:06:44 UTC 2023 selfserv_9355 with PID 16742 started at Wed Oct 18 14:06:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16742 at Wed Oct 18 14:06:44 UTC 2023 kill -USR1 16742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16742 killed at Wed Oct 18 14:06:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16794 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16794 found at Wed Oct 18 14:06:45 UTC 2023 selfserv_9355 with PID 16794 started at Wed Oct 18 14:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16794 at Wed Oct 18 14:06:45 UTC 2023 kill -USR1 16794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16794 killed at Wed Oct 18 14:06:45 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16860 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16860 found at Wed Oct 18 14:06:45 UTC 2023 selfserv_9355 with PID 16860 started at Wed Oct 18 14:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16860 at Wed Oct 18 14:06:46 UTC 2023 kill -USR1 16860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16860 killed at Wed Oct 18 14:06:46 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16912 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16912 found at Wed Oct 18 14:06:46 UTC 2023 selfserv_9355 with PID 16912 started at Wed Oct 18 14:06:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16912 at Wed Oct 18 14:06:47 UTC 2023 kill -USR1 16912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16912 killed at Wed Oct 18 14:06:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16964 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16964 found at Wed Oct 18 14:06:47 UTC 2023 selfserv_9355 with PID 16964 started at Wed Oct 18 14:06:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16964 at Wed Oct 18 14:06:47 UTC 2023 kill -USR1 16964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16964 killed at Wed Oct 18 14:06:48 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17030 found at Wed Oct 18 14:06:48 UTC 2023 selfserv_9355 with PID 17030 started at Wed Oct 18 14:06:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17030 at Wed Oct 18 14:06:48 UTC 2023 kill -USR1 17030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17030 killed at Wed Oct 18 14:06:48 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17082 found at Wed Oct 18 14:06:48 UTC 2023 selfserv_9355 with PID 17082 started at Wed Oct 18 14:06:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17082 at Wed Oct 18 14:06:49 UTC 2023 kill -USR1 17082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17082 killed at Wed Oct 18 14:06:49 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:06:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17134 found at Wed Oct 18 14:06:49 UTC 2023 selfserv_9355 with PID 17134 started at Wed Oct 18 14:06:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17134 at Wed Oct 18 14:06:49 UTC 2023 kill -USR1 17134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17134 killed at Wed Oct 18 14:06:50 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9355 starting at Wed Oct 18 14:06:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:06:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:50 UTC 2023 selfserv_9355 with PID 17205 started at Wed Oct 18 14:06:50 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:50 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:50 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:51 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:51 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:51 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:52 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:52 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:52 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:53 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:53 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:53 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:54 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:54 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:55 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:55 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:55 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:55 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:56 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:56 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:56 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:57 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:57 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:57 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:58 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:58 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:58 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:59 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:59 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:06:59 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:00 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:00 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:00 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:01 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:01 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:01 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:01 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:02 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:02 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17205 found at Wed Oct 18 14:07:02 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17205 at Wed Oct 18 14:07:02 UTC 2023 kill -USR1 17205 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17205 killed at Wed Oct 18 14:07:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:07:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:03 UTC 2023 selfserv_9355 with PID 18463 started at Wed Oct 18 14:07:03 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:03 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:03 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:03 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:04 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:04 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:04 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:05 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:05 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:05 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:05 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:06 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:06 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:06 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:07 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:07 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:07 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:07 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:08 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:08 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:08 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:08 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:09 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:09 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:09 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:10 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:10 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:10 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:11 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:11 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:11 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:11 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:11 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:12 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:12 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:12 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:12 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:13 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:13 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18463 found at Wed Oct 18 14:07:13 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18463 at Wed Oct 18 14:07:13 UTC 2023 kill -USR1 18463 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18463 killed at Wed Oct 18 14:07:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:07:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:13 UTC 2023 selfserv_9355 with PID 19728 started at Wed Oct 18 14:07:13 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:14 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:14 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:14 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:15 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:15 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:15 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:16 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:16 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:16 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:17 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:17 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:18 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:18 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:18 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:19 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:19 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:19 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:20 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:20 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:20 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:21 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:21 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:21 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:22 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:22 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:22 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:23 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:23 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:23 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:24 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:24 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:24 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:25 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:25 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:25 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:25 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:26 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:26 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19728 found at Wed Oct 18 14:07:26 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19728 at Wed Oct 18 14:07:26 UTC 2023 kill -USR1 19728 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19728 killed at Wed Oct 18 14:07:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:07:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:27 UTC 2023 selfserv_9355 with PID 20997 started at Wed Oct 18 14:07:27 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:27 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:27 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:27 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:30 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:30 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:31 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:31 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:31 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:31 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:31 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:32 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:32 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:32 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:32 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:33 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:33 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:33 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:33 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:34 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:34 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:34 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:35 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:35 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:35 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:35 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:36 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:36 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:36 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:36 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:37 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20997 found at Wed Oct 18 14:07:37 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20997 at Wed Oct 18 14:07:37 UTC 2023 kill -USR1 20997 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20997 killed at Wed Oct 18 14:07:37 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:07:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22255 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22255 found at Wed Oct 18 14:07:37 UTC 2023 selfserv_9355 with PID 22255 started at Wed Oct 18 14:07:37 UTC 2023 trying to kill selfserv_9355 with PID 22255 at Wed Oct 18 14:07:37 UTC 2023 kill -USR1 22255 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22255 killed at Wed Oct 18 14:07:37 UTC 2023 selfserv_9355 starting at Wed Oct 18 14:07:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:37 UTC 2023 selfserv_9355 with PID 22297 started at Wed Oct 18 14:07:37 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:38 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:38 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:39 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:39 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:39 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:40 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:40 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:41 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:41 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:42 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:42 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:43 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:43 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:44 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:44 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:45 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:45 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:46 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:46 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:46 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:47 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:47 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:48 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:48 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:49 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:49 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:50 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:50 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:51 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:51 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:52 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:52 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:52 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:53 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:53 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:54 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:54 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:54 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22297 found at Wed Oct 18 14:07:55 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22297 at Wed Oct 18 14:07:55 UTC 2023 kill -USR1 22297 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22297 killed at Wed Oct 18 14:07:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:07:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:55 UTC 2023 selfserv_9355 with PID 23556 started at Wed Oct 18 14:07:55 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:56 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:56 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:57 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:57 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:58 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:58 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:59 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:59 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:07:59 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:00 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:00 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:01 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:01 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:02 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:03 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:03 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:04 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:04 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:05 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:05 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:06 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:06 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:06 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:07 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:07 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:08 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:09 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:09 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:10 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:10 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:11 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:11 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:12 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:12 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:12 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:13 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:13 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:14 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23556 found at Wed Oct 18 14:08:14 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23556 at Wed Oct 18 14:08:14 UTC 2023 kill -USR1 23556 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23556 killed at Wed Oct 18 14:08:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:15 UTC 2023 selfserv_9355 with PID 24814 started at Wed Oct 18 14:08:15 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:15 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:15 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:16 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:16 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:16 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:17 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:17 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:17 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:18 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:18 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:18 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:19 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:19 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:20 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:20 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:20 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:21 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:21 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:21 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:22 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:22 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:22 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:23 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:23 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:23 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:24 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:24 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:25 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:25 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:25 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:26 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:26 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:26 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:26 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:27 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:27 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:27 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:28 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24814 found at Wed Oct 18 14:08:28 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24814 at Wed Oct 18 14:08:28 UTC 2023 kill -USR1 24814 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24814 killed at Wed Oct 18 14:08:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:08:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:08:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:28 UTC 2023 selfserv_9355 with PID 26083 started at Wed Oct 18 14:08:28 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:29 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:29 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:30 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:30 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:31 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:31 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:32 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:32 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:32 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:33 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:33 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:34 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:34 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:35 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:36 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:36 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:36 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:37 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:37 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:38 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:38 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:39 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:39 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:39 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:40 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:40 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:41 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:42 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:42 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:43 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:43 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:43 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:44 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:44 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:45 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:45 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:45 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:46 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26083 found at Wed Oct 18 14:08:46 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26083 at Wed Oct 18 14:08:46 UTC 2023 kill -USR1 26083 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26083 killed at Wed Oct 18 14:08:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:08:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:47 UTC 2023 selfserv_9355 with PID 27342 started at Wed Oct 18 14:08:47 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:47 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:48 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:48 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:49 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:49 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:50 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:50 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:51 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:51 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:52 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:52 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:53 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:53 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:54 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:54 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:55 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:55 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:56 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:56 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:57 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:57 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:58 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:58 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:59 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:08:59 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:00 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:01 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:01 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:01 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:02 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:02 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:03 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:03 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:04 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:04 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:05 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:05 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:06 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 14:09:06 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27342 at Wed Oct 18 14:09:06 UTC 2023 kill -USR1 27342 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27342 killed at Wed Oct 18 14:09:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:09:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:06 UTC 2023 selfserv_9355 with PID 28605 started at Wed Oct 18 14:09:06 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:07 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:07 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:07 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:08 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:08 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:08 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:09 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:09 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:09 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:10 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:10 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:10 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:11 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:12 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:12 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:12 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:13 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:13 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:13 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:14 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:14 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:14 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:15 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:15 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:15 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:16 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:16 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:17 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:17 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:17 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:18 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:18 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:18 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:19 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:19 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:19 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:19 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:20 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28605 found at Wed Oct 18 14:09:20 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28605 at Wed Oct 18 14:09:20 UTC 2023 kill -USR1 28605 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28605 killed at Wed Oct 18 14:09:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:09:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29868 found at Wed Oct 18 14:09:20 UTC 2023 selfserv_9355 with PID 29868 started at Wed Oct 18 14:09:20 UTC 2023 trying to kill selfserv_9355 with PID 29868 at Wed Oct 18 14:09:20 UTC 2023 kill -USR1 29868 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29868 killed at Wed Oct 18 14:09:21 UTC 2023 selfserv_9355 starting at Wed Oct 18 14:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:21 UTC 2023 selfserv_9355 with PID 29910 started at Wed Oct 18 14:09:21 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:21 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:22 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:22 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:22 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:23 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:23 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:24 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:24 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:25 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:25 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:26 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:26 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:26 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:27 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:28 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:28 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:29 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:29 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:29 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:32 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:32 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:32 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:33 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:34 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:34 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:35 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:35 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:35 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:36 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:36 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:37 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:37 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:38 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:38 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29910 found at Wed Oct 18 14:09:38 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29910 at Wed Oct 18 14:09:38 UTC 2023 kill -USR1 29910 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29910 killed at Wed Oct 18 14:09:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:09:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:09:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:39 UTC 2023 selfserv_9355 with PID 31174 started at Wed Oct 18 14:09:39 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:39 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:40 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:40 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:41 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:41 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:42 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:42 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:42 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:43 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:43 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:44 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:44 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:45 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:45 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:46 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:46 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:47 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:47 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:48 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:48 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:49 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:49 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:49 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:50 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:50 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:51 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:51 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:52 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:53 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:53 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:54 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:54 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:55 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:55 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:56 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:56 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:56 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:57 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:57 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31174 found at Wed Oct 18 14:09:58 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31174 at Wed Oct 18 14:09:58 UTC 2023 kill -USR1 31174 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31174 killed at Wed Oct 18 14:09:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:09:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:09:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:09:58 UTC 2023 selfserv_9355 with PID 32432 started at Wed Oct 18 14:09:58 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:09:59 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:09:59 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:09:59 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:09:59 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:00 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:00 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:00 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:01 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:01 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:01 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:02 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:02 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:02 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:03 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:05 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:05 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:05 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:06 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:06 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:06 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:07 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:07 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:08 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:08 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:08 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:09 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:09 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:09 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:10 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:10 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:10 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:11 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:11 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:11 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 14:10:12 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32432 at Wed Oct 18 14:10:12 UTC 2023 kill -USR1 32432 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32432 killed at Wed Oct 18 14:10:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:10:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:12 UTC 2023 selfserv_9355 with PID 1283 started at Wed Oct 18 14:10:12 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:12 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:13 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:13 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:14 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:14 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:15 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:15 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:16 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:16 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:17 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:17 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:17 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:18 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:19 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:19 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:20 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:20 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:20 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:21 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:21 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:22 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:22 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:23 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:23 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:24 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:24 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:25 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:25 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:26 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:26 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:27 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:27 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:27 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:28 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:28 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:29 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:29 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:30 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1283 found at Wed Oct 18 14:10:30 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1283 at Wed Oct 18 14:10:30 UTC 2023 kill -USR1 1283 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1283 killed at Wed Oct 18 14:10:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:10:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:10:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:30 UTC 2023 selfserv_9355 with PID 2553 started at Wed Oct 18 14:10:30 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:31 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:31 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:32 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:32 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:33 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:33 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:34 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:34 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:35 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:35 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:36 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:36 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:37 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:37 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:38 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:38 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:38 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:39 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:39 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:40 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:40 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:41 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:41 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:42 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:42 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:43 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:43 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:44 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:45 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:45 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:46 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:46 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:46 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:47 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:47 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:48 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:48 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:49 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:49 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2553 found at Wed Oct 18 14:10:50 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2553 at Wed Oct 18 14:10:50 UTC 2023 kill -USR1 2553 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2553 killed at Wed Oct 18 14:10:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:50 UTC 2023 selfserv_9355 with PID 3811 started at Wed Oct 18 14:10:50 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:50 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:51 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:51 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:51 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:52 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:52 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:52 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:54 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:54 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:54 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:55 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:55 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:56 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:56 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:56 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:57 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:57 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:57 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:57 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:58 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:58 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:59 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:59 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:10:59 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:00 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:00 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:01 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:01 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:01 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:02 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:02 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:02 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:03 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:03 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:03 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:04 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3811 found at Wed Oct 18 14:11:04 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3811 at Wed Oct 18 14:11:04 UTC 2023 kill -USR1 3811 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3811 killed at Wed Oct 18 14:11:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5070 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5070 found at Wed Oct 18 14:11:04 UTC 2023 selfserv_9355 with PID 5070 started at Wed Oct 18 14:11:04 UTC 2023 trying to kill selfserv_9355 with PID 5070 at Wed Oct 18 14:11:04 UTC 2023 kill -USR1 5070 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5070 killed at Wed Oct 18 14:11:04 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:11:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 5115 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5115 found at Wed Oct 18 14:11:04 UTC 2023 selfserv_9355 with PID 5115 started at Wed Oct 18 14:11:04 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 5115 at Wed Oct 18 14:11:13 UTC 2023 kill -USR1 5115 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5115 killed at Wed Oct 18 14:11:13 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:11:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 5668 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5668 found at Wed Oct 18 14:11:13 UTC 2023 selfserv_9355 with PID 5668 started at Wed Oct 18 14:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5668 at Wed Oct 18 14:11:27 UTC 2023 kill -USR1 5668 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5668 killed at Wed Oct 18 14:11:28 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:11:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6476 found at Wed Oct 18 14:11:28 UTC 2023 selfserv_9355 with PID 6476 started at Wed Oct 18 14:11:28 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6476 at Wed Oct 18 14:11:28 UTC 2023 kill -USR1 6476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6476 killed at Wed Oct 18 14:11:28 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6542 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6542 found at Wed Oct 18 14:11:28 UTC 2023 selfserv_9355 with PID 6542 started at Wed Oct 18 14:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6542 at Wed Oct 18 14:11:29 UTC 2023 kill -USR1 6542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6542 killed at Wed Oct 18 14:11:29 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6594 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6594 found at Wed Oct 18 14:11:29 UTC 2023 selfserv_9355 with PID 6594 started at Wed Oct 18 14:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6594 at Wed Oct 18 14:11:29 UTC 2023 kill -USR1 6594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6594 killed at Wed Oct 18 14:11:30 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6646 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6646 found at Wed Oct 18 14:11:30 UTC 2023 selfserv_9355 with PID 6646 started at Wed Oct 18 14:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6646 at Wed Oct 18 14:11:30 UTC 2023 kill -USR1 6646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6646 killed at Wed Oct 18 14:11:30 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6698 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6698 found at Wed Oct 18 14:11:30 UTC 2023 selfserv_9355 with PID 6698 started at Wed Oct 18 14:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6698 at Wed Oct 18 14:11:31 UTC 2023 kill -USR1 6698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6698 killed at Wed Oct 18 14:11:31 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6750 found at Wed Oct 18 14:11:31 UTC 2023 selfserv_9355 with PID 6750 started at Wed Oct 18 14:11:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6750 at Wed Oct 18 14:11:31 UTC 2023 kill -USR1 6750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6750 killed at Wed Oct 18 14:11:32 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6802 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6802 found at Wed Oct 18 14:11:32 UTC 2023 selfserv_9355 with PID 6802 started at Wed Oct 18 14:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6802 at Wed Oct 18 14:11:32 UTC 2023 kill -USR1 6802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6802 killed at Wed Oct 18 14:11:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6854 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6854 found at Wed Oct 18 14:11:32 UTC 2023 selfserv_9355 with PID 6854 started at Wed Oct 18 14:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6854 at Wed Oct 18 14:11:33 UTC 2023 kill -USR1 6854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6854 killed at Wed Oct 18 14:11:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6906 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6906 found at Wed Oct 18 14:11:33 UTC 2023 selfserv_9355 with PID 6906 started at Wed Oct 18 14:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6906 at Wed Oct 18 14:11:33 UTC 2023 kill -USR1 6906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6906 killed at Wed Oct 18 14:11:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6958 found at Wed Oct 18 14:11:34 UTC 2023 selfserv_9355 with PID 6958 started at Wed Oct 18 14:11:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6958 at Wed Oct 18 14:11:34 UTC 2023 kill -USR1 6958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6958 killed at Wed Oct 18 14:11:34 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7010 found at Wed Oct 18 14:11:34 UTC 2023 selfserv_9355 with PID 7010 started at Wed Oct 18 14:11:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7010 at Wed Oct 18 14:11:34 UTC 2023 kill -USR1 7010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7010 killed at Wed Oct 18 14:11:35 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7062 found at Wed Oct 18 14:11:35 UTC 2023 selfserv_9355 with PID 7062 started at Wed Oct 18 14:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7062 at Wed Oct 18 14:11:35 UTC 2023 kill -USR1 7062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7062 killed at Wed Oct 18 14:11:35 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7114 found at Wed Oct 18 14:11:35 UTC 2023 selfserv_9355 with PID 7114 started at Wed Oct 18 14:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7114 at Wed Oct 18 14:11:36 UTC 2023 kill -USR1 7114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7114 killed at Wed Oct 18 14:11:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7166 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7166 found at Wed Oct 18 14:11:36 UTC 2023 selfserv_9355 with PID 7166 started at Wed Oct 18 14:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7166 at Wed Oct 18 14:11:36 UTC 2023 kill -USR1 7166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7166 killed at Wed Oct 18 14:11:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7218 found at Wed Oct 18 14:11:37 UTC 2023 selfserv_9355 with PID 7218 started at Wed Oct 18 14:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7218 at Wed Oct 18 14:11:37 UTC 2023 kill -USR1 7218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7218 killed at Wed Oct 18 14:11:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7270 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7270 found at Wed Oct 18 14:11:37 UTC 2023 selfserv_9355 with PID 7270 started at Wed Oct 18 14:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7270 at Wed Oct 18 14:11:38 UTC 2023 kill -USR1 7270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7270 killed at Wed Oct 18 14:11:38 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7323 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7323 found at Wed Oct 18 14:11:38 UTC 2023 selfserv_9355 with PID 7323 started at Wed Oct 18 14:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7323 at Wed Oct 18 14:11:39 UTC 2023 kill -USR1 7323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7323 killed at Wed Oct 18 14:11:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7375 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7375 found at Wed Oct 18 14:11:39 UTC 2023 selfserv_9355 with PID 7375 started at Wed Oct 18 14:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7375 at Wed Oct 18 14:11:40 UTC 2023 kill -USR1 7375 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7375 killed at Wed Oct 18 14:11:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7427 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7427 found at Wed Oct 18 14:11:40 UTC 2023 selfserv_9355 with PID 7427 started at Wed Oct 18 14:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7427 at Wed Oct 18 14:11:40 UTC 2023 kill -USR1 7427 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7427 killed at Wed Oct 18 14:11:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7479 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7479 found at Wed Oct 18 14:11:41 UTC 2023 selfserv_9355 with PID 7479 started at Wed Oct 18 14:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7479 at Wed Oct 18 14:11:41 UTC 2023 kill -USR1 7479 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7479 killed at Wed Oct 18 14:11:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7531 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7531 found at Wed Oct 18 14:11:41 UTC 2023 selfserv_9355 with PID 7531 started at Wed Oct 18 14:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7531 at Wed Oct 18 14:11:42 UTC 2023 kill -USR1 7531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7531 killed at Wed Oct 18 14:11:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7583 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7583 found at Wed Oct 18 14:11:42 UTC 2023 selfserv_9355 with PID 7583 started at Wed Oct 18 14:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7583 at Wed Oct 18 14:11:43 UTC 2023 kill -USR1 7583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7583 killed at Wed Oct 18 14:11:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7635 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7635 found at Wed Oct 18 14:11:43 UTC 2023 selfserv_9355 with PID 7635 started at Wed Oct 18 14:11:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7635 at Wed Oct 18 14:11:44 UTC 2023 kill -USR1 7635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7635 killed at Wed Oct 18 14:11:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7687 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7687 found at Wed Oct 18 14:11:44 UTC 2023 selfserv_9355 with PID 7687 started at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7687 at Wed Oct 18 14:11:44 UTC 2023 kill -USR1 7687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7687 killed at Wed Oct 18 14:11:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7739 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7739 found at Wed Oct 18 14:11:45 UTC 2023 selfserv_9355 with PID 7739 started at Wed Oct 18 14:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7739 at Wed Oct 18 14:11:45 UTC 2023 kill -USR1 7739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7739 killed at Wed Oct 18 14:11:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7791 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7791 found at Wed Oct 18 14:11:45 UTC 2023 selfserv_9355 with PID 7791 started at Wed Oct 18 14:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7791 at Wed Oct 18 14:11:46 UTC 2023 kill -USR1 7791 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7791 killed at Wed Oct 18 14:11:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7843 found at Wed Oct 18 14:11:46 UTC 2023 selfserv_9355 with PID 7843 started at Wed Oct 18 14:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7843 at Wed Oct 18 14:11:46 UTC 2023 kill -USR1 7843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7843 killed at Wed Oct 18 14:11:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7895 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7895 found at Wed Oct 18 14:11:47 UTC 2023 selfserv_9355 with PID 7895 started at Wed Oct 18 14:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7895 at Wed Oct 18 14:11:47 UTC 2023 kill -USR1 7895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7895 killed at Wed Oct 18 14:11:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7947 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7947 found at Wed Oct 18 14:11:47 UTC 2023 selfserv_9355 with PID 7947 started at Wed Oct 18 14:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7947 at Wed Oct 18 14:11:48 UTC 2023 kill -USR1 7947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7947 killed at Wed Oct 18 14:11:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7999 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7999 found at Wed Oct 18 14:11:48 UTC 2023 selfserv_9355 with PID 7999 started at Wed Oct 18 14:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7999 at Wed Oct 18 14:11:48 UTC 2023 kill -USR1 7999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7999 killed at Wed Oct 18 14:11:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8051 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8051 found at Wed Oct 18 14:11:49 UTC 2023 selfserv_9355 with PID 8051 started at Wed Oct 18 14:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8051 at Wed Oct 18 14:11:49 UTC 2023 kill -USR1 8051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8051 killed at Wed Oct 18 14:11:49 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8103 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8103 found at Wed Oct 18 14:11:49 UTC 2023 selfserv_9355 with PID 8103 started at Wed Oct 18 14:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8103 at Wed Oct 18 14:11:49 UTC 2023 kill -USR1 8103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8103 killed at Wed Oct 18 14:11:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8155 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8155 found at Wed Oct 18 14:11:50 UTC 2023 selfserv_9355 with PID 8155 started at Wed Oct 18 14:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8155 at Wed Oct 18 14:11:50 UTC 2023 kill -USR1 8155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8155 killed at Wed Oct 18 14:11:50 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8207 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8207 found at Wed Oct 18 14:11:50 UTC 2023 selfserv_9355 with PID 8207 started at Wed Oct 18 14:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8207 at Wed Oct 18 14:11:51 UTC 2023 kill -USR1 8207 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8207 killed at Wed Oct 18 14:11:51 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8259 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8259 found at Wed Oct 18 14:11:51 UTC 2023 selfserv_9355 with PID 8259 started at Wed Oct 18 14:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8259 at Wed Oct 18 14:11:51 UTC 2023 kill -USR1 8259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8259 killed at Wed Oct 18 14:11:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8311 found at Wed Oct 18 14:11:52 UTC 2023 selfserv_9355 with PID 8311 started at Wed Oct 18 14:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8311 at Wed Oct 18 14:11:52 UTC 2023 kill -USR1 8311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8311 killed at Wed Oct 18 14:11:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8363 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8363 found at Wed Oct 18 14:11:52 UTC 2023 selfserv_9355 with PID 8363 started at Wed Oct 18 14:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8363 at Wed Oct 18 14:11:52 UTC 2023 kill -USR1 8363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8363 killed at Wed Oct 18 14:11:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8415 found at Wed Oct 18 14:11:53 UTC 2023 selfserv_9355 with PID 8415 started at Wed Oct 18 14:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8415 at Wed Oct 18 14:11:53 UTC 2023 kill -USR1 8415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8415 killed at Wed Oct 18 14:11:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8467 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8467 found at Wed Oct 18 14:11:53 UTC 2023 selfserv_9355 with PID 8467 started at Wed Oct 18 14:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8467 at Wed Oct 18 14:11:54 UTC 2023 kill -USR1 8467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8467 killed at Wed Oct 18 14:11:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8519 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8519 found at Wed Oct 18 14:11:54 UTC 2023 selfserv_9355 with PID 8519 started at Wed Oct 18 14:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8519 at Wed Oct 18 14:11:54 UTC 2023 kill -USR1 8519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8519 killed at Wed Oct 18 14:11:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8571 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8571 found at Wed Oct 18 14:11:54 UTC 2023 selfserv_9355 with PID 8571 started at Wed Oct 18 14:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8571 at Wed Oct 18 14:11:55 UTC 2023 kill -USR1 8571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8571 killed at Wed Oct 18 14:11:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8623 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8623 found at Wed Oct 18 14:11:55 UTC 2023 selfserv_9355 with PID 8623 started at Wed Oct 18 14:11:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8623 at Wed Oct 18 14:11:55 UTC 2023 kill -USR1 8623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8623 killed at Wed Oct 18 14:11:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8675 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8675 found at Wed Oct 18 14:11:56 UTC 2023 selfserv_9355 with PID 8675 started at Wed Oct 18 14:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8675 at Wed Oct 18 14:11:56 UTC 2023 kill -USR1 8675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8675 killed at Wed Oct 18 14:11:56 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8727 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8727 found at Wed Oct 18 14:11:56 UTC 2023 selfserv_9355 with PID 8727 started at Wed Oct 18 14:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8727 at Wed Oct 18 14:11:56 UTC 2023 kill -USR1 8727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8727 killed at Wed Oct 18 14:11:57 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8779 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8779 found at Wed Oct 18 14:11:57 UTC 2023 selfserv_9355 with PID 8779 started at Wed Oct 18 14:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8779 at Wed Oct 18 14:11:57 UTC 2023 kill -USR1 8779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8779 killed at Wed Oct 18 14:11:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8831 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8831 found at Wed Oct 18 14:11:57 UTC 2023 selfserv_9355 with PID 8831 started at Wed Oct 18 14:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8831 at Wed Oct 18 14:11:58 UTC 2023 kill -USR1 8831 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8831 killed at Wed Oct 18 14:11:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8883 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8883 found at Wed Oct 18 14:11:58 UTC 2023 selfserv_9355 with PID 8883 started at Wed Oct 18 14:11:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8883 at Wed Oct 18 14:11:59 UTC 2023 kill -USR1 8883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8883 killed at Wed Oct 18 14:11:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:11:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8935 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8935 found at Wed Oct 18 14:11:59 UTC 2023 selfserv_9355 with PID 8935 started at Wed Oct 18 14:11:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8935 at Wed Oct 18 14:11:59 UTC 2023 kill -USR1 8935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8935 killed at Wed Oct 18 14:11:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:11:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:11:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8987 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8987 found at Wed Oct 18 14:11:59 UTC 2023 selfserv_9355 with PID 8987 started at Wed Oct 18 14:11:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8987 at Wed Oct 18 14:12:00 UTC 2023 kill -USR1 8987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8987 killed at Wed Oct 18 14:12:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:12:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9039 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9039 found at Wed Oct 18 14:12:00 UTC 2023 selfserv_9355 with PID 9039 started at Wed Oct 18 14:12:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9039 at Wed Oct 18 14:12:01 UTC 2023 kill -USR1 9039 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9039 killed at Wed Oct 18 14:12:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9091 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9091 found at Wed Oct 18 14:12:01 UTC 2023 selfserv_9355 with PID 9091 started at Wed Oct 18 14:12:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9091 at Wed Oct 18 14:12:02 UTC 2023 kill -USR1 9091 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9091 killed at Wed Oct 18 14:12:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:12:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9143 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9143 found at Wed Oct 18 14:12:02 UTC 2023 selfserv_9355 with PID 9143 started at Wed Oct 18 14:12:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9143 at Wed Oct 18 14:12:02 UTC 2023 kill -USR1 9143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9143 killed at Wed Oct 18 14:12:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9195 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9195 found at Wed Oct 18 14:12:02 UTC 2023 selfserv_9355 with PID 9195 started at Wed Oct 18 14:12:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9195 at Wed Oct 18 14:12:03 UTC 2023 kill -USR1 9195 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9195 killed at Wed Oct 18 14:12:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:12:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9247 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9247 found at Wed Oct 18 14:12:03 UTC 2023 selfserv_9355 with PID 9247 started at Wed Oct 18 14:12:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9247 at Wed Oct 18 14:12:04 UTC 2023 kill -USR1 9247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9247 killed at Wed Oct 18 14:12:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9299 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9299 found at Wed Oct 18 14:12:04 UTC 2023 selfserv_9355 with PID 9299 started at Wed Oct 18 14:12:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9299 at Wed Oct 18 14:12:04 UTC 2023 kill -USR1 9299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9299 killed at Wed Oct 18 14:12:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:12:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9351 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9351 found at Wed Oct 18 14:12:04 UTC 2023 selfserv_9355 with PID 9351 started at Wed Oct 18 14:12:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9351 at Wed Oct 18 14:12:05 UTC 2023 kill -USR1 9351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9351 killed at Wed Oct 18 14:12:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9403 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9403 found at Wed Oct 18 14:12:05 UTC 2023 selfserv_9355 with PID 9403 started at Wed Oct 18 14:12:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9403 at Wed Oct 18 14:12:06 UTC 2023 kill -USR1 9403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9403 killed at Wed Oct 18 14:12:06 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9455 found at Wed Oct 18 14:12:06 UTC 2023 selfserv_9355 with PID 9455 started at Wed Oct 18 14:12:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9455 at Wed Oct 18 14:12:06 UTC 2023 kill -USR1 9455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9455 killed at Wed Oct 18 14:12:06 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:12:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9507 found at Wed Oct 18 14:12:07 UTC 2023 selfserv_9355 with PID 9507 started at Wed Oct 18 14:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9507 at Wed Oct 18 14:12:07 UTC 2023 kill -USR1 9507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9507 killed at Wed Oct 18 14:12:07 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:12:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9565 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9565 found at Wed Oct 18 14:12:07 UTC 2023 selfserv_9355 with PID 9565 started at Wed Oct 18 14:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9565 at Wed Oct 18 14:12:08 UTC 2023 kill -USR1 9565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9565 killed at Wed Oct 18 14:12:08 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:12:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9623 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9623 found at Wed Oct 18 14:12:08 UTC 2023 selfserv_9355 with PID 9623 started at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9623 at Wed Oct 18 14:12:08 UTC 2023 kill -USR1 9623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9623 killed at Wed Oct 18 14:12:08 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:12:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9681 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9681 found at Wed Oct 18 14:12:08 UTC 2023 selfserv_9355 with PID 9681 started at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9681 at Wed Oct 18 14:12:09 UTC 2023 kill -USR1 9681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9681 killed at Wed Oct 18 14:12:09 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:12:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9739 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9739 found at Wed Oct 18 14:12:09 UTC 2023 selfserv_9355 with PID 9739 started at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9739 at Wed Oct 18 14:12:09 UTC 2023 kill -USR1 9739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9739 killed at Wed Oct 18 14:12:09 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 14:12:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9797 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9797 found at Wed Oct 18 14:12:09 UTC 2023 selfserv_9355 with PID 9797 started at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9797 at Wed Oct 18 14:12:09 UTC 2023 kill -USR1 9797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9797 killed at Wed Oct 18 14:12:10 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:12:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9855 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9855 found at Wed Oct 18 14:12:10 UTC 2023 selfserv_9355 with PID 9855 started at Wed Oct 18 14:12:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9855 at Wed Oct 18 14:12:10 UTC 2023 kill -USR1 9855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9855 killed at Wed Oct 18 14:12:10 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:12:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9913 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9913 found at Wed Oct 18 14:12:10 UTC 2023 selfserv_9355 with PID 9913 started at Wed Oct 18 14:12:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9913 at Wed Oct 18 14:12:11 UTC 2023 kill -USR1 9913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9913 killed at Wed Oct 18 14:12:11 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:12:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9971 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9971 found at Wed Oct 18 14:12:11 UTC 2023 selfserv_9355 with PID 9971 started at Wed Oct 18 14:12:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9971 at Wed Oct 18 14:12:11 UTC 2023 kill -USR1 9971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9971 killed at Wed Oct 18 14:12:11 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:12:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10029 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10029 found at Wed Oct 18 14:12:11 UTC 2023 selfserv_9355 with PID 10029 started at Wed Oct 18 14:12:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10029 at Wed Oct 18 14:12:11 UTC 2023 kill -USR1 10029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10029 killed at Wed Oct 18 14:12:11 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10087 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10087 found at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 with PID 10087 started at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10087 at Wed Oct 18 14:12:12 UTC 2023 kill -USR1 10087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10087 killed at Wed Oct 18 14:12:12 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10129 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10129 found at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 with PID 10129 started at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10129 at Wed Oct 18 14:12:12 UTC 2023 kill -USR1 10129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10129 killed at Wed Oct 18 14:12:12 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10171 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10171 found at Wed Oct 18 14:12:12 UTC 2023 selfserv_9355 with PID 10171 started at Wed Oct 18 14:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 10171 at Wed Oct 18 14:12:13 UTC 2023 kill -USR1 10171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10171 killed at Wed Oct 18 14:12:13 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 14:12:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10213 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10213 found at Wed Oct 18 14:12:13 UTC 2023 selfserv_9355 with PID 10213 started at Wed Oct 18 14:12:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 10213 at Wed Oct 18 14:12:13 UTC 2023 kill -USR1 10213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10213 killed at Wed Oct 18 14:12:13 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 14:12:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10255 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10255 found at Wed Oct 18 14:12:13 UTC 2023 selfserv_9355 with PID 10255 started at Wed Oct 18 14:12:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 10255 at Wed Oct 18 14:12:13 UTC 2023 kill -USR1 10255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10255 killed at Wed Oct 18 14:12:14 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 14:12:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10297 found at Wed Oct 18 14:12:14 UTC 2023 selfserv_9355 with PID 10297 started at Wed Oct 18 14:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 10297 at Wed Oct 18 14:12:14 UTC 2023 kill -USR1 10297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10297 killed at Wed Oct 18 14:12:14 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 14:12:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10339 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10339 found at Wed Oct 18 14:12:14 UTC 2023 selfserv_9355 with PID 10339 started at Wed Oct 18 14:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 10339 at Wed Oct 18 14:12:14 UTC 2023 kill -USR1 10339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10339 killed at Wed Oct 18 14:12:14 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 14:12:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10381 found at Wed Oct 18 14:12:15 UTC 2023 selfserv_9355 with PID 10381 started at Wed Oct 18 14:12:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 10381 at Wed Oct 18 14:12:15 UTC 2023 kill -USR1 10381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10381 killed at Wed Oct 18 14:12:15 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 14:12:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10423 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10423 found at Wed Oct 18 14:12:15 UTC 2023 selfserv_9355 with PID 10423 started at Wed Oct 18 14:12:15 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:12:15 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:12:58 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 10423 at Wed Oct 18 14:12:58 UTC 2023 kill -USR1 10423 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10423 killed at Wed Oct 18 14:12:58 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:12:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10485 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10485 found at Wed Oct 18 14:12:58 UTC 2023 selfserv_9355 with PID 10485 started at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10485 at Wed Oct 18 14:12:58 UTC 2023 kill -USR1 10485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10485 killed at Wed Oct 18 14:12:58 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:12:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10527 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10527 found at Wed Oct 18 14:12:58 UTC 2023 selfserv_9355 with PID 10527 started at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10527 at Wed Oct 18 14:12:59 UTC 2023 kill -USR1 10527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10527 killed at Wed Oct 18 14:12:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:12:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10566 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10566 found at Wed Oct 18 14:12:59 UTC 2023 selfserv_9355 with PID 10566 started at Wed Oct 18 14:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10566 at Wed Oct 18 14:12:59 UTC 2023 kill -USR1 10566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10566 killed at Wed Oct 18 14:12:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:12:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10605 found at Wed Oct 18 14:12:59 UTC 2023 selfserv_9355 with PID 10605 started at Wed Oct 18 14:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10605 at Wed Oct 18 14:12:59 UTC 2023 kill -USR1 10605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10605 killed at Wed Oct 18 14:12:59 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:12:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10644 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10644 found at Wed Oct 18 14:13:00 UTC 2023 selfserv_9355 with PID 10644 started at Wed Oct 18 14:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10644 at Wed Oct 18 14:13:00 UTC 2023 kill -USR1 10644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10644 killed at Wed Oct 18 14:13:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10683 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10683 found at Wed Oct 18 14:13:00 UTC 2023 selfserv_9355 with PID 10683 started at Wed Oct 18 14:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10683 at Wed Oct 18 14:13:00 UTC 2023 kill -USR1 10683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10683 killed at Wed Oct 18 14:13:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10722 found at Wed Oct 18 14:13:00 UTC 2023 selfserv_9355 with PID 10722 started at Wed Oct 18 14:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10722 at Wed Oct 18 14:13:00 UTC 2023 kill -USR1 10722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10722 killed at Wed Oct 18 14:13:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10761 found at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 with PID 10761 started at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10761 at Wed Oct 18 14:13:01 UTC 2023 kill -USR1 10761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10761 killed at Wed Oct 18 14:13:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10800 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10800 found at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 with PID 10800 started at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10800 at Wed Oct 18 14:13:01 UTC 2023 kill -USR1 10800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10800 killed at Wed Oct 18 14:13:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10839 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10839 found at Wed Oct 18 14:13:01 UTC 2023 selfserv_9355 with PID 10839 started at Wed Oct 18 14:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10839 at Wed Oct 18 14:13:02 UTC 2023 kill -USR1 10839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10839 killed at Wed Oct 18 14:13:02 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10878 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10878 found at Wed Oct 18 14:13:02 UTC 2023 selfserv_9355 with PID 10878 started at Wed Oct 18 14:13:02 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10878 at Wed Oct 18 14:13:02 UTC 2023 kill -USR1 10878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10878 killed at Wed Oct 18 14:13:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10918 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10918 found at Wed Oct 18 14:13:02 UTC 2023 selfserv_9355 with PID 10918 started at Wed Oct 18 14:13:02 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10918 at Wed Oct 18 14:13:02 UTC 2023 kill -USR1 10918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10918 killed at Wed Oct 18 14:13:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10958 found at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 with PID 10958 started at Wed Oct 18 14:13:03 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10958 at Wed Oct 18 14:13:03 UTC 2023 kill -USR1 10958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10958 killed at Wed Oct 18 14:13:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10998 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10998 found at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 with PID 10998 started at Wed Oct 18 14:13:03 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10998 at Wed Oct 18 14:13:03 UTC 2023 kill -USR1 10998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10998 killed at Wed Oct 18 14:13:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11038 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11038 found at Wed Oct 18 14:13:03 UTC 2023 selfserv_9355 with PID 11038 started at Wed Oct 18 14:13:03 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11038 at Wed Oct 18 14:13:04 UTC 2023 kill -USR1 11038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11038 killed at Wed Oct 18 14:13:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11078 found at Wed Oct 18 14:13:04 UTC 2023 selfserv_9355 with PID 11078 started at Wed Oct 18 14:13:04 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11078 at Wed Oct 18 14:13:04 UTC 2023 kill -USR1 11078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11078 killed at Wed Oct 18 14:13:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11118 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11118 found at Wed Oct 18 14:13:04 UTC 2023 selfserv_9355 with PID 11118 started at Wed Oct 18 14:13:04 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11118 at Wed Oct 18 14:13:04 UTC 2023 kill -USR1 11118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11118 killed at Wed Oct 18 14:13:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11158 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11158 found at Wed Oct 18 14:13:05 UTC 2023 selfserv_9355 with PID 11158 started at Wed Oct 18 14:13:05 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11158 at Wed Oct 18 14:13:05 UTC 2023 kill -USR1 11158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11158 killed at Wed Oct 18 14:13:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11198 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11198 found at Wed Oct 18 14:13:05 UTC 2023 selfserv_9355 with PID 11198 started at Wed Oct 18 14:13:05 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11198 at Wed Oct 18 14:13:05 UTC 2023 kill -USR1 11198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11198 killed at Wed Oct 18 14:13:05 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:13:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 11238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11238 found at Wed Oct 18 14:13:05 UTC 2023 selfserv_9355 with PID 11238 started at Wed Oct 18 14:13:05 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 11238 at Wed Oct 18 14:13:14 UTC 2023 kill -USR1 11238 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11238 killed at Wed Oct 18 14:13:14 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:13:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 11787 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11787 found at Wed Oct 18 14:13:14 UTC 2023 selfserv_9355 with PID 11787 started at Wed Oct 18 14:13:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11787 at Wed Oct 18 14:13:26 UTC 2023 kill -USR1 11787 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11787 killed at Wed Oct 18 14:13:27 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12608 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12608 found at Wed Oct 18 14:13:27 UTC 2023 selfserv_9355 with PID 12608 started at Wed Oct 18 14:13:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12608 at Wed Oct 18 14:13:27 UTC 2023 kill -USR1 12608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12608 killed at Wed Oct 18 14:13:27 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12660 found at Wed Oct 18 14:13:27 UTC 2023 selfserv_9355 with PID 12660 started at Wed Oct 18 14:13:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12660 at Wed Oct 18 14:13:27 UTC 2023 kill -USR1 12660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12660 killed at Wed Oct 18 14:13:28 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12712 found at Wed Oct 18 14:13:28 UTC 2023 selfserv_9355 with PID 12712 started at Wed Oct 18 14:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12712 at Wed Oct 18 14:13:28 UTC 2023 kill -USR1 12712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12712 killed at Wed Oct 18 14:13:28 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12764 found at Wed Oct 18 14:13:28 UTC 2023 selfserv_9355 with PID 12764 started at Wed Oct 18 14:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12764 at Wed Oct 18 14:13:29 UTC 2023 kill -USR1 12764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12764 killed at Wed Oct 18 14:13:29 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12816 found at Wed Oct 18 14:13:29 UTC 2023 selfserv_9355 with PID 12816 started at Wed Oct 18 14:13:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12816 at Wed Oct 18 14:13:29 UTC 2023 kill -USR1 12816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12816 killed at Wed Oct 18 14:13:29 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12868 found at Wed Oct 18 14:13:29 UTC 2023 selfserv_9355 with PID 12868 started at Wed Oct 18 14:13:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12868 at Wed Oct 18 14:13:30 UTC 2023 kill -USR1 12868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12868 killed at Wed Oct 18 14:13:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12920 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12920 found at Wed Oct 18 14:13:30 UTC 2023 selfserv_9355 with PID 12920 started at Wed Oct 18 14:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12920 at Wed Oct 18 14:13:30 UTC 2023 kill -USR1 12920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12920 killed at Wed Oct 18 14:13:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12972 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12972 found at Wed Oct 18 14:13:30 UTC 2023 selfserv_9355 with PID 12972 started at Wed Oct 18 14:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12972 at Wed Oct 18 14:13:31 UTC 2023 kill -USR1 12972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12972 killed at Wed Oct 18 14:13:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13024 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13024 found at Wed Oct 18 14:13:31 UTC 2023 selfserv_9355 with PID 13024 started at Wed Oct 18 14:13:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13024 at Wed Oct 18 14:13:31 UTC 2023 kill -USR1 13024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13024 killed at Wed Oct 18 14:13:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13076 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13076 found at Wed Oct 18 14:13:32 UTC 2023 selfserv_9355 with PID 13076 started at Wed Oct 18 14:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13076 at Wed Oct 18 14:13:32 UTC 2023 kill -USR1 13076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13076 killed at Wed Oct 18 14:13:32 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13128 found at Wed Oct 18 14:13:32 UTC 2023 selfserv_9355 with PID 13128 started at Wed Oct 18 14:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13128 at Wed Oct 18 14:13:32 UTC 2023 kill -USR1 13128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13128 killed at Wed Oct 18 14:13:32 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13180 found at Wed Oct 18 14:13:33 UTC 2023 selfserv_9355 with PID 13180 started at Wed Oct 18 14:13:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13180 at Wed Oct 18 14:13:33 UTC 2023 kill -USR1 13180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13180 killed at Wed Oct 18 14:13:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13232 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13232 found at Wed Oct 18 14:13:33 UTC 2023 selfserv_9355 with PID 13232 started at Wed Oct 18 14:13:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13232 at Wed Oct 18 14:13:33 UTC 2023 kill -USR1 13232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13232 killed at Wed Oct 18 14:13:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13284 found at Wed Oct 18 14:13:34 UTC 2023 selfserv_9355 with PID 13284 started at Wed Oct 18 14:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13284 at Wed Oct 18 14:13:34 UTC 2023 kill -USR1 13284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13284 killed at Wed Oct 18 14:13:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13336 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13336 found at Wed Oct 18 14:13:34 UTC 2023 selfserv_9355 with PID 13336 started at Wed Oct 18 14:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13336 at Wed Oct 18 14:13:34 UTC 2023 kill -USR1 13336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13336 killed at Wed Oct 18 14:13:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13388 found at Wed Oct 18 14:13:35 UTC 2023 selfserv_9355 with PID 13388 started at Wed Oct 18 14:13:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13388 at Wed Oct 18 14:13:35 UTC 2023 kill -USR1 13388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13388 killed at Wed Oct 18 14:13:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13440 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13440 found at Wed Oct 18 14:13:35 UTC 2023 selfserv_9355 with PID 13440 started at Wed Oct 18 14:13:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13440 at Wed Oct 18 14:13:36 UTC 2023 kill -USR1 13440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13440 killed at Wed Oct 18 14:13:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13492 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13492 found at Wed Oct 18 14:13:36 UTC 2023 selfserv_9355 with PID 13492 started at Wed Oct 18 14:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13492 at Wed Oct 18 14:13:36 UTC 2023 kill -USR1 13492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13492 killed at Wed Oct 18 14:13:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13544 found at Wed Oct 18 14:13:36 UTC 2023 selfserv_9355 with PID 13544 started at Wed Oct 18 14:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13544 at Wed Oct 18 14:13:37 UTC 2023 kill -USR1 13544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13544 killed at Wed Oct 18 14:13:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13596 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13596 found at Wed Oct 18 14:13:37 UTC 2023 selfserv_9355 with PID 13596 started at Wed Oct 18 14:13:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13596 at Wed Oct 18 14:13:37 UTC 2023 kill -USR1 13596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13596 killed at Wed Oct 18 14:13:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13648 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13648 found at Wed Oct 18 14:13:37 UTC 2023 selfserv_9355 with PID 13648 started at Wed Oct 18 14:13:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13648 at Wed Oct 18 14:13:38 UTC 2023 kill -USR1 13648 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13648 killed at Wed Oct 18 14:13:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13700 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13700 found at Wed Oct 18 14:13:38 UTC 2023 selfserv_9355 with PID 13700 started at Wed Oct 18 14:13:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13700 at Wed Oct 18 14:13:38 UTC 2023 kill -USR1 13700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13700 killed at Wed Oct 18 14:13:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13752 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13752 found at Wed Oct 18 14:13:39 UTC 2023 selfserv_9355 with PID 13752 started at Wed Oct 18 14:13:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13752 at Wed Oct 18 14:13:39 UTC 2023 kill -USR1 13752 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13752 killed at Wed Oct 18 14:13:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13804 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13804 found at Wed Oct 18 14:13:39 UTC 2023 selfserv_9355 with PID 13804 started at Wed Oct 18 14:13:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13804 at Wed Oct 18 14:13:40 UTC 2023 kill -USR1 13804 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13804 killed at Wed Oct 18 14:13:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13856 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13856 found at Wed Oct 18 14:13:40 UTC 2023 selfserv_9355 with PID 13856 started at Wed Oct 18 14:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13856 at Wed Oct 18 14:13:40 UTC 2023 kill -USR1 13856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13856 killed at Wed Oct 18 14:13:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13908 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13908 found at Wed Oct 18 14:13:40 UTC 2023 selfserv_9355 with PID 13908 started at Wed Oct 18 14:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13908 at Wed Oct 18 14:13:41 UTC 2023 kill -USR1 13908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13908 killed at Wed Oct 18 14:13:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13960 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13960 found at Wed Oct 18 14:13:41 UTC 2023 selfserv_9355 with PID 13960 started at Wed Oct 18 14:13:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13960 at Wed Oct 18 14:13:41 UTC 2023 kill -USR1 13960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13960 killed at Wed Oct 18 14:13:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14012 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14012 found at Wed Oct 18 14:13:42 UTC 2023 selfserv_9355 with PID 14012 started at Wed Oct 18 14:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14012 at Wed Oct 18 14:13:42 UTC 2023 kill -USR1 14012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14012 killed at Wed Oct 18 14:13:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14064 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14064 found at Wed Oct 18 14:13:42 UTC 2023 selfserv_9355 with PID 14064 started at Wed Oct 18 14:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14064 at Wed Oct 18 14:13:43 UTC 2023 kill -USR1 14064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14064 killed at Wed Oct 18 14:13:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14116 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14116 found at Wed Oct 18 14:13:43 UTC 2023 selfserv_9355 with PID 14116 started at Wed Oct 18 14:13:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14116 at Wed Oct 18 14:13:43 UTC 2023 kill -USR1 14116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14116 killed at Wed Oct 18 14:13:43 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14168 found at Wed Oct 18 14:13:43 UTC 2023 selfserv_9355 with PID 14168 started at Wed Oct 18 14:13:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14168 at Wed Oct 18 14:13:44 UTC 2023 kill -USR1 14168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14168 killed at Wed Oct 18 14:13:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14220 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14220 found at Wed Oct 18 14:13:44 UTC 2023 selfserv_9355 with PID 14220 started at Wed Oct 18 14:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14220 at Wed Oct 18 14:13:44 UTC 2023 kill -USR1 14220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14220 killed at Wed Oct 18 14:13:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14272 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14272 found at Wed Oct 18 14:13:44 UTC 2023 selfserv_9355 with PID 14272 started at Wed Oct 18 14:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14272 at Wed Oct 18 14:13:45 UTC 2023 kill -USR1 14272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14272 killed at Wed Oct 18 14:13:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14324 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14324 found at Wed Oct 18 14:13:45 UTC 2023 selfserv_9355 with PID 14324 started at Wed Oct 18 14:13:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14324 at Wed Oct 18 14:13:45 UTC 2023 kill -USR1 14324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14324 killed at Wed Oct 18 14:13:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14376 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14376 found at Wed Oct 18 14:13:46 UTC 2023 selfserv_9355 with PID 14376 started at Wed Oct 18 14:13:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14376 at Wed Oct 18 14:13:46 UTC 2023 kill -USR1 14376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14376 killed at Wed Oct 18 14:13:46 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14428 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14428 found at Wed Oct 18 14:13:46 UTC 2023 selfserv_9355 with PID 14428 started at Wed Oct 18 14:13:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14428 at Wed Oct 18 14:13:46 UTC 2023 kill -USR1 14428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14428 killed at Wed Oct 18 14:13:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14480 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14480 found at Wed Oct 18 14:13:47 UTC 2023 selfserv_9355 with PID 14480 started at Wed Oct 18 14:13:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14480 at Wed Oct 18 14:13:47 UTC 2023 kill -USR1 14480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14480 killed at Wed Oct 18 14:13:47 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14532 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14532 found at Wed Oct 18 14:13:47 UTC 2023 selfserv_9355 with PID 14532 started at Wed Oct 18 14:13:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14532 at Wed Oct 18 14:13:47 UTC 2023 kill -USR1 14532 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14532 killed at Wed Oct 18 14:13:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14585 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14585 found at Wed Oct 18 14:13:48 UTC 2023 selfserv_9355 with PID 14585 started at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14585 at Wed Oct 18 14:13:48 UTC 2023 kill -USR1 14585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14585 killed at Wed Oct 18 14:13:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14637 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14637 found at Wed Oct 18 14:13:48 UTC 2023 selfserv_9355 with PID 14637 started at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14637 at Wed Oct 18 14:13:48 UTC 2023 kill -USR1 14637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14637 killed at Wed Oct 18 14:13:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14689 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14689 found at Wed Oct 18 14:13:49 UTC 2023 selfserv_9355 with PID 14689 started at Wed Oct 18 14:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14689 at Wed Oct 18 14:13:49 UTC 2023 kill -USR1 14689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14689 killed at Wed Oct 18 14:13:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14741 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14741 found at Wed Oct 18 14:13:49 UTC 2023 selfserv_9355 with PID 14741 started at Wed Oct 18 14:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14741 at Wed Oct 18 14:13:49 UTC 2023 kill -USR1 14741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14741 killed at Wed Oct 18 14:13:50 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14793 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14793 found at Wed Oct 18 14:13:50 UTC 2023 selfserv_9355 with PID 14793 started at Wed Oct 18 14:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14793 at Wed Oct 18 14:13:50 UTC 2023 kill -USR1 14793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14793 killed at Wed Oct 18 14:13:50 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14845 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14845 found at Wed Oct 18 14:13:50 UTC 2023 selfserv_9355 with PID 14845 started at Wed Oct 18 14:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14845 at Wed Oct 18 14:13:50 UTC 2023 kill -USR1 14845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14845 killed at Wed Oct 18 14:13:51 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14897 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14897 found at Wed Oct 18 14:13:51 UTC 2023 selfserv_9355 with PID 14897 started at Wed Oct 18 14:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14897 at Wed Oct 18 14:13:51 UTC 2023 kill -USR1 14897 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14897 killed at Wed Oct 18 14:13:51 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14949 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14949 found at Wed Oct 18 14:13:51 UTC 2023 selfserv_9355 with PID 14949 started at Wed Oct 18 14:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14949 at Wed Oct 18 14:13:51 UTC 2023 kill -USR1 14949 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14949 killed at Wed Oct 18 14:13:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15001 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15001 found at Wed Oct 18 14:13:52 UTC 2023 selfserv_9355 with PID 15001 started at Wed Oct 18 14:13:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15001 at Wed Oct 18 14:13:52 UTC 2023 kill -USR1 15001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15001 killed at Wed Oct 18 14:13:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15053 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15053 found at Wed Oct 18 14:13:52 UTC 2023 selfserv_9355 with PID 15053 started at Wed Oct 18 14:13:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15053 at Wed Oct 18 14:13:53 UTC 2023 kill -USR1 15053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15053 killed at Wed Oct 18 14:13:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15105 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15105 found at Wed Oct 18 14:13:53 UTC 2023 selfserv_9355 with PID 15105 started at Wed Oct 18 14:13:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15105 at Wed Oct 18 14:13:53 UTC 2023 kill -USR1 15105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15105 killed at Wed Oct 18 14:13:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15157 found at Wed Oct 18 14:13:53 UTC 2023 selfserv_9355 with PID 15157 started at Wed Oct 18 14:13:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15157 at Wed Oct 18 14:13:54 UTC 2023 kill -USR1 15157 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15157 killed at Wed Oct 18 14:13:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15209 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15209 found at Wed Oct 18 14:13:54 UTC 2023 selfserv_9355 with PID 15209 started at Wed Oct 18 14:13:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15209 at Wed Oct 18 14:13:54 UTC 2023 kill -USR1 15209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15209 killed at Wed Oct 18 14:13:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15261 found at Wed Oct 18 14:13:55 UTC 2023 selfserv_9355 with PID 15261 started at Wed Oct 18 14:13:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15261 at Wed Oct 18 14:13:55 UTC 2023 kill -USR1 15261 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15261 killed at Wed Oct 18 14:13:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15313 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15313 found at Wed Oct 18 14:13:55 UTC 2023 selfserv_9355 with PID 15313 started at Wed Oct 18 14:13:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15313 at Wed Oct 18 14:13:55 UTC 2023 kill -USR1 15313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15313 killed at Wed Oct 18 14:13:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15365 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15365 found at Wed Oct 18 14:13:56 UTC 2023 selfserv_9355 with PID 15365 started at Wed Oct 18 14:13:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15365 at Wed Oct 18 14:13:56 UTC 2023 kill -USR1 15365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15365 killed at Wed Oct 18 14:13:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:13:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15417 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15417 found at Wed Oct 18 14:13:56 UTC 2023 selfserv_9355 with PID 15417 started at Wed Oct 18 14:13:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15417 at Wed Oct 18 14:13:57 UTC 2023 kill -USR1 15417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15417 killed at Wed Oct 18 14:13:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15469 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15469 found at Wed Oct 18 14:13:57 UTC 2023 selfserv_9355 with PID 15469 started at Wed Oct 18 14:13:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15469 at Wed Oct 18 14:13:57 UTC 2023 kill -USR1 15469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15469 killed at Wed Oct 18 14:13:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15521 found at Wed Oct 18 14:13:58 UTC 2023 selfserv_9355 with PID 15521 started at Wed Oct 18 14:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15521 at Wed Oct 18 14:13:58 UTC 2023 kill -USR1 15521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15521 killed at Wed Oct 18 14:13:58 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:13:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15573 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15573 found at Wed Oct 18 14:13:58 UTC 2023 selfserv_9355 with PID 15573 started at Wed Oct 18 14:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15573 at Wed Oct 18 14:13:58 UTC 2023 kill -USR1 15573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15573 killed at Wed Oct 18 14:13:59 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:13:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15655 found at Wed Oct 18 14:13:59 UTC 2023 selfserv_9355 with PID 15655 started at Wed Oct 18 14:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15655 at Wed Oct 18 14:13:59 UTC 2023 kill -USR1 15655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15655 killed at Wed Oct 18 14:13:59 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15697 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15697 found at Wed Oct 18 14:13:59 UTC 2023 selfserv_9355 with PID 15697 started at Wed Oct 18 14:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15697 at Wed Oct 18 14:13:59 UTC 2023 kill -USR1 15697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15697 killed at Wed Oct 18 14:13:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:13:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15736 found at Wed Oct 18 14:14:00 UTC 2023 selfserv_9355 with PID 15736 started at Wed Oct 18 14:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15736 at Wed Oct 18 14:14:00 UTC 2023 kill -USR1 15736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15736 killed at Wed Oct 18 14:14:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15775 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15775 found at Wed Oct 18 14:14:00 UTC 2023 selfserv_9355 with PID 15775 started at Wed Oct 18 14:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15775 at Wed Oct 18 14:14:00 UTC 2023 kill -USR1 15775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15775 killed at Wed Oct 18 14:14:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15814 found at Wed Oct 18 14:14:00 UTC 2023 selfserv_9355 with PID 15814 started at Wed Oct 18 14:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15814 at Wed Oct 18 14:14:00 UTC 2023 kill -USR1 15814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15814 killed at Wed Oct 18 14:14:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15853 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15853 found at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 with PID 15853 started at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15853 at Wed Oct 18 14:14:01 UTC 2023 kill -USR1 15853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15853 killed at Wed Oct 18 14:14:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15892 found at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 with PID 15892 started at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15892 at Wed Oct 18 14:14:01 UTC 2023 kill -USR1 15892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15892 killed at Wed Oct 18 14:14:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15931 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15931 found at Wed Oct 18 14:14:01 UTC 2023 selfserv_9355 with PID 15931 started at Wed Oct 18 14:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15931 at Wed Oct 18 14:14:02 UTC 2023 kill -USR1 15931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15931 killed at Wed Oct 18 14:14:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15970 found at Wed Oct 18 14:14:02 UTC 2023 selfserv_9355 with PID 15970 started at Wed Oct 18 14:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15970 at Wed Oct 18 14:14:02 UTC 2023 kill -USR1 15970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15970 killed at Wed Oct 18 14:14:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16009 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16009 found at Wed Oct 18 14:14:02 UTC 2023 selfserv_9355 with PID 16009 started at Wed Oct 18 14:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16009 at Wed Oct 18 14:14:02 UTC 2023 kill -USR1 16009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16009 killed at Wed Oct 18 14:14:03 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16048 found at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 with PID 16048 started at Wed Oct 18 14:14:03 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16048 at Wed Oct 18 14:14:03 UTC 2023 kill -USR1 16048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16048 killed at Wed Oct 18 14:14:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16088 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16088 found at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 with PID 16088 started at Wed Oct 18 14:14:03 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16088 at Wed Oct 18 14:14:03 UTC 2023 kill -USR1 16088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16088 killed at Wed Oct 18 14:14:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16128 found at Wed Oct 18 14:14:03 UTC 2023 selfserv_9355 with PID 16128 started at Wed Oct 18 14:14:03 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16128 at Wed Oct 18 14:14:04 UTC 2023 kill -USR1 16128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16128 killed at Wed Oct 18 14:14:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16168 found at Wed Oct 18 14:14:04 UTC 2023 selfserv_9355 with PID 16168 started at Wed Oct 18 14:14:04 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16168 at Wed Oct 18 14:14:04 UTC 2023 kill -USR1 16168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16168 killed at Wed Oct 18 14:14:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16208 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16208 found at Wed Oct 18 14:14:04 UTC 2023 selfserv_9355 with PID 16208 started at Wed Oct 18 14:14:04 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16208 at Wed Oct 18 14:14:04 UTC 2023 kill -USR1 16208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16208 killed at Wed Oct 18 14:14:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16248 found at Wed Oct 18 14:14:05 UTC 2023 selfserv_9355 with PID 16248 started at Wed Oct 18 14:14:05 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16248 at Wed Oct 18 14:14:05 UTC 2023 kill -USR1 16248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16248 killed at Wed Oct 18 14:14:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16288 found at Wed Oct 18 14:14:05 UTC 2023 selfserv_9355 with PID 16288 started at Wed Oct 18 14:14:05 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16288 at Wed Oct 18 14:14:05 UTC 2023 kill -USR1 16288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16288 killed at Wed Oct 18 14:14:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16328 found at Wed Oct 18 14:14:05 UTC 2023 selfserv_9355 with PID 16328 started at Wed Oct 18 14:14:05 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16328 at Wed Oct 18 14:14:06 UTC 2023 kill -USR1 16328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16328 killed at Wed Oct 18 14:14:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:14:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16368 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16368 found at Wed Oct 18 14:14:06 UTC 2023 selfserv_9355 with PID 16368 started at Wed Oct 18 14:14:06 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16368 at Wed Oct 18 14:14:06 UTC 2023 kill -USR1 16368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16368 killed at Wed Oct 18 14:14:06 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:14:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 16452 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16452 found at Wed Oct 18 14:14:07 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 16452 started at Wed Oct 18 14:14:07 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 16452 at Wed Oct 18 14:14:15 UTC 2023 kill -USR1 16452 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16452 killed at Wed Oct 18 14:14:16 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:14:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 17004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17004 found at Wed Oct 18 14:14:16 UTC 2023 selfserv_9355 with PID 17004 started at Wed Oct 18 14:14:16 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17004 at Wed Oct 18 14:14:31 UTC 2023 kill -USR1 17004 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17004 killed at Wed Oct 18 14:14:31 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:14:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17809 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17809 found at Wed Oct 18 14:14:31 UTC 2023 selfserv_9355 with PID 17809 started at Wed Oct 18 14:14:31 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17809 at Wed Oct 18 14:14:31 UTC 2023 kill -USR1 17809 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17809 killed at Wed Oct 18 14:14:31 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17875 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17875 found at Wed Oct 18 14:14:31 UTC 2023 selfserv_9355 with PID 17875 started at Wed Oct 18 14:14:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17875 at Wed Oct 18 14:14:32 UTC 2023 kill -USR1 17875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17875 killed at Wed Oct 18 14:14:32 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17927 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17927 found at Wed Oct 18 14:14:32 UTC 2023 selfserv_9355 with PID 17927 started at Wed Oct 18 14:14:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17927 at Wed Oct 18 14:14:33 UTC 2023 kill -USR1 17927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17927 killed at Wed Oct 18 14:14:33 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17979 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17979 found at Wed Oct 18 14:14:33 UTC 2023 selfserv_9355 with PID 17979 started at Wed Oct 18 14:14:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17979 at Wed Oct 18 14:14:33 UTC 2023 kill -USR1 17979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17979 killed at Wed Oct 18 14:14:33 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18031 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18031 found at Wed Oct 18 14:14:33 UTC 2023 selfserv_9355 with PID 18031 started at Wed Oct 18 14:14:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18031 at Wed Oct 18 14:14:34 UTC 2023 kill -USR1 18031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18031 killed at Wed Oct 18 14:14:34 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18083 found at Wed Oct 18 14:14:34 UTC 2023 selfserv_9355 with PID 18083 started at Wed Oct 18 14:14:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18083 at Wed Oct 18 14:14:34 UTC 2023 kill -USR1 18083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18083 killed at Wed Oct 18 14:14:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18135 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18135 found at Wed Oct 18 14:14:35 UTC 2023 selfserv_9355 with PID 18135 started at Wed Oct 18 14:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18135 at Wed Oct 18 14:14:35 UTC 2023 kill -USR1 18135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18135 killed at Wed Oct 18 14:14:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18187 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18187 found at Wed Oct 18 14:14:35 UTC 2023 selfserv_9355 with PID 18187 started at Wed Oct 18 14:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18187 at Wed Oct 18 14:14:36 UTC 2023 kill -USR1 18187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18187 killed at Wed Oct 18 14:14:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18239 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18239 found at Wed Oct 18 14:14:36 UTC 2023 selfserv_9355 with PID 18239 started at Wed Oct 18 14:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18239 at Wed Oct 18 14:14:36 UTC 2023 kill -USR1 18239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18239 killed at Wed Oct 18 14:14:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18291 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18291 found at Wed Oct 18 14:14:37 UTC 2023 selfserv_9355 with PID 18291 started at Wed Oct 18 14:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18291 at Wed Oct 18 14:14:37 UTC 2023 kill -USR1 18291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18291 killed at Wed Oct 18 14:14:37 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18343 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18343 found at Wed Oct 18 14:14:37 UTC 2023 selfserv_9355 with PID 18343 started at Wed Oct 18 14:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18343 at Wed Oct 18 14:14:38 UTC 2023 kill -USR1 18343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18343 killed at Wed Oct 18 14:14:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18395 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18395 found at Wed Oct 18 14:14:38 UTC 2023 selfserv_9355 with PID 18395 started at Wed Oct 18 14:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18395 at Wed Oct 18 14:14:38 UTC 2023 kill -USR1 18395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18395 killed at Wed Oct 18 14:14:38 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18447 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18447 found at Wed Oct 18 14:14:38 UTC 2023 selfserv_9355 with PID 18447 started at Wed Oct 18 14:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18447 at Wed Oct 18 14:14:39 UTC 2023 kill -USR1 18447 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18447 killed at Wed Oct 18 14:14:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18502 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18502 found at Wed Oct 18 14:14:39 UTC 2023 selfserv_9355 with PID 18502 started at Wed Oct 18 14:14:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18502 at Wed Oct 18 14:14:40 UTC 2023 kill -USR1 18502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18502 killed at Wed Oct 18 14:14:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18555 found at Wed Oct 18 14:14:40 UTC 2023 selfserv_9355 with PID 18555 started at Wed Oct 18 14:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18555 at Wed Oct 18 14:14:40 UTC 2023 kill -USR1 18555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18555 killed at Wed Oct 18 14:14:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18608 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18608 found at Wed Oct 18 14:14:41 UTC 2023 selfserv_9355 with PID 18608 started at Wed Oct 18 14:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18608 at Wed Oct 18 14:14:41 UTC 2023 kill -USR1 18608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18608 killed at Wed Oct 18 14:14:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18660 found at Wed Oct 18 14:14:42 UTC 2023 selfserv_9355 with PID 18660 started at Wed Oct 18 14:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18660 at Wed Oct 18 14:14:42 UTC 2023 kill -USR1 18660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18660 killed at Wed Oct 18 14:14:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18712 found at Wed Oct 18 14:14:42 UTC 2023 selfserv_9355 with PID 18712 started at Wed Oct 18 14:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18712 at Wed Oct 18 14:14:43 UTC 2023 kill -USR1 18712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18712 killed at Wed Oct 18 14:14:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18764 found at Wed Oct 18 14:14:43 UTC 2023 selfserv_9355 with PID 18764 started at Wed Oct 18 14:14:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18764 at Wed Oct 18 14:14:44 UTC 2023 kill -USR1 18764 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18764 killed at Wed Oct 18 14:14:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18816 found at Wed Oct 18 14:14:44 UTC 2023 selfserv_9355 with PID 18816 started at Wed Oct 18 14:14:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18816 at Wed Oct 18 14:14:44 UTC 2023 kill -USR1 18816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18816 killed at Wed Oct 18 14:14:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18868 found at Wed Oct 18 14:14:45 UTC 2023 selfserv_9355 with PID 18868 started at Wed Oct 18 14:14:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18868 at Wed Oct 18 14:14:45 UTC 2023 kill -USR1 18868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18868 killed at Wed Oct 18 14:14:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18920 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18920 found at Wed Oct 18 14:14:45 UTC 2023 selfserv_9355 with PID 18920 started at Wed Oct 18 14:14:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18920 at Wed Oct 18 14:14:46 UTC 2023 kill -USR1 18920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18920 killed at Wed Oct 18 14:14:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18972 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18972 found at Wed Oct 18 14:14:46 UTC 2023 selfserv_9355 with PID 18972 started at Wed Oct 18 14:14:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18972 at Wed Oct 18 14:14:47 UTC 2023 kill -USR1 18972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18972 killed at Wed Oct 18 14:14:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19024 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19024 found at Wed Oct 18 14:14:47 UTC 2023 selfserv_9355 with PID 19024 started at Wed Oct 18 14:14:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19024 at Wed Oct 18 14:14:48 UTC 2023 kill -USR1 19024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19024 killed at Wed Oct 18 14:14:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19076 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19076 found at Wed Oct 18 14:14:48 UTC 2023 selfserv_9355 with PID 19076 started at Wed Oct 18 14:14:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19076 at Wed Oct 18 14:14:48 UTC 2023 kill -USR1 19076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19076 killed at Wed Oct 18 14:14:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19128 found at Wed Oct 18 14:14:49 UTC 2023 selfserv_9355 with PID 19128 started at Wed Oct 18 14:14:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19128 at Wed Oct 18 14:14:49 UTC 2023 kill -USR1 19128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19128 killed at Wed Oct 18 14:14:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19180 found at Wed Oct 18 14:14:49 UTC 2023 selfserv_9355 with PID 19180 started at Wed Oct 18 14:14:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19180 at Wed Oct 18 14:14:50 UTC 2023 kill -USR1 19180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19180 killed at Wed Oct 18 14:14:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19232 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19232 found at Wed Oct 18 14:14:50 UTC 2023 selfserv_9355 with PID 19232 started at Wed Oct 18 14:14:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19232 at Wed Oct 18 14:14:50 UTC 2023 kill -USR1 19232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19232 killed at Wed Oct 18 14:14:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19284 found at Wed Oct 18 14:14:51 UTC 2023 selfserv_9355 with PID 19284 started at Wed Oct 18 14:14:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19284 at Wed Oct 18 14:14:51 UTC 2023 kill -USR1 19284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19284 killed at Wed Oct 18 14:14:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19337 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19337 found at Wed Oct 18 14:14:52 UTC 2023 selfserv_9355 with PID 19337 started at Wed Oct 18 14:14:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19337 at Wed Oct 18 14:14:52 UTC 2023 kill -USR1 19337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19337 killed at Wed Oct 18 14:14:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19390 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19390 found at Wed Oct 18 14:14:52 UTC 2023 selfserv_9355 with PID 19390 started at Wed Oct 18 14:14:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19390 at Wed Oct 18 14:14:53 UTC 2023 kill -USR1 19390 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19390 killed at Wed Oct 18 14:14:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19442 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19442 found at Wed Oct 18 14:14:53 UTC 2023 selfserv_9355 with PID 19442 started at Wed Oct 18 14:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19442 at Wed Oct 18 14:14:53 UTC 2023 kill -USR1 19442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19442 killed at Wed Oct 18 14:14:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19494 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19494 found at Wed Oct 18 14:14:53 UTC 2023 selfserv_9355 with PID 19494 started at Wed Oct 18 14:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19494 at Wed Oct 18 14:14:54 UTC 2023 kill -USR1 19494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19494 killed at Wed Oct 18 14:14:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19546 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19546 found at Wed Oct 18 14:14:54 UTC 2023 selfserv_9355 with PID 19546 started at Wed Oct 18 14:14:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19546 at Wed Oct 18 14:14:54 UTC 2023 kill -USR1 19546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19546 killed at Wed Oct 18 14:14:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19598 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19598 found at Wed Oct 18 14:14:55 UTC 2023 selfserv_9355 with PID 19598 started at Wed Oct 18 14:14:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19598 at Wed Oct 18 14:14:55 UTC 2023 kill -USR1 19598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19598 killed at Wed Oct 18 14:14:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19650 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19650 found at Wed Oct 18 14:14:55 UTC 2023 selfserv_9355 with PID 19650 started at Wed Oct 18 14:14:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19650 at Wed Oct 18 14:14:56 UTC 2023 kill -USR1 19650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19650 killed at Wed Oct 18 14:14:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19702 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19702 found at Wed Oct 18 14:14:56 UTC 2023 selfserv_9355 with PID 19702 started at Wed Oct 18 14:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19702 at Wed Oct 18 14:14:56 UTC 2023 kill -USR1 19702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19702 killed at Wed Oct 18 14:14:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19754 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19754 found at Wed Oct 18 14:14:56 UTC 2023 selfserv_9355 with PID 19754 started at Wed Oct 18 14:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19754 at Wed Oct 18 14:14:57 UTC 2023 kill -USR1 19754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19754 killed at Wed Oct 18 14:14:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19806 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19806 found at Wed Oct 18 14:14:57 UTC 2023 selfserv_9355 with PID 19806 started at Wed Oct 18 14:14:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19806 at Wed Oct 18 14:14:57 UTC 2023 kill -USR1 19806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19806 killed at Wed Oct 18 14:14:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19858 found at Wed Oct 18 14:14:58 UTC 2023 selfserv_9355 with PID 19858 started at Wed Oct 18 14:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19858 at Wed Oct 18 14:14:58 UTC 2023 kill -USR1 19858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19858 killed at Wed Oct 18 14:14:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19910 found at Wed Oct 18 14:14:58 UTC 2023 selfserv_9355 with PID 19910 started at Wed Oct 18 14:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19910 at Wed Oct 18 14:14:59 UTC 2023 kill -USR1 19910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19910 killed at Wed Oct 18 14:14:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:14:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19962 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19962 found at Wed Oct 18 14:14:59 UTC 2023 selfserv_9355 with PID 19962 started at Wed Oct 18 14:14:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19962 at Wed Oct 18 14:14:59 UTC 2023 kill -USR1 19962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19962 killed at Wed Oct 18 14:14:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:14:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:14:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20014 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20014 found at Wed Oct 18 14:15:00 UTC 2023 selfserv_9355 with PID 20014 started at Wed Oct 18 14:15:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20014 at Wed Oct 18 14:15:00 UTC 2023 kill -USR1 20014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20014 killed at Wed Oct 18 14:15:00 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20066 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20066 found at Wed Oct 18 14:15:00 UTC 2023 selfserv_9355 with PID 20066 started at Wed Oct 18 14:15:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20066 at Wed Oct 18 14:15:00 UTC 2023 kill -USR1 20066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20066 killed at Wed Oct 18 14:15:00 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20118 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20118 found at Wed Oct 18 14:15:01 UTC 2023 selfserv_9355 with PID 20118 started at Wed Oct 18 14:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20118 at Wed Oct 18 14:15:01 UTC 2023 kill -USR1 20118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20118 killed at Wed Oct 18 14:15:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20170 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20170 found at Wed Oct 18 14:15:01 UTC 2023 selfserv_9355 with PID 20170 started at Wed Oct 18 14:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20170 at Wed Oct 18 14:15:02 UTC 2023 kill -USR1 20170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20170 killed at Wed Oct 18 14:15:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20222 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20222 found at Wed Oct 18 14:15:02 UTC 2023 selfserv_9355 with PID 20222 started at Wed Oct 18 14:15:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20222 at Wed Oct 18 14:15:02 UTC 2023 kill -USR1 20222 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20222 killed at Wed Oct 18 14:15:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20274 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20274 found at Wed Oct 18 14:15:03 UTC 2023 selfserv_9355 with PID 20274 started at Wed Oct 18 14:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20274 at Wed Oct 18 14:15:03 UTC 2023 kill -USR1 20274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20274 killed at Wed Oct 18 14:15:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20326 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20326 found at Wed Oct 18 14:15:03 UTC 2023 selfserv_9355 with PID 20326 started at Wed Oct 18 14:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20326 at Wed Oct 18 14:15:04 UTC 2023 kill -USR1 20326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20326 killed at Wed Oct 18 14:15:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20378 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20378 found at Wed Oct 18 14:15:04 UTC 2023 selfserv_9355 with PID 20378 started at Wed Oct 18 14:15:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20378 at Wed Oct 18 14:15:05 UTC 2023 kill -USR1 20378 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20378 killed at Wed Oct 18 14:15:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20430 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20430 found at Wed Oct 18 14:15:05 UTC 2023 selfserv_9355 with PID 20430 started at Wed Oct 18 14:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20430 at Wed Oct 18 14:15:05 UTC 2023 kill -USR1 20430 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20430 killed at Wed Oct 18 14:15:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20482 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20482 found at Wed Oct 18 14:15:06 UTC 2023 selfserv_9355 with PID 20482 started at Wed Oct 18 14:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20482 at Wed Oct 18 14:15:06 UTC 2023 kill -USR1 20482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20482 killed at Wed Oct 18 14:15:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20534 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20534 found at Wed Oct 18 14:15:06 UTC 2023 selfserv_9355 with PID 20534 started at Wed Oct 18 14:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20534 at Wed Oct 18 14:15:07 UTC 2023 kill -USR1 20534 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20534 killed at Wed Oct 18 14:15:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20586 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20586 found at Wed Oct 18 14:15:07 UTC 2023 selfserv_9355 with PID 20586 started at Wed Oct 18 14:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20586 at Wed Oct 18 14:15:08 UTC 2023 kill -USR1 20586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20586 killed at Wed Oct 18 14:15:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20638 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20638 found at Wed Oct 18 14:15:08 UTC 2023 selfserv_9355 with PID 20638 started at Wed Oct 18 14:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20638 at Wed Oct 18 14:15:08 UTC 2023 kill -USR1 20638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20638 killed at Wed Oct 18 14:15:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:15:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20690 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20690 found at Wed Oct 18 14:15:09 UTC 2023 selfserv_9355 with PID 20690 started at Wed Oct 18 14:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20690 at Wed Oct 18 14:15:09 UTC 2023 kill -USR1 20690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20690 killed at Wed Oct 18 14:15:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20742 found at Wed Oct 18 14:15:09 UTC 2023 selfserv_9355 with PID 20742 started at Wed Oct 18 14:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20742 at Wed Oct 18 14:15:10 UTC 2023 kill -USR1 20742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20742 killed at Wed Oct 18 14:15:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20794 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20794 found at Wed Oct 18 14:15:10 UTC 2023 selfserv_9355 with PID 20794 started at Wed Oct 18 14:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20794 at Wed Oct 18 14:15:11 UTC 2023 kill -USR1 20794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20794 killed at Wed Oct 18 14:15:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:15:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20846 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20846 found at Wed Oct 18 14:15:11 UTC 2023 selfserv_9355 with PID 20846 started at Wed Oct 18 14:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20846 at Wed Oct 18 14:15:11 UTC 2023 kill -USR1 20846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20846 killed at Wed Oct 18 14:15:11 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:15:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20904 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20904 found at Wed Oct 18 14:15:11 UTC 2023 selfserv_9355 with PID 20904 started at Wed Oct 18 14:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20904 at Wed Oct 18 14:15:12 UTC 2023 kill -USR1 20904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20904 killed at Wed Oct 18 14:15:12 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:15:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20962 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20962 found at Wed Oct 18 14:15:12 UTC 2023 selfserv_9355 with PID 20962 started at Wed Oct 18 14:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20962 at Wed Oct 18 14:15:12 UTC 2023 kill -USR1 20962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20962 killed at Wed Oct 18 14:15:12 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:15:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21022 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21022 found at Wed Oct 18 14:15:12 UTC 2023 selfserv_9355 with PID 21022 started at Wed Oct 18 14:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21022 at Wed Oct 18 14:15:13 UTC 2023 kill -USR1 21022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21022 killed at Wed Oct 18 14:15:13 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:15:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21093 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21093 found at Wed Oct 18 14:15:13 UTC 2023 selfserv_9355 with PID 21093 started at Wed Oct 18 14:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21093 at Wed Oct 18 14:15:13 UTC 2023 kill -USR1 21093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21093 killed at Wed Oct 18 14:15:13 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 14:15:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21154 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21154 found at Wed Oct 18 14:15:13 UTC 2023 selfserv_9355 with PID 21154 started at Wed Oct 18 14:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21154 at Wed Oct 18 14:15:14 UTC 2023 kill -USR1 21154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21154 killed at Wed Oct 18 14:15:14 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:15:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21218 found at Wed Oct 18 14:15:14 UTC 2023 selfserv_9355 with PID 21218 started at Wed Oct 18 14:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21218 at Wed Oct 18 14:15:14 UTC 2023 kill -USR1 21218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21218 killed at Wed Oct 18 14:15:14 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:15:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21276 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21276 found at Wed Oct 18 14:15:14 UTC 2023 selfserv_9355 with PID 21276 started at Wed Oct 18 14:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21276 at Wed Oct 18 14:15:15 UTC 2023 kill -USR1 21276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21276 killed at Wed Oct 18 14:15:15 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:15:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21337 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21337 found at Wed Oct 18 14:15:15 UTC 2023 selfserv_9355 with PID 21337 started at Wed Oct 18 14:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21337 at Wed Oct 18 14:15:15 UTC 2023 kill -USR1 21337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21337 killed at Wed Oct 18 14:15:15 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:15:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21395 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21395 found at Wed Oct 18 14:15:15 UTC 2023 selfserv_9355 with PID 21395 started at Wed Oct 18 14:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21395 at Wed Oct 18 14:15:16 UTC 2023 kill -USR1 21395 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21395 killed at Wed Oct 18 14:15:16 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:15:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21455 found at Wed Oct 18 14:15:16 UTC 2023 selfserv_9355 with PID 21455 started at Wed Oct 18 14:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21455 at Wed Oct 18 14:15:16 UTC 2023 kill -USR1 21455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21455 killed at Wed Oct 18 14:15:16 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 14:15:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21497 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21497 found at Wed Oct 18 14:15:16 UTC 2023 selfserv_9355 with PID 21497 started at Wed Oct 18 14:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21497 at Wed Oct 18 14:15:16 UTC 2023 kill -USR1 21497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21497 killed at Wed Oct 18 14:15:17 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21539 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21539 found at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 with PID 21539 started at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 21539 at Wed Oct 18 14:15:17 UTC 2023 kill -USR1 21539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21539 killed at Wed Oct 18 14:15:17 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21581 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21581 found at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 with PID 21581 started at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 21581 at Wed Oct 18 14:15:17 UTC 2023 kill -USR1 21581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21581 killed at Wed Oct 18 14:15:17 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21623 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21623 found at Wed Oct 18 14:15:17 UTC 2023 selfserv_9355 with PID 21623 started at Wed Oct 18 14:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 21623 at Wed Oct 18 14:15:18 UTC 2023 kill -USR1 21623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21623 killed at Wed Oct 18 14:15:18 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 14:15:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21665 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21665 found at Wed Oct 18 14:15:18 UTC 2023 selfserv_9355 with PID 21665 started at Wed Oct 18 14:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 21665 at Wed Oct 18 14:15:18 UTC 2023 kill -USR1 21665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21665 killed at Wed Oct 18 14:15:18 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 14:15:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21711 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21711 found at Wed Oct 18 14:15:18 UTC 2023 selfserv_9355 with PID 21711 started at Wed Oct 18 14:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 21711 at Wed Oct 18 14:15:19 UTC 2023 kill -USR1 21711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21711 killed at Wed Oct 18 14:15:19 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 14:15:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21773 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21773 found at Wed Oct 18 14:15:19 UTC 2023 selfserv_9355 with PID 21773 started at Wed Oct 18 14:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 21773 at Wed Oct 18 14:15:19 UTC 2023 kill -USR1 21773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21773 killed at Wed Oct 18 14:15:19 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 14:15:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21827 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21827 found at Wed Oct 18 14:15:19 UTC 2023 selfserv_9355 with PID 21827 started at Wed Oct 18 14:15:19 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:15:19 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:16:02 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 21827 at Wed Oct 18 14:16:02 UTC 2023 kill -USR1 21827 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21827 killed at Wed Oct 18 14:16:02 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:16:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21884 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21884 found at Wed Oct 18 14:16:02 UTC 2023 selfserv_9355 with PID 21884 started at Wed Oct 18 14:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21884 at Wed Oct 18 14:16:03 UTC 2023 kill -USR1 21884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21884 killed at Wed Oct 18 14:16:03 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21926 found at Wed Oct 18 14:16:03 UTC 2023 selfserv_9355 with PID 21926 started at Wed Oct 18 14:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21926 at Wed Oct 18 14:16:03 UTC 2023 kill -USR1 21926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21926 killed at Wed Oct 18 14:16:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21965 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21965 found at Wed Oct 18 14:16:03 UTC 2023 selfserv_9355 with PID 21965 started at Wed Oct 18 14:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 21965 at Wed Oct 18 14:16:03 UTC 2023 kill -USR1 21965 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21965 killed at Wed Oct 18 14:16:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22004 found at Wed Oct 18 14:16:04 UTC 2023 selfserv_9355 with PID 22004 started at Wed Oct 18 14:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22004 at Wed Oct 18 14:16:04 UTC 2023 kill -USR1 22004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22004 killed at Wed Oct 18 14:16:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22043 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22043 found at Wed Oct 18 14:16:04 UTC 2023 selfserv_9355 with PID 22043 started at Wed Oct 18 14:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 22043 at Wed Oct 18 14:16:04 UTC 2023 kill -USR1 22043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22043 killed at Wed Oct 18 14:16:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22082 found at Wed Oct 18 14:16:04 UTC 2023 selfserv_9355 with PID 22082 started at Wed Oct 18 14:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22082 at Wed Oct 18 14:16:04 UTC 2023 kill -USR1 22082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22082 killed at Wed Oct 18 14:16:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22121 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22121 found at Wed Oct 18 14:16:05 UTC 2023 selfserv_9355 with PID 22121 started at Wed Oct 18 14:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22121 at Wed Oct 18 14:16:05 UTC 2023 kill -USR1 22121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22121 killed at Wed Oct 18 14:16:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22160 found at Wed Oct 18 14:16:05 UTC 2023 selfserv_9355 with PID 22160 started at Wed Oct 18 14:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22160 at Wed Oct 18 14:16:05 UTC 2023 kill -USR1 22160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22160 killed at Wed Oct 18 14:16:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22199 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22199 found at Wed Oct 18 14:16:06 UTC 2023 selfserv_9355 with PID 22199 started at Wed Oct 18 14:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22199 at Wed Oct 18 14:16:06 UTC 2023 kill -USR1 22199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22199 killed at Wed Oct 18 14:16:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22238 found at Wed Oct 18 14:16:06 UTC 2023 selfserv_9355 with PID 22238 started at Wed Oct 18 14:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22238 at Wed Oct 18 14:16:06 UTC 2023 kill -USR1 22238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22238 killed at Wed Oct 18 14:16:06 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22277 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22277 found at Wed Oct 18 14:16:06 UTC 2023 selfserv_9355 with PID 22277 started at Wed Oct 18 14:16:06 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22277 at Wed Oct 18 14:16:06 UTC 2023 kill -USR1 22277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22277 killed at Wed Oct 18 14:16:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22317 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22317 found at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 with PID 22317 started at Wed Oct 18 14:16:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22317 at Wed Oct 18 14:16:07 UTC 2023 kill -USR1 22317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22317 killed at Wed Oct 18 14:16:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22357 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22357 found at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 with PID 22357 started at Wed Oct 18 14:16:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22357 at Wed Oct 18 14:16:07 UTC 2023 kill -USR1 22357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22357 killed at Wed Oct 18 14:16:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22397 found at Wed Oct 18 14:16:07 UTC 2023 selfserv_9355 with PID 22397 started at Wed Oct 18 14:16:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22397 at Wed Oct 18 14:16:08 UTC 2023 kill -USR1 22397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22397 killed at Wed Oct 18 14:16:08 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22437 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22437 found at Wed Oct 18 14:16:08 UTC 2023 selfserv_9355 with PID 22437 started at Wed Oct 18 14:16:08 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22437 at Wed Oct 18 14:16:08 UTC 2023 kill -USR1 22437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22437 killed at Wed Oct 18 14:16:08 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22477 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22477 found at Wed Oct 18 14:16:08 UTC 2023 selfserv_9355 with PID 22477 started at Wed Oct 18 14:16:08 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22477 at Wed Oct 18 14:16:08 UTC 2023 kill -USR1 22477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22477 killed at Wed Oct 18 14:16:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22517 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22517 found at Wed Oct 18 14:16:09 UTC 2023 selfserv_9355 with PID 22517 started at Wed Oct 18 14:16:09 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22517 at Wed Oct 18 14:16:09 UTC 2023 kill -USR1 22517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22517 killed at Wed Oct 18 14:16:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22557 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22557 found at Wed Oct 18 14:16:09 UTC 2023 selfserv_9355 with PID 22557 started at Wed Oct 18 14:16:09 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22557 at Wed Oct 18 14:16:09 UTC 2023 kill -USR1 22557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22557 killed at Wed Oct 18 14:16:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:16:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22597 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22597 found at Wed Oct 18 14:16:09 UTC 2023 selfserv_9355 with PID 22597 started at Wed Oct 18 14:16:09 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22597 at Wed Oct 18 14:16:10 UTC 2023 kill -USR1 22597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22597 killed at Wed Oct 18 14:16:10 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 14:16:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 22637 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22637 found at Wed Oct 18 14:16:10 UTC 2023 selfserv_9355 with PID 22637 started at Wed Oct 18 14:16:10 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 22637 at Wed Oct 18 14:16:19 UTC 2023 kill -USR1 22637 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22637 killed at Wed Oct 18 14:16:19 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:16:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 23192 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23192 found at Wed Oct 18 14:16:19 UTC 2023 selfserv_9355 with PID 23192 started at Wed Oct 18 14:16:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23192 at Wed Oct 18 14:16:32 UTC 2023 kill -USR1 23192 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23192 killed at Wed Oct 18 14:16:32 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24008 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24008 found at Wed Oct 18 14:16:32 UTC 2023 selfserv_9355 with PID 24008 started at Wed Oct 18 14:16:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24008 at Wed Oct 18 14:16:32 UTC 2023 kill -USR1 24008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24008 killed at Wed Oct 18 14:16:32 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24060 found at Wed Oct 18 14:16:32 UTC 2023 selfserv_9355 with PID 24060 started at Wed Oct 18 14:16:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24060 at Wed Oct 18 14:16:33 UTC 2023 kill -USR1 24060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24060 killed at Wed Oct 18 14:16:33 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24112 found at Wed Oct 18 14:16:33 UTC 2023 selfserv_9355 with PID 24112 started at Wed Oct 18 14:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24112 at Wed Oct 18 14:16:33 UTC 2023 kill -USR1 24112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24112 killed at Wed Oct 18 14:16:33 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24164 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24164 found at Wed Oct 18 14:16:33 UTC 2023 selfserv_9355 with PID 24164 started at Wed Oct 18 14:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24164 at Wed Oct 18 14:16:34 UTC 2023 kill -USR1 24164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24164 killed at Wed Oct 18 14:16:34 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24216 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24216 found at Wed Oct 18 14:16:34 UTC 2023 selfserv_9355 with PID 24216 started at Wed Oct 18 14:16:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24216 at Wed Oct 18 14:16:34 UTC 2023 kill -USR1 24216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24216 killed at Wed Oct 18 14:16:34 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24268 found at Wed Oct 18 14:16:34 UTC 2023 selfserv_9355 with PID 24268 started at Wed Oct 18 14:16:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24268 at Wed Oct 18 14:16:35 UTC 2023 kill -USR1 24268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24268 killed at Wed Oct 18 14:16:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24320 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24320 found at Wed Oct 18 14:16:35 UTC 2023 selfserv_9355 with PID 24320 started at Wed Oct 18 14:16:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24320 at Wed Oct 18 14:16:35 UTC 2023 kill -USR1 24320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24320 killed at Wed Oct 18 14:16:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24372 found at Wed Oct 18 14:16:36 UTC 2023 selfserv_9355 with PID 24372 started at Wed Oct 18 14:16:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24372 at Wed Oct 18 14:16:36 UTC 2023 kill -USR1 24372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24372 killed at Wed Oct 18 14:16:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24424 found at Wed Oct 18 14:16:36 UTC 2023 selfserv_9355 with PID 24424 started at Wed Oct 18 14:16:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24424 at Wed Oct 18 14:16:36 UTC 2023 kill -USR1 24424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24424 killed at Wed Oct 18 14:16:37 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24476 found at Wed Oct 18 14:16:37 UTC 2023 selfserv_9355 with PID 24476 started at Wed Oct 18 14:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24476 at Wed Oct 18 14:16:37 UTC 2023 kill -USR1 24476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24476 killed at Wed Oct 18 14:16:37 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24528 found at Wed Oct 18 14:16:37 UTC 2023 selfserv_9355 with PID 24528 started at Wed Oct 18 14:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24528 at Wed Oct 18 14:16:38 UTC 2023 kill -USR1 24528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24528 killed at Wed Oct 18 14:16:38 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24580 found at Wed Oct 18 14:16:38 UTC 2023 selfserv_9355 with PID 24580 started at Wed Oct 18 14:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24580 at Wed Oct 18 14:16:38 UTC 2023 kill -USR1 24580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24580 killed at Wed Oct 18 14:16:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24632 found at Wed Oct 18 14:16:38 UTC 2023 selfserv_9355 with PID 24632 started at Wed Oct 18 14:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24632 at Wed Oct 18 14:16:39 UTC 2023 kill -USR1 24632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24632 killed at Wed Oct 18 14:16:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24684 found at Wed Oct 18 14:16:39 UTC 2023 selfserv_9355 with PID 24684 started at Wed Oct 18 14:16:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24684 at Wed Oct 18 14:16:39 UTC 2023 kill -USR1 24684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24684 killed at Wed Oct 18 14:16:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24736 found at Wed Oct 18 14:16:39 UTC 2023 selfserv_9355 with PID 24736 started at Wed Oct 18 14:16:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24736 at Wed Oct 18 14:16:40 UTC 2023 kill -USR1 24736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24736 killed at Wed Oct 18 14:16:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24788 found at Wed Oct 18 14:16:40 UTC 2023 selfserv_9355 with PID 24788 started at Wed Oct 18 14:16:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24788 at Wed Oct 18 14:16:40 UTC 2023 kill -USR1 24788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24788 killed at Wed Oct 18 14:16:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24840 found at Wed Oct 18 14:16:41 UTC 2023 selfserv_9355 with PID 24840 started at Wed Oct 18 14:16:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24840 at Wed Oct 18 14:16:41 UTC 2023 kill -USR1 24840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24840 killed at Wed Oct 18 14:16:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24892 found at Wed Oct 18 14:16:41 UTC 2023 selfserv_9355 with PID 24892 started at Wed Oct 18 14:16:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24892 at Wed Oct 18 14:16:41 UTC 2023 kill -USR1 24892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24892 killed at Wed Oct 18 14:16:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24944 found at Wed Oct 18 14:16:42 UTC 2023 selfserv_9355 with PID 24944 started at Wed Oct 18 14:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24944 at Wed Oct 18 14:16:42 UTC 2023 kill -USR1 24944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24944 killed at Wed Oct 18 14:16:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24996 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24996 found at Wed Oct 18 14:16:42 UTC 2023 selfserv_9355 with PID 24996 started at Wed Oct 18 14:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24996 at Wed Oct 18 14:16:43 UTC 2023 kill -USR1 24996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24996 killed at Wed Oct 18 14:16:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25048 found at Wed Oct 18 14:16:43 UTC 2023 selfserv_9355 with PID 25048 started at Wed Oct 18 14:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25048 at Wed Oct 18 14:16:43 UTC 2023 kill -USR1 25048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25048 killed at Wed Oct 18 14:16:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25100 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25100 found at Wed Oct 18 14:16:43 UTC 2023 selfserv_9355 with PID 25100 started at Wed Oct 18 14:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25100 at Wed Oct 18 14:16:44 UTC 2023 kill -USR1 25100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25100 killed at Wed Oct 18 14:16:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25152 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25152 found at Wed Oct 18 14:16:44 UTC 2023 selfserv_9355 with PID 25152 started at Wed Oct 18 14:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25152 at Wed Oct 18 14:16:44 UTC 2023 kill -USR1 25152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25152 killed at Wed Oct 18 14:16:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25204 found at Wed Oct 18 14:16:45 UTC 2023 selfserv_9355 with PID 25204 started at Wed Oct 18 14:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25204 at Wed Oct 18 14:16:45 UTC 2023 kill -USR1 25204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25204 killed at Wed Oct 18 14:16:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25256 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25256 found at Wed Oct 18 14:16:45 UTC 2023 selfserv_9355 with PID 25256 started at Wed Oct 18 14:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25256 at Wed Oct 18 14:16:46 UTC 2023 kill -USR1 25256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25256 killed at Wed Oct 18 14:16:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25308 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25308 found at Wed Oct 18 14:16:46 UTC 2023 selfserv_9355 with PID 25308 started at Wed Oct 18 14:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25308 at Wed Oct 18 14:16:46 UTC 2023 kill -USR1 25308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25308 killed at Wed Oct 18 14:16:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25360 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25360 found at Wed Oct 18 14:16:47 UTC 2023 selfserv_9355 with PID 25360 started at Wed Oct 18 14:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25360 at Wed Oct 18 14:16:47 UTC 2023 kill -USR1 25360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25360 killed at Wed Oct 18 14:16:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25412 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25412 found at Wed Oct 18 14:16:47 UTC 2023 selfserv_9355 with PID 25412 started at Wed Oct 18 14:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25412 at Wed Oct 18 14:16:48 UTC 2023 kill -USR1 25412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25412 killed at Wed Oct 18 14:16:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25464 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25464 found at Wed Oct 18 14:16:48 UTC 2023 selfserv_9355 with PID 25464 started at Wed Oct 18 14:16:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25464 at Wed Oct 18 14:16:48 UTC 2023 kill -USR1 25464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25464 killed at Wed Oct 18 14:16:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25516 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25516 found at Wed Oct 18 14:16:49 UTC 2023 selfserv_9355 with PID 25516 started at Wed Oct 18 14:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25516 at Wed Oct 18 14:16:49 UTC 2023 kill -USR1 25516 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25516 killed at Wed Oct 18 14:16:49 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25568 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25568 found at Wed Oct 18 14:16:49 UTC 2023 selfserv_9355 with PID 25568 started at Wed Oct 18 14:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25568 at Wed Oct 18 14:16:50 UTC 2023 kill -USR1 25568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25568 killed at Wed Oct 18 14:16:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25620 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25620 found at Wed Oct 18 14:16:50 UTC 2023 selfserv_9355 with PID 25620 started at Wed Oct 18 14:16:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25620 at Wed Oct 18 14:16:50 UTC 2023 kill -USR1 25620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25620 killed at Wed Oct 18 14:16:50 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25672 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25672 found at Wed Oct 18 14:16:50 UTC 2023 selfserv_9355 with PID 25672 started at Wed Oct 18 14:16:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25672 at Wed Oct 18 14:16:51 UTC 2023 kill -USR1 25672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25672 killed at Wed Oct 18 14:16:51 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25724 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25724 found at Wed Oct 18 14:16:51 UTC 2023 selfserv_9355 with PID 25724 started at Wed Oct 18 14:16:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25724 at Wed Oct 18 14:16:51 UTC 2023 kill -USR1 25724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25724 killed at Wed Oct 18 14:16:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25776 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25776 found at Wed Oct 18 14:16:51 UTC 2023 selfserv_9355 with PID 25776 started at Wed Oct 18 14:16:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25776 at Wed Oct 18 14:16:52 UTC 2023 kill -USR1 25776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25776 killed at Wed Oct 18 14:16:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25828 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25828 found at Wed Oct 18 14:16:52 UTC 2023 selfserv_9355 with PID 25828 started at Wed Oct 18 14:16:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25828 at Wed Oct 18 14:16:52 UTC 2023 kill -USR1 25828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25828 killed at Wed Oct 18 14:16:52 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25880 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25880 found at Wed Oct 18 14:16:52 UTC 2023 selfserv_9355 with PID 25880 started at Wed Oct 18 14:16:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25880 at Wed Oct 18 14:16:53 UTC 2023 kill -USR1 25880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25880 killed at Wed Oct 18 14:16:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25932 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25932 found at Wed Oct 18 14:16:53 UTC 2023 selfserv_9355 with PID 25932 started at Wed Oct 18 14:16:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25932 at Wed Oct 18 14:16:53 UTC 2023 kill -USR1 25932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25932 killed at Wed Oct 18 14:16:53 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25984 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25984 found at Wed Oct 18 14:16:53 UTC 2023 selfserv_9355 with PID 25984 started at Wed Oct 18 14:16:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25984 at Wed Oct 18 14:16:54 UTC 2023 kill -USR1 25984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25984 killed at Wed Oct 18 14:16:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26036 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26036 found at Wed Oct 18 14:16:54 UTC 2023 selfserv_9355 with PID 26036 started at Wed Oct 18 14:16:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26036 at Wed Oct 18 14:16:54 UTC 2023 kill -USR1 26036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26036 killed at Wed Oct 18 14:16:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26088 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26088 found at Wed Oct 18 14:16:54 UTC 2023 selfserv_9355 with PID 26088 started at Wed Oct 18 14:16:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26088 at Wed Oct 18 14:16:55 UTC 2023 kill -USR1 26088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26088 killed at Wed Oct 18 14:16:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26140 found at Wed Oct 18 14:16:55 UTC 2023 selfserv_9355 with PID 26140 started at Wed Oct 18 14:16:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26140 at Wed Oct 18 14:16:55 UTC 2023 kill -USR1 26140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26140 killed at Wed Oct 18 14:16:55 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26192 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26192 found at Wed Oct 18 14:16:56 UTC 2023 selfserv_9355 with PID 26192 started at Wed Oct 18 14:16:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26192 at Wed Oct 18 14:16:56 UTC 2023 kill -USR1 26192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26192 killed at Wed Oct 18 14:16:56 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26245 found at Wed Oct 18 14:16:56 UTC 2023 selfserv_9355 with PID 26245 started at Wed Oct 18 14:16:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26245 at Wed Oct 18 14:16:56 UTC 2023 kill -USR1 26245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26245 killed at Wed Oct 18 14:16:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26297 found at Wed Oct 18 14:16:57 UTC 2023 selfserv_9355 with PID 26297 started at Wed Oct 18 14:16:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26297 at Wed Oct 18 14:16:57 UTC 2023 kill -USR1 26297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26297 killed at Wed Oct 18 14:16:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26349 found at Wed Oct 18 14:16:57 UTC 2023 selfserv_9355 with PID 26349 started at Wed Oct 18 14:16:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26349 at Wed Oct 18 14:16:58 UTC 2023 kill -USR1 26349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26349 killed at Wed Oct 18 14:16:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26401 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26401 found at Wed Oct 18 14:16:58 UTC 2023 selfserv_9355 with PID 26401 started at Wed Oct 18 14:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26401 at Wed Oct 18 14:16:58 UTC 2023 kill -USR1 26401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26401 killed at Wed Oct 18 14:16:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26453 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26453 found at Wed Oct 18 14:16:58 UTC 2023 selfserv_9355 with PID 26453 started at Wed Oct 18 14:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26453 at Wed Oct 18 14:16:59 UTC 2023 kill -USR1 26453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26453 killed at Wed Oct 18 14:16:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:16:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26505 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26505 found at Wed Oct 18 14:16:59 UTC 2023 selfserv_9355 with PID 26505 started at Wed Oct 18 14:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26505 at Wed Oct 18 14:16:59 UTC 2023 kill -USR1 26505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26505 killed at Wed Oct 18 14:16:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:16:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26557 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26557 found at Wed Oct 18 14:16:59 UTC 2023 selfserv_9355 with PID 26557 started at Wed Oct 18 14:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26557 at Wed Oct 18 14:17:00 UTC 2023 kill -USR1 26557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26557 killed at Wed Oct 18 14:17:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:17:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26609 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26609 found at Wed Oct 18 14:17:00 UTC 2023 selfserv_9355 with PID 26609 started at Wed Oct 18 14:17:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26609 at Wed Oct 18 14:17:00 UTC 2023 kill -USR1 26609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26609 killed at Wed Oct 18 14:17:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26661 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26661 found at Wed Oct 18 14:17:01 UTC 2023 selfserv_9355 with PID 26661 started at Wed Oct 18 14:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26661 at Wed Oct 18 14:17:01 UTC 2023 kill -USR1 26661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26661 killed at Wed Oct 18 14:17:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:17:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26713 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26713 found at Wed Oct 18 14:17:01 UTC 2023 selfserv_9355 with PID 26713 started at Wed Oct 18 14:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26713 at Wed Oct 18 14:17:02 UTC 2023 kill -USR1 26713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26713 killed at Wed Oct 18 14:17:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26765 found at Wed Oct 18 14:17:02 UTC 2023 selfserv_9355 with PID 26765 started at Wed Oct 18 14:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26765 at Wed Oct 18 14:17:02 UTC 2023 kill -USR1 26765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26765 killed at Wed Oct 18 14:17:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:17:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26817 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26817 found at Wed Oct 18 14:17:03 UTC 2023 selfserv_9355 with PID 26817 started at Wed Oct 18 14:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26817 at Wed Oct 18 14:17:03 UTC 2023 kill -USR1 26817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26817 killed at Wed Oct 18 14:17:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26869 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26869 found at Wed Oct 18 14:17:03 UTC 2023 selfserv_9355 with PID 26869 started at Wed Oct 18 14:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26869 at Wed Oct 18 14:17:04 UTC 2023 kill -USR1 26869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26869 killed at Wed Oct 18 14:17:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26921 found at Wed Oct 18 14:17:04 UTC 2023 selfserv_9355 with PID 26921 started at Wed Oct 18 14:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26921 at Wed Oct 18 14:17:04 UTC 2023 kill -USR1 26921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26921 killed at Wed Oct 18 14:17:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26973 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26973 found at Wed Oct 18 14:17:04 UTC 2023 selfserv_9355 with PID 26973 started at Wed Oct 18 14:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26973 at Wed Oct 18 14:17:05 UTC 2023 kill -USR1 26973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26973 killed at Wed Oct 18 14:17:05 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:17:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27055 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27055 found at Wed Oct 18 14:17:05 UTC 2023 selfserv_9355 with PID 27055 started at Wed Oct 18 14:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27055 at Wed Oct 18 14:17:05 UTC 2023 kill -USR1 27055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27055 killed at Wed Oct 18 14:17:05 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27097 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27097 found at Wed Oct 18 14:17:05 UTC 2023 selfserv_9355 with PID 27097 started at Wed Oct 18 14:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27097 at Wed Oct 18 14:17:06 UTC 2023 kill -USR1 27097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27097 killed at Wed Oct 18 14:17:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27136 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27136 found at Wed Oct 18 14:17:06 UTC 2023 selfserv_9355 with PID 27136 started at Wed Oct 18 14:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 27136 at Wed Oct 18 14:17:06 UTC 2023 kill -USR1 27136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27136 killed at Wed Oct 18 14:17:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27175 found at Wed Oct 18 14:17:06 UTC 2023 selfserv_9355 with PID 27175 started at Wed Oct 18 14:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27175 at Wed Oct 18 14:17:06 UTC 2023 kill -USR1 27175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27175 killed at Wed Oct 18 14:17:06 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27214 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27214 found at Wed Oct 18 14:17:07 UTC 2023 selfserv_9355 with PID 27214 started at Wed Oct 18 14:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 27214 at Wed Oct 18 14:17:07 UTC 2023 kill -USR1 27214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27214 killed at Wed Oct 18 14:17:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27253 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27253 found at Wed Oct 18 14:17:07 UTC 2023 selfserv_9355 with PID 27253 started at Wed Oct 18 14:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27253 at Wed Oct 18 14:17:07 UTC 2023 kill -USR1 27253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27253 killed at Wed Oct 18 14:17:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27292 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27292 found at Wed Oct 18 14:17:07 UTC 2023 selfserv_9355 with PID 27292 started at Wed Oct 18 14:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27292 at Wed Oct 18 14:17:08 UTC 2023 kill -USR1 27292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27292 killed at Wed Oct 18 14:17:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27331 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27331 found at Wed Oct 18 14:17:08 UTC 2023 selfserv_9355 with PID 27331 started at Wed Oct 18 14:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27331 at Wed Oct 18 14:17:08 UTC 2023 kill -USR1 27331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27331 killed at Wed Oct 18 14:17:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27370 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27370 found at Wed Oct 18 14:17:08 UTC 2023 selfserv_9355 with PID 27370 started at Wed Oct 18 14:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27370 at Wed Oct 18 14:17:08 UTC 2023 kill -USR1 27370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27370 killed at Wed Oct 18 14:17:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27410 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27410 found at Wed Oct 18 14:17:09 UTC 2023 selfserv_9355 with PID 27410 started at Wed Oct 18 14:17:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27410 at Wed Oct 18 14:17:09 UTC 2023 kill -USR1 27410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27410 killed at Wed Oct 18 14:17:09 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27450 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27450 found at Wed Oct 18 14:17:09 UTC 2023 selfserv_9355 with PID 27450 started at Wed Oct 18 14:17:09 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27450 at Wed Oct 18 14:17:09 UTC 2023 kill -USR1 27450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27450 killed at Wed Oct 18 14:17:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27490 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27490 found at Wed Oct 18 14:17:09 UTC 2023 selfserv_9355 with PID 27490 started at Wed Oct 18 14:17:09 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27490 at Wed Oct 18 14:17:09 UTC 2023 kill -USR1 27490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27490 killed at Wed Oct 18 14:17:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27530 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27530 found at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 with PID 27530 started at Wed Oct 18 14:17:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27530 at Wed Oct 18 14:17:10 UTC 2023 kill -USR1 27530 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27530 killed at Wed Oct 18 14:17:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27572 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27572 found at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 with PID 27572 started at Wed Oct 18 14:17:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27572 at Wed Oct 18 14:17:10 UTC 2023 kill -USR1 27572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27572 killed at Wed Oct 18 14:17:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27612 found at Wed Oct 18 14:17:10 UTC 2023 selfserv_9355 with PID 27612 started at Wed Oct 18 14:17:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27612 at Wed Oct 18 14:17:11 UTC 2023 kill -USR1 27612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27612 killed at Wed Oct 18 14:17:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27652 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27652 found at Wed Oct 18 14:17:11 UTC 2023 selfserv_9355 with PID 27652 started at Wed Oct 18 14:17:11 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27652 at Wed Oct 18 14:17:11 UTC 2023 kill -USR1 27652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27652 killed at Wed Oct 18 14:17:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27692 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27692 found at Wed Oct 18 14:17:11 UTC 2023 selfserv_9355 with PID 27692 started at Wed Oct 18 14:17:11 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27692 at Wed Oct 18 14:17:11 UTC 2023 kill -USR1 27692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27692 killed at Wed Oct 18 14:17:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27732 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27732 found at Wed Oct 18 14:17:12 UTC 2023 selfserv_9355 with PID 27732 started at Wed Oct 18 14:17:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27732 at Wed Oct 18 14:17:12 UTC 2023 kill -USR1 27732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27732 killed at Wed Oct 18 14:17:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:17:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27772 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27772 found at Wed Oct 18 14:17:12 UTC 2023 selfserv_9355 with PID 27772 started at Wed Oct 18 14:17:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27772 at Wed Oct 18 14:17:12 UTC 2023 kill -USR1 27772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27772 killed at Wed Oct 18 14:17:12 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 14:17:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 27894 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27894 found at Wed Oct 18 14:17:13 UTC 2023 selfserv_9355 with PID 27894 started at Wed Oct 18 14:17:13 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 27894 at Wed Oct 18 14:17:22 UTC 2023 kill -USR1 27894 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27894 killed at Wed Oct 18 14:17:22 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:17:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 28452 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28452 found at Wed Oct 18 14:17:23 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 28452 started at Wed Oct 18 14:17:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28452 at Wed Oct 18 14:17:37 UTC 2023 kill -USR1 28452 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28452 killed at Wed Oct 18 14:17:38 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 14:17:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29252 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29252 found at Wed Oct 18 14:17:38 UTC 2023 selfserv_9355 with PID 29252 started at Wed Oct 18 14:17:38 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29252 at Wed Oct 18 14:17:38 UTC 2023 kill -USR1 29252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29252 killed at Wed Oct 18 14:17:38 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:17:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29330 found at Wed Oct 18 14:17:38 UTC 2023 selfserv_9355 with PID 29330 started at Wed Oct 18 14:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29330 at Wed Oct 18 14:17:39 UTC 2023 kill -USR1 29330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29330 killed at Wed Oct 18 14:17:39 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:17:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:17:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29382 found at Wed Oct 18 14:17:39 UTC 2023 selfserv_9355 with PID 29382 started at Wed Oct 18 14:17:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29382 at Wed Oct 18 14:18:03 UTC 2023 kill -USR1 29382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29382 killed at Wed Oct 18 14:18:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29434 found at Wed Oct 18 14:18:03 UTC 2023 selfserv_9355 with PID 29434 started at Wed Oct 18 14:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29434 at Wed Oct 18 14:18:04 UTC 2023 kill -USR1 29434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29434 killed at Wed Oct 18 14:18:04 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29498 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29498 found at Wed Oct 18 14:18:04 UTC 2023 selfserv_9355 with PID 29498 started at Wed Oct 18 14:18:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29498 at Wed Oct 18 14:18:05 UTC 2023 kill -USR1 29498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29498 killed at Wed Oct 18 14:18:05 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:18:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29550 found at Wed Oct 18 14:18:05 UTC 2023 selfserv_9355 with PID 29550 started at Wed Oct 18 14:18:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29550 at Wed Oct 18 14:18:28 UTC 2023 kill -USR1 29550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29550 killed at Wed Oct 18 14:18:28 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29613 found at Wed Oct 18 14:18:28 UTC 2023 selfserv_9355 with PID 29613 started at Wed Oct 18 14:18:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29613 at Wed Oct 18 14:18:29 UTC 2023 kill -USR1 29613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29613 killed at Wed Oct 18 14:18:29 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29677 found at Wed Oct 18 14:18:29 UTC 2023 selfserv_9355 with PID 29677 started at Wed Oct 18 14:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29677 at Wed Oct 18 14:18:30 UTC 2023 kill -USR1 29677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29677 killed at Wed Oct 18 14:18:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:18:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29729 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29729 found at Wed Oct 18 14:18:30 UTC 2023 selfserv_9355 with PID 29729 started at Wed Oct 18 14:18:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29729 at Wed Oct 18 14:18:54 UTC 2023 kill -USR1 29729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29729 killed at Wed Oct 18 14:18:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29781 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29781 found at Wed Oct 18 14:18:54 UTC 2023 selfserv_9355 with PID 29781 started at Wed Oct 18 14:18:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29781 at Wed Oct 18 14:18:55 UTC 2023 kill -USR1 29781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29781 killed at Wed Oct 18 14:18:55 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:18:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29845 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29845 found at Wed Oct 18 14:18:55 UTC 2023 selfserv_9355 with PID 29845 started at Wed Oct 18 14:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29845 at Wed Oct 18 14:18:56 UTC 2023 kill -USR1 29845 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29845 killed at Wed Oct 18 14:18:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:18:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:18:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29897 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29897 found at Wed Oct 18 14:18:56 UTC 2023 selfserv_9355 with PID 29897 started at Wed Oct 18 14:18:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29897 at Wed Oct 18 14:19:20 UTC 2023 kill -USR1 29897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29897 killed at Wed Oct 18 14:19:20 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29954 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29954 found at Wed Oct 18 14:19:20 UTC 2023 selfserv_9355 with PID 29954 started at Wed Oct 18 14:19:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29954 at Wed Oct 18 14:19:21 UTC 2023 kill -USR1 29954 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29954 killed at Wed Oct 18 14:19:21 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30020 found at Wed Oct 18 14:19:21 UTC 2023 selfserv_9355 with PID 30020 started at Wed Oct 18 14:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30020 at Wed Oct 18 14:19:22 UTC 2023 kill -USR1 30020 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30020 killed at Wed Oct 18 14:19:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:19:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30072 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30072 found at Wed Oct 18 14:19:22 UTC 2023 selfserv_9355 with PID 30072 started at Wed Oct 18 14:19:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30072 at Wed Oct 18 14:19:45 UTC 2023 kill -USR1 30072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30072 killed at Wed Oct 18 14:19:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30128 found at Wed Oct 18 14:19:46 UTC 2023 selfserv_9355 with PID 30128 started at Wed Oct 18 14:19:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30128 at Wed Oct 18 14:19:46 UTC 2023 kill -USR1 30128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30128 killed at Wed Oct 18 14:19:46 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30184 found at Wed Oct 18 14:19:46 UTC 2023 selfserv_9355 with PID 30184 started at Wed Oct 18 14:19:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30184 at Wed Oct 18 14:19:47 UTC 2023 kill -USR1 30184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30184 killed at Wed Oct 18 14:19:47 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30240 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30240 found at Wed Oct 18 14:19:47 UTC 2023 selfserv_9355 with PID 30240 started at Wed Oct 18 14:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30240 at Wed Oct 18 14:19:47 UTC 2023 kill -USR1 30240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30240 killed at Wed Oct 18 14:19:48 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:19:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30296 found at Wed Oct 18 14:19:48 UTC 2023 selfserv_9355 with PID 30296 started at Wed Oct 18 14:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30296 at Wed Oct 18 14:19:48 UTC 2023 kill -USR1 30296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30296 killed at Wed Oct 18 14:19:48 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:19:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30356 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30356 found at Wed Oct 18 14:19:48 UTC 2023 selfserv_9355 with PID 30356 started at Wed Oct 18 14:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30356 at Wed Oct 18 14:20:13 UTC 2023 kill -USR1 30356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30356 killed at Wed Oct 18 14:20:13 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:20:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30408 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30408 found at Wed Oct 18 14:20:13 UTC 2023 selfserv_9355 with PID 30408 started at Wed Oct 18 14:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30408 at Wed Oct 18 14:20:13 UTC 2023 kill -USR1 30408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30408 killed at Wed Oct 18 14:20:13 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:20:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30468 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30468 found at Wed Oct 18 14:20:14 UTC 2023 selfserv_9355 with PID 30468 started at Wed Oct 18 14:20:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30468 at Wed Oct 18 14:20:37 UTC 2023 kill -USR1 30468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30468 killed at Wed Oct 18 14:20:37 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:20:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:20:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30531 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30531 found at Wed Oct 18 14:20:37 UTC 2023 selfserv_9355 with PID 30531 started at Wed Oct 18 14:20:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30531 at Wed Oct 18 14:20:37 UTC 2023 kill -USR1 30531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30531 killed at Wed Oct 18 14:20:37 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:20:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:20:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30591 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30591 found at Wed Oct 18 14:20:38 UTC 2023 selfserv_9355 with PID 30591 started at Wed Oct 18 14:20:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30591 at Wed Oct 18 14:21:02 UTC 2023 kill -USR1 30591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30591 killed at Wed Oct 18 14:21:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:21:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30643 found at Wed Oct 18 14:21:02 UTC 2023 selfserv_9355 with PID 30643 started at Wed Oct 18 14:21:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30643 at Wed Oct 18 14:21:03 UTC 2023 kill -USR1 30643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30643 killed at Wed Oct 18 14:21:03 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:21:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30703 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30703 found at Wed Oct 18 14:21:03 UTC 2023 selfserv_9355 with PID 30703 started at Wed Oct 18 14:21:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30703 at Wed Oct 18 14:21:27 UTC 2023 kill -USR1 30703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30703 killed at Wed Oct 18 14:21:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:21:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30766 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30766 found at Wed Oct 18 14:21:27 UTC 2023 selfserv_9355 with PID 30766 started at Wed Oct 18 14:21:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30766 at Wed Oct 18 14:21:28 UTC 2023 kill -USR1 30766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30766 killed at Wed Oct 18 14:21:28 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:21:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30826 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30826 found at Wed Oct 18 14:21:28 UTC 2023 selfserv_9355 with PID 30826 started at Wed Oct 18 14:21:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30826 at Wed Oct 18 14:21:51 UTC 2023 kill -USR1 30826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30826 killed at Wed Oct 18 14:21:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:21:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30878 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30878 found at Wed Oct 18 14:21:52 UTC 2023 selfserv_9355 with PID 30878 started at Wed Oct 18 14:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30878 at Wed Oct 18 14:21:52 UTC 2023 kill -USR1 30878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30878 killed at Wed Oct 18 14:21:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:21:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30930 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30930 found at Wed Oct 18 14:21:52 UTC 2023 selfserv_9355 with PID 30930 started at Wed Oct 18 14:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30930 at Wed Oct 18 14:21:53 UTC 2023 kill -USR1 30930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30930 killed at Wed Oct 18 14:21:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:21:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30982 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30982 found at Wed Oct 18 14:21:53 UTC 2023 selfserv_9355 with PID 30982 started at Wed Oct 18 14:21:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30982 at Wed Oct 18 14:21:54 UTC 2023 kill -USR1 30982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30982 killed at Wed Oct 18 14:21:54 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:21:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31040 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31040 found at Wed Oct 18 14:21:54 UTC 2023 selfserv_9355 with PID 31040 started at Wed Oct 18 14:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31040 at Wed Oct 18 14:21:54 UTC 2023 kill -USR1 31040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31040 killed at Wed Oct 18 14:21:54 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:21:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31098 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31098 found at Wed Oct 18 14:21:54 UTC 2023 selfserv_9355 with PID 31098 started at Wed Oct 18 14:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31098 at Wed Oct 18 14:21:55 UTC 2023 kill -USR1 31098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31098 killed at Wed Oct 18 14:21:55 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:21:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31156 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31156 found at Wed Oct 18 14:21:55 UTC 2023 selfserv_9355 with PID 31156 started at Wed Oct 18 14:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31156 at Wed Oct 18 14:21:55 UTC 2023 kill -USR1 31156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31156 killed at Wed Oct 18 14:21:55 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:21:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31214 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31214 found at Wed Oct 18 14:21:55 UTC 2023 selfserv_9355 with PID 31214 started at Wed Oct 18 14:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31214 at Wed Oct 18 14:21:56 UTC 2023 kill -USR1 31214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31214 killed at Wed Oct 18 14:21:56 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 14:21:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31272 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31272 found at Wed Oct 18 14:21:56 UTC 2023 selfserv_9355 with PID 31272 started at Wed Oct 18 14:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31272 at Wed Oct 18 14:21:56 UTC 2023 kill -USR1 31272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31272 killed at Wed Oct 18 14:21:56 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 14:21:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31330 found at Wed Oct 18 14:21:56 UTC 2023 selfserv_9355 with PID 31330 started at Wed Oct 18 14:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31330 at Wed Oct 18 14:21:57 UTC 2023 kill -USR1 31330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31330 killed at Wed Oct 18 14:21:57 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 14:21:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31388 found at Wed Oct 18 14:21:57 UTC 2023 selfserv_9355 with PID 31388 started at Wed Oct 18 14:21:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31388 at Wed Oct 18 14:21:57 UTC 2023 kill -USR1 31388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31388 killed at Wed Oct 18 14:21:57 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:21:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31446 found at Wed Oct 18 14:21:57 UTC 2023 selfserv_9355 with PID 31446 started at Wed Oct 18 14:21:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31446 at Wed Oct 18 14:21:58 UTC 2023 kill -USR1 31446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31446 killed at Wed Oct 18 14:21:58 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 14:21:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31504 found at Wed Oct 18 14:21:58 UTC 2023 selfserv_9355 with PID 31504 started at Wed Oct 18 14:21:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31504 at Wed Oct 18 14:21:58 UTC 2023 kill -USR1 31504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31504 killed at Wed Oct 18 14:21:58 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 14:21:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31562 found at Wed Oct 18 14:21:58 UTC 2023 selfserv_9355 with PID 31562 started at Wed Oct 18 14:21:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31562 at Wed Oct 18 14:21:58 UTC 2023 kill -USR1 31562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31562 killed at Wed Oct 18 14:21:59 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31604 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31604 found at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 with PID 31604 started at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31604 at Wed Oct 18 14:21:59 UTC 2023 kill -USR1 31604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31604 killed at Wed Oct 18 14:21:59 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31646 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31646 found at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 with PID 31646 started at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 31646 at Wed Oct 18 14:21:59 UTC 2023 kill -USR1 31646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31646 killed at Wed Oct 18 14:21:59 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31688 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31688 found at Wed Oct 18 14:21:59 UTC 2023 selfserv_9355 with PID 31688 started at Wed Oct 18 14:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 31688 at Wed Oct 18 14:22:00 UTC 2023 kill -USR1 31688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31688 killed at Wed Oct 18 14:22:00 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 14:22:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31730 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31730 found at Wed Oct 18 14:22:00 UTC 2023 selfserv_9355 with PID 31730 started at Wed Oct 18 14:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 31730 at Wed Oct 18 14:22:00 UTC 2023 kill -USR1 31730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31730 killed at Wed Oct 18 14:22:00 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 14:22:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31772 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31772 found at Wed Oct 18 14:22:00 UTC 2023 selfserv_9355 with PID 31772 started at Wed Oct 18 14:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 31772 at Wed Oct 18 14:22:00 UTC 2023 kill -USR1 31772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31772 killed at Wed Oct 18 14:22:01 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31814 found at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 with PID 31814 started at Wed Oct 18 14:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 31814 at Wed Oct 18 14:22:01 UTC 2023 kill -USR1 31814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31814 killed at Wed Oct 18 14:22:01 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31856 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31856 found at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 with PID 31856 started at Wed Oct 18 14:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 31856 at Wed Oct 18 14:22:01 UTC 2023 kill -USR1 31856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31856 killed at Wed Oct 18 14:22:01 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31898 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31898 found at Wed Oct 18 14:22:01 UTC 2023 selfserv_9355 with PID 31898 started at Wed Oct 18 14:22:01 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:22:01 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:22:44 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 31898 at Wed Oct 18 14:22:44 UTC 2023 kill -USR1 31898 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31898 killed at Wed Oct 18 14:22:45 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:22:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31960 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31960 found at Wed Oct 18 14:22:45 UTC 2023 selfserv_9355 with PID 31960 started at Wed Oct 18 14:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31960 at Wed Oct 18 14:22:45 UTC 2023 kill -USR1 31960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31960 killed at Wed Oct 18 14:22:45 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32002 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32002 found at Wed Oct 18 14:22:45 UTC 2023 selfserv_9355 with PID 32002 started at Wed Oct 18 14:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32002 at Wed Oct 18 14:22:45 UTC 2023 kill -USR1 32002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32002 killed at Wed Oct 18 14:22:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32041 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32041 found at Wed Oct 18 14:22:46 UTC 2023 selfserv_9355 with PID 32041 started at Wed Oct 18 14:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 32041 at Wed Oct 18 14:22:46 UTC 2023 kill -USR1 32041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32041 killed at Wed Oct 18 14:22:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32080 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32080 found at Wed Oct 18 14:22:46 UTC 2023 selfserv_9355 with PID 32080 started at Wed Oct 18 14:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32080 at Wed Oct 18 14:22:46 UTC 2023 kill -USR1 32080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32080 killed at Wed Oct 18 14:22:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32119 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32119 found at Wed Oct 18 14:22:46 UTC 2023 selfserv_9355 with PID 32119 started at Wed Oct 18 14:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 32119 at Wed Oct 18 14:22:47 UTC 2023 kill -USR1 32119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32119 killed at Wed Oct 18 14:22:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32158 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32158 found at Wed Oct 18 14:22:47 UTC 2023 selfserv_9355 with PID 32158 started at Wed Oct 18 14:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32158 at Wed Oct 18 14:22:47 UTC 2023 kill -USR1 32158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32158 killed at Wed Oct 18 14:22:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32197 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32197 found at Wed Oct 18 14:22:47 UTC 2023 selfserv_9355 with PID 32197 started at Wed Oct 18 14:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32197 at Wed Oct 18 14:22:47 UTC 2023 kill -USR1 32197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32197 killed at Wed Oct 18 14:22:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32236 found at Wed Oct 18 14:22:48 UTC 2023 selfserv_9355 with PID 32236 started at Wed Oct 18 14:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32236 at Wed Oct 18 14:22:48 UTC 2023 kill -USR1 32236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32236 killed at Wed Oct 18 14:22:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32275 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32275 found at Wed Oct 18 14:22:48 UTC 2023 selfserv_9355 with PID 32275 started at Wed Oct 18 14:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32275 at Wed Oct 18 14:22:48 UTC 2023 kill -USR1 32275 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32275 killed at Wed Oct 18 14:22:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32314 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32314 found at Wed Oct 18 14:22:48 UTC 2023 selfserv_9355 with PID 32314 started at Wed Oct 18 14:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32314 at Wed Oct 18 14:22:48 UTC 2023 kill -USR1 32314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32314 killed at Wed Oct 18 14:22:49 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32353 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32353 found at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 with PID 32353 started at Wed Oct 18 14:22:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32353 at Wed Oct 18 14:22:49 UTC 2023 kill -USR1 32353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32353 killed at Wed Oct 18 14:22:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32393 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32393 found at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 with PID 32393 started at Wed Oct 18 14:22:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32393 at Wed Oct 18 14:22:49 UTC 2023 kill -USR1 32393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32393 killed at Wed Oct 18 14:22:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32433 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32433 found at Wed Oct 18 14:22:49 UTC 2023 selfserv_9355 with PID 32433 started at Wed Oct 18 14:22:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32433 at Wed Oct 18 14:22:50 UTC 2023 kill -USR1 32433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32433 killed at Wed Oct 18 14:22:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32473 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32473 found at Wed Oct 18 14:22:50 UTC 2023 selfserv_9355 with PID 32473 started at Wed Oct 18 14:22:50 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32473 at Wed Oct 18 14:22:50 UTC 2023 kill -USR1 32473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32473 killed at Wed Oct 18 14:22:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32513 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32513 found at Wed Oct 18 14:22:50 UTC 2023 selfserv_9355 with PID 32513 started at Wed Oct 18 14:22:50 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32513 at Wed Oct 18 14:22:50 UTC 2023 kill -USR1 32513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32513 killed at Wed Oct 18 14:22:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32553 found at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 with PID 32553 started at Wed Oct 18 14:22:51 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32553 at Wed Oct 18 14:22:51 UTC 2023 kill -USR1 32553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32553 killed at Wed Oct 18 14:22:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32593 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32593 found at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 with PID 32593 started at Wed Oct 18 14:22:51 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32593 at Wed Oct 18 14:22:51 UTC 2023 kill -USR1 32593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32593 killed at Wed Oct 18 14:22:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32633 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32633 found at Wed Oct 18 14:22:51 UTC 2023 selfserv_9355 with PID 32633 started at Wed Oct 18 14:22:51 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32633 at Wed Oct 18 14:22:52 UTC 2023 kill -USR1 32633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32633 killed at Wed Oct 18 14:22:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:22:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32673 found at Wed Oct 18 14:22:52 UTC 2023 selfserv_9355 with PID 32673 started at Wed Oct 18 14:22:52 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32673 at Wed Oct 18 14:22:52 UTC 2023 kill -USR1 32673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32673 killed at Wed Oct 18 14:22:52 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 14:22:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:22:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 32713 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32713 found at Wed Oct 18 14:22:52 UTC 2023 selfserv_9355 with PID 32713 started at Wed Oct 18 14:22:52 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 32713 at Wed Oct 18 14:23:01 UTC 2023 kill -USR1 32713 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32713 killed at Wed Oct 18 14:23:01 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 14:23:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 836 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 836 found at Wed Oct 18 14:23:01 UTC 2023 selfserv_9355 with PID 836 started at Wed Oct 18 14:23:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 836 at Wed Oct 18 14:23:14 UTC 2023 kill -USR1 836 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 836 killed at Wed Oct 18 14:23:14 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:23:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1677 found at Wed Oct 18 14:23:14 UTC 2023 selfserv_9355 with PID 1677 started at Wed Oct 18 14:23:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1677 at Wed Oct 18 14:23:15 UTC 2023 kill -USR1 1677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1677 killed at Wed Oct 18 14:23:15 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:23:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1729 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1729 found at Wed Oct 18 14:23:15 UTC 2023 selfserv_9355 with PID 1729 started at Wed Oct 18 14:23:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1729 at Wed Oct 18 14:23:40 UTC 2023 kill -USR1 1729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1729 killed at Wed Oct 18 14:23:40 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:23:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1792 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1792 found at Wed Oct 18 14:23:40 UTC 2023 selfserv_9355 with PID 1792 started at Wed Oct 18 14:23:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1792 at Wed Oct 18 14:23:41 UTC 2023 kill -USR1 1792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1792 killed at Wed Oct 18 14:23:41 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:23:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1856 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1856 found at Wed Oct 18 14:23:41 UTC 2023 selfserv_9355 with PID 1856 started at Wed Oct 18 14:23:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1856 at Wed Oct 18 14:23:41 UTC 2023 kill -USR1 1856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1856 killed at Wed Oct 18 14:23:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:23:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:23:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1909 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1909 found at Wed Oct 18 14:23:41 UTC 2023 selfserv_9355 with PID 1909 started at Wed Oct 18 14:23:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1909 at Wed Oct 18 14:24:05 UTC 2023 kill -USR1 1909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1909 killed at Wed Oct 18 14:24:05 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1961 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1961 found at Wed Oct 18 14:24:05 UTC 2023 selfserv_9355 with PID 1961 started at Wed Oct 18 14:24:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1961 at Wed Oct 18 14:24:05 UTC 2023 kill -USR1 1961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1961 killed at Wed Oct 18 14:24:05 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2025 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2025 found at Wed Oct 18 14:24:06 UTC 2023 selfserv_9355 with PID 2025 started at Wed Oct 18 14:24:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2025 at Wed Oct 18 14:24:06 UTC 2023 kill -USR1 2025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2025 killed at Wed Oct 18 14:24:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:24:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2077 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2077 found at Wed Oct 18 14:24:06 UTC 2023 selfserv_9355 with PID 2077 started at Wed Oct 18 14:24:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2077 at Wed Oct 18 14:24:31 UTC 2023 kill -USR1 2077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2077 killed at Wed Oct 18 14:24:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2140 found at Wed Oct 18 14:24:32 UTC 2023 selfserv_9355 with PID 2140 started at Wed Oct 18 14:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2140 at Wed Oct 18 14:24:32 UTC 2023 kill -USR1 2140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2140 killed at Wed Oct 18 14:24:32 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2204 found at Wed Oct 18 14:24:32 UTC 2023 selfserv_9355 with PID 2204 started at Wed Oct 18 14:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2204 at Wed Oct 18 14:24:33 UTC 2023 kill -USR1 2204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2204 killed at Wed Oct 18 14:24:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:24:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2256 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2256 found at Wed Oct 18 14:24:33 UTC 2023 selfserv_9355 with PID 2256 started at Wed Oct 18 14:24:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2256 at Wed Oct 18 14:24:58 UTC 2023 kill -USR1 2256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2256 killed at Wed Oct 18 14:24:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2308 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2308 found at Wed Oct 18 14:24:58 UTC 2023 selfserv_9355 with PID 2308 started at Wed Oct 18 14:24:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2308 at Wed Oct 18 14:24:59 UTC 2023 kill -USR1 2308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2308 killed at Wed Oct 18 14:24:59 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:24:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:24:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2372 found at Wed Oct 18 14:24:59 UTC 2023 selfserv_9355 with PID 2372 started at Wed Oct 18 14:24:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2372 at Wed Oct 18 14:24:59 UTC 2023 kill -USR1 2372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2372 killed at Wed Oct 18 14:24:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:25:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2424 found at Wed Oct 18 14:25:00 UTC 2023 selfserv_9355 with PID 2424 started at Wed Oct 18 14:25:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2424 at Wed Oct 18 14:25:23 UTC 2023 kill -USR1 2424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2424 killed at Wed Oct 18 14:25:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:25:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2485 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2485 found at Wed Oct 18 14:25:23 UTC 2023 selfserv_9355 with PID 2485 started at Wed Oct 18 14:25:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2485 at Wed Oct 18 14:25:24 UTC 2023 kill -USR1 2485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2485 killed at Wed Oct 18 14:25:24 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:25:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2541 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2541 found at Wed Oct 18 14:25:24 UTC 2023 selfserv_9355 with PID 2541 started at Wed Oct 18 14:25:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2541 at Wed Oct 18 14:25:24 UTC 2023 kill -USR1 2541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2541 killed at Wed Oct 18 14:25:24 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:25:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2599 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2599 found at Wed Oct 18 14:25:24 UTC 2023 selfserv_9355 with PID 2599 started at Wed Oct 18 14:25:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2599 at Wed Oct 18 14:25:25 UTC 2023 kill -USR1 2599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2599 killed at Wed Oct 18 14:25:25 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:25:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2655 found at Wed Oct 18 14:25:25 UTC 2023 selfserv_9355 with PID 2655 started at Wed Oct 18 14:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2655 at Wed Oct 18 14:25:25 UTC 2023 kill -USR1 2655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2655 killed at Wed Oct 18 14:25:25 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:25:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2715 found at Wed Oct 18 14:25:25 UTC 2023 selfserv_9355 with PID 2715 started at Wed Oct 18 14:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2715 at Wed Oct 18 14:25:51 UTC 2023 kill -USR1 2715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2715 killed at Wed Oct 18 14:25:51 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:25:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2767 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2767 found at Wed Oct 18 14:25:51 UTC 2023 selfserv_9355 with PID 2767 started at Wed Oct 18 14:25:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2767 at Wed Oct 18 14:25:51 UTC 2023 kill -USR1 2767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2767 killed at Wed Oct 18 14:25:51 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:25:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:25:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2827 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2827 found at Wed Oct 18 14:25:52 UTC 2023 selfserv_9355 with PID 2827 started at Wed Oct 18 14:25:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2827 at Wed Oct 18 14:26:15 UTC 2023 kill -USR1 2827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2827 killed at Wed Oct 18 14:26:15 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:26:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:26:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 14:26:15 UTC 2023 selfserv_9355 with PID 2879 started at Wed Oct 18 14:26:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2879 at Wed Oct 18 14:26:15 UTC 2023 kill -USR1 2879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2879 killed at Wed Oct 18 14:26:15 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:26:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:26:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2939 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2939 found at Wed Oct 18 14:26:16 UTC 2023 selfserv_9355 with PID 2939 started at Wed Oct 18 14:26:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2939 at Wed Oct 18 14:26:41 UTC 2023 kill -USR1 2939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2939 killed at Wed Oct 18 14:26:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:26:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:26:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3002 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3002 found at Wed Oct 18 14:26:41 UTC 2023 selfserv_9355 with PID 3002 started at Wed Oct 18 14:26:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3002 at Wed Oct 18 14:26:41 UTC 2023 kill -USR1 3002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3002 killed at Wed Oct 18 14:26:41 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:26:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:26:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3062 found at Wed Oct 18 14:26:42 UTC 2023 selfserv_9355 with PID 3062 started at Wed Oct 18 14:26:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3062 at Wed Oct 18 14:27:07 UTC 2023 kill -USR1 3062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3062 killed at Wed Oct 18 14:27:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:27:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3114 found at Wed Oct 18 14:27:07 UTC 2023 selfserv_9355 with PID 3114 started at Wed Oct 18 14:27:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3114 at Wed Oct 18 14:27:07 UTC 2023 kill -USR1 3114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3114 killed at Wed Oct 18 14:27:08 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:27:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3174 found at Wed Oct 18 14:27:08 UTC 2023 selfserv_9355 with PID 3174 started at Wed Oct 18 14:27:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3174 at Wed Oct 18 14:27:31 UTC 2023 kill -USR1 3174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3174 killed at Wed Oct 18 14:27:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:27:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3237 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3237 found at Wed Oct 18 14:27:31 UTC 2023 selfserv_9355 with PID 3237 started at Wed Oct 18 14:27:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3237 at Wed Oct 18 14:27:32 UTC 2023 kill -USR1 3237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3237 killed at Wed Oct 18 14:27:32 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:27:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3289 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3289 found at Wed Oct 18 14:27:32 UTC 2023 selfserv_9355 with PID 3289 started at Wed Oct 18 14:27:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3289 at Wed Oct 18 14:27:32 UTC 2023 kill -USR1 3289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3289 killed at Wed Oct 18 14:27:32 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:27:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3341 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3341 found at Wed Oct 18 14:27:33 UTC 2023 selfserv_9355 with PID 3341 started at Wed Oct 18 14:27:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3341 at Wed Oct 18 14:27:33 UTC 2023 kill -USR1 3341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3341 killed at Wed Oct 18 14:27:33 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 14:27:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3423 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3423 found at Wed Oct 18 14:27:33 UTC 2023 selfserv_9355 with PID 3423 started at Wed Oct 18 14:27:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3423 at Wed Oct 18 14:27:33 UTC 2023 kill -USR1 3423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3423 killed at Wed Oct 18 14:27:33 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3465 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3465 found at Wed Oct 18 14:27:34 UTC 2023 selfserv_9355 with PID 3465 started at Wed Oct 18 14:27:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3465 at Wed Oct 18 14:27:34 UTC 2023 kill -USR1 3465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3465 killed at Wed Oct 18 14:27:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3504 found at Wed Oct 18 14:27:34 UTC 2023 selfserv_9355 with PID 3504 started at Wed Oct 18 14:27:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 3504 at Wed Oct 18 14:27:34 UTC 2023 kill -USR1 3504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3504 killed at Wed Oct 18 14:27:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3543 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3543 found at Wed Oct 18 14:27:34 UTC 2023 selfserv_9355 with PID 3543 started at Wed Oct 18 14:27:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3543 at Wed Oct 18 14:27:34 UTC 2023 kill -USR1 3543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3543 killed at Wed Oct 18 14:27:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3582 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3582 found at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 with PID 3582 started at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 3582 at Wed Oct 18 14:27:35 UTC 2023 kill -USR1 3582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3582 killed at Wed Oct 18 14:27:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3621 found at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 with PID 3621 started at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3621 at Wed Oct 18 14:27:35 UTC 2023 kill -USR1 3621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3621 killed at Wed Oct 18 14:27:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3660 found at Wed Oct 18 14:27:35 UTC 2023 selfserv_9355 with PID 3660 started at Wed Oct 18 14:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3660 at Wed Oct 18 14:27:36 UTC 2023 kill -USR1 3660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3660 killed at Wed Oct 18 14:27:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3699 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3699 found at Wed Oct 18 14:27:36 UTC 2023 selfserv_9355 with PID 3699 started at Wed Oct 18 14:27:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3699 at Wed Oct 18 14:27:36 UTC 2023 kill -USR1 3699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3699 killed at Wed Oct 18 14:27:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3738 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3738 found at Wed Oct 18 14:27:36 UTC 2023 selfserv_9355 with PID 3738 started at Wed Oct 18 14:27:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3738 at Wed Oct 18 14:27:36 UTC 2023 kill -USR1 3738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3738 killed at Wed Oct 18 14:27:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3777 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3777 found at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 with PID 3777 started at Wed Oct 18 14:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3777 at Wed Oct 18 14:27:37 UTC 2023 kill -USR1 3777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3777 killed at Wed Oct 18 14:27:37 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3816 found at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 with PID 3816 started at Wed Oct 18 14:27:37 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3816 at Wed Oct 18 14:27:37 UTC 2023 kill -USR1 3816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3816 killed at Wed Oct 18 14:27:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3856 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3856 found at Wed Oct 18 14:27:37 UTC 2023 selfserv_9355 with PID 3856 started at Wed Oct 18 14:27:37 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3856 at Wed Oct 18 14:27:38 UTC 2023 kill -USR1 3856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3856 killed at Wed Oct 18 14:27:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3896 found at Wed Oct 18 14:27:38 UTC 2023 selfserv_9355 with PID 3896 started at Wed Oct 18 14:27:38 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3896 at Wed Oct 18 14:27:38 UTC 2023 kill -USR1 3896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3896 killed at Wed Oct 18 14:27:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3936 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3936 found at Wed Oct 18 14:27:38 UTC 2023 selfserv_9355 with PID 3936 started at Wed Oct 18 14:27:38 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3936 at Wed Oct 18 14:27:38 UTC 2023 kill -USR1 3936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3936 killed at Wed Oct 18 14:27:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3976 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3976 found at Wed Oct 18 14:27:39 UTC 2023 selfserv_9355 with PID 3976 started at Wed Oct 18 14:27:39 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3976 at Wed Oct 18 14:27:39 UTC 2023 kill -USR1 3976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3976 killed at Wed Oct 18 14:27:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4016 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4016 found at Wed Oct 18 14:27:39 UTC 2023 selfserv_9355 with PID 4016 started at Wed Oct 18 14:27:39 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4016 at Wed Oct 18 14:27:39 UTC 2023 kill -USR1 4016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4016 killed at Wed Oct 18 14:27:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4056 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4056 found at Wed Oct 18 14:27:39 UTC 2023 selfserv_9355 with PID 4056 started at Wed Oct 18 14:27:39 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4056 at Wed Oct 18 14:27:40 UTC 2023 kill -USR1 4056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4056 killed at Wed Oct 18 14:27:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4096 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4096 found at Wed Oct 18 14:27:40 UTC 2023 selfserv_9355 with PID 4096 started at Wed Oct 18 14:27:40 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4096 at Wed Oct 18 14:27:40 UTC 2023 kill -USR1 4096 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4096 killed at Wed Oct 18 14:27:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 14:27:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:27:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4136 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4136 found at Wed Oct 18 14:27:40 UTC 2023 selfserv_9355 with PID 4136 started at Wed Oct 18 14:27:40 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4136 at Wed Oct 18 14:27:40 UTC 2023 kill -USR1 4136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4136 killed at Wed Oct 18 14:27:40 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 14:27:41 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 14:27:41 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 14:27:41 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 14:27:41 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:29 2023 Not After : Wed Oct 18 13:43:29 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:b0:43:13:b4:5f:01:fb:4b:83:81:ee:fd:3b:10:48: 5c:27:3b:c7:dd:59:04:7f:29:09:8e:3e:29:07:4c:f7: 3d:e4:c5:5a:b8:6d:90:c5:25:5a:83:cd:32:19:33:2b: 12:1f:13:c6:c2:3c:77:81:ce:f8:76:3a:c8:52:2a:9e: 8b:23:d2:38:bf:ae:b4:7c:6b:a0:96:37:fc:e0:a5:c6: 8b:09:35:b5:77:e0:f5:f3:a5:e2:0b:e4:24:ec:7b:ec: 82:fa:7e:70:20:52:4b:df:da:d1:3d:56:84:9d:be:7d: 5a:8a:75:96:c4:4d:0e:e6:0f:a5:84:f5:5d:b7:99:fc: f9:3a:29:e8:24:1b:f9:53:b5:d6:f3:71:2b:aa:5b:d2: 69:62:6f:27:6b:8d:3d:86:54:89:f9:47:1f:e4:b3:44: af:03:d2:35:0b:b5:02:aa:af:c8:d8:db:09:19:ae:5f: 4f:da:cc:9e:99:88:4d:ec:af:e0:40:0f:13:db:bd:9f: ea:33:b9:12:32:81:4f:97:92:fa:81:1a:78:48:b7:c9: b0:3b:e9:89:3b:73:28:72:8e:d4:bd:26:0b:19:d7:6f: ae:57:be:97:4d:1a:8b:b6:2e:13:f5:34:c6:2d:ec:15: cf:44:13:14:ca:f1:f9:25:c1:7e:7d:02:1d:c7:84:91 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:14:f0:6e:e2:ca:e7:68:9c:be:cf:86:04:c2:56:33: 81:bf:b5:7e:ef:24:3c:0b:33:a1:03:1e:c3:49:29:e4: b2:45:07:25:85:f4:b9:d9:aa:1e:e3:d5:bf:e6:d5:db: cd:8c:96:30:3b:c3:d0:f6:e9:6a:63:af:a0:46:ae:b8: 38:f1:49:e8:db:f1:35:4a:4c:ed:ff:7e:4a:91:d3:aa: 45:fc:d7:e2:c5:c1:65:28:1c:e2:99:1f:b1:57:df:dd: 29:61:c6:2b:a7:9a:f3:28:4c:e5:36:e8:7e:ca:0b:ca: 6a:bc:c4:4c:8a:f0:4b:d0:dd:b1:60:aa:7c:40:66:31: 5f:0f:49:c0:31:64:b2:63:f4:07:9c:94:cc:00:22:82: 45:05:b3:3a:0b:4e:db:a1:17:c2:1b:0f:78:2a:92:82: a1:9a:f5:c8:e0:d4:09:06:d9:8d:07:3d:fa:0c:37:d4: 5b:57:ee:d6:bb:9c:43:37:18:63:bd:8b:b4:43:ae:75: f4:72:9b:43:ab:33:9d:b8:54:28:84:42:11:c0:cf:40: 42:0d:51:35:36:1f:5d:54:db:70:7a:d4:22:54:28:dd: 2d:a1:f5:ab:79:dd:70:66:d2:00:38:19:77:e3:7e:cf: 40:54:5a:88:3e:ae:e5:28:e2:1b:32:b4:da:e5:68:93 Fingerprint (SHA-256): C5:EA:C0:E0:AD:C0:98:43:7C:C1:61:D4:3F:54:E6:E9:A4:B9:AD:3B:AC:BB:38:FA:01:9D:B3:80:09:17:BF:39 Fingerprint (SHA1): C1:5E:A5:7A:60:C5:55:E0:FC:DD:3B:06:7C:25:02:4F:F1:0E:8B:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:32 2023 Not After : Wed Oct 18 13:43:32 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:eb:de:cd:8b:f8:4f:a1:58:50:3e:f6:e6:1a:21:cd: 7b:ee:d5:84:c5:e2:2d:e8:b0:6e:f9:c5:63:8c:ed:ce: 6f:a5:a3:49:87:86:a1:52:71:97:b5:94:a5:97:2e:8d: b5:c3:ad:d1:4e:56:4a:43:b2:5f:50:75:73:57:64:d4: 19:f7:ae:c4:46:5c:ec:ca:b7:67:64:61:9a:cb:54:03: d0:27:5e:3e:7f:b4:75:95:a3:ba:de:2b:69:24:bd:61: 02:87:47:1e:9d:fa:ee:ab:50:03:bb:fd:f5:bf:19:e7: ee:3f:0c:a4:dd:3a:56:64:f5:5d:7c:2d:d5:e2:4a:af: d2:6f:6f:d5:6e:85:5b:9f:1a:d0:6d:c0:03:c1:72:39: 70:fc:8b:58:23:bf:cd:57:59:13:af:e0:eb:e9:49:64: d1:55:f6:3f:99:51:0a:f7:8b:fd:0a:e3:e1:99:36:77: 2b:b0:10:1a:fb:68:3c:f4:61:02:77:ae:cc:ab:76:2e: 99:da:77:c4:06:14:c5:28:c2:d6:80:48:40:ef:c5:d3: 17:42:5f:fd:a0:6d:3c:ea:1f:c1:10:76:9f:35:f8:8a: b7:fc:ec:60:11:d7:05:46:5e:0d:e3:c9:6a:7e:27:18: 36:0a:32:93:0c:91:1f:a0:93:df:c1:a2:66:ec:8e:e7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:38:02:a0:12:f7:39:e4:fa:16:e7:da:9c:2c:d0:02: e3:d3:45:d8:d4:04:41:68:3b:df:21:2b:37:70:55:c4: 0e:e8:8c:69:fc:78:6b:80:29:cb:c2:7e:01:bb:71:5e: ec:ff:e8:5c:34:9d:de:b2:a6:41:d3:90:c2:68:94:9d: 00:aa:e2:c5:f3:5b:90:88:21:59:ac:26:11:4d:f9:88: b3:35:b2:41:16:5c:04:d9:71:74:25:36:d6:bc:7a:f4: f6:19:ab:99:79:55:c1:02:e3:d4:bd:19:8f:84:43:e9: ec:81:61:7f:cd:ca:fe:0d:fd:07:0f:63:ee:a9:95:aa: dc:d4:57:89:31:27:ea:75:9b:5b:c7:1a:ee:c0:79:34: 9c:ed:aa:04:2a:29:b2:86:f5:19:c4:fd:ac:74:dd:e3: c1:f3:a8:a7:ad:c1:d6:4d:ed:b7:6f:66:38:c5:24:7c: e2:fd:94:d2:90:b3:64:66:5f:19:64:59:26:43:97:73: 99:38:1f:f9:b8:84:b2:4a:4a:f8:92:41:ef:93:f6:53: 57:31:e1:25:83:43:f3:ff:3e:6c:ae:45:ac:26:1f:1c: 51:88:07:bc:1a:db:d3:37:4c:a8:9e:21:24:e2:2c:0d: 24:90:16:2b:e0:a7:4a:a6:59:0f:b7:38:e2:5e:dc:0d Fingerprint (SHA-256): D8:8B:DD:18:B8:C8:66:CD:5C:C9:65:8C:68:E9:51:48:7B:54:1D:26:D2:7B:31:75:1F:73:25:78:2E:AB:8C:DB Fingerprint (SHA1): 50:7F:45:C0:1F:4F:F8:41:89:BD:04:A8:8B:26:48:6C:3F:F5:6C:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, localhost-sni.localdomain-rsa-pss u,u,u serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Alice-rsa-pss u,u,u Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@example.com ,, bob-ec@example.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C chain-1-clientCA-ec ,, clientCA-dsa T,C,C chain-1-clientCA ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-1-clientCA-dsa ,, chain-2-clientCA ,, Alice #100 ,, Alice-dsa u,u,u Dave-rsa-pss u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@example.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.27434 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 13:44:03 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 13:41:19 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 13:43:58 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Wed Oct 18 14:27:44 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 14:27:44 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142745 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018142811Z nextupdate=20241018142811Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:28:11 2023 Next Update: Fri Oct 18 14:28:11 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018142812Z addcert 2 20231018142812Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:28:12 2023 Next Update: Fri Oct 18 14:28:11 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:12 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018142812Z nextupdate=20241018142812Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:28:12 2023 Next Update: Fri Oct 18 14:28:12 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018142813Z addcert 2 20231018142813Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:28:13 2023 Next Update: Fri Oct 18 14:28:12 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:13 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018142814Z addcert 4 20231018142814Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:28:14 2023 Next Update: Fri Oct 18 14:28:12 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:13 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 14:28:14 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018142814Z nextupdate=20241018142814Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:28:14 2023 Next Update: Fri Oct 18 14:28:14 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018142815Z addcert 2 20231018142815Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:28:15 2023 Next Update: Fri Oct 18 14:28:14 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:15 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018142816Z addcert 3 20231018142816Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:28:16 2023 Next Update: Fri Oct 18 14:28:14 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:15 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:28:16 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018142816Z nextupdate=20241018142816Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:28:16 2023 Next Update: Fri Oct 18 14:28:16 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018142817Z addcert 2 20231018142817Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:28:17 2023 Next Update: Fri Oct 18 14:28:16 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:17 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018142818Z addcert 3 20231018142818Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:28:18 2023 Next Update: Fri Oct 18 14:28:16 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:28:17 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:28:18 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142746 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142747 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018142748 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018142749 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018142750 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018142751 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018142752 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018142753 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018142754 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018142755 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018142756 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018142757 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018142758 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018142759 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018142760 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018142761 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 14:28:56 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 14:28:56 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 6517 >/dev/null 2>/dev/null httpserv with PID 6517 found at Wed Oct 18 14:28:56 UTC 2023 httpserv with PID 6517 started at Wed Oct 18 14:28:56 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142746 (0x3cafa01a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:28:32 2023 Not After : Wed Oct 18 14:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:9c:72:d8:3b:28:26:f1:89:3d:8c:9b:09:f8:d3:31: 12:31:5e:e6:77:ce:6b:11:03:a5:00:ed:9f:3e:1b:cc: 1e:e0:7a:5b:10:a8:fc:85:39:f8:d1:ff:0a:57:14:e2: e2:2d:86:c0:3b:35:7a:0b:d1:57:00:2f:96:c5:76:4e: d2:60:d7:19:9b:a1:8e:c4:05:56:99:35:13:0f:24:fd: 40:d1:1e:4a:86:e2:b4:52:eb:50:a0:83:14:7d:53:0e: 14:ba:3b:a6:c8:72:e4:d4:25:f7:bf:6a:c1:86:18:b7: a0:a0:f1:17:87:f8:d4:66:c0:5a:ee:14:bc:64:f8:7e: ea:25:78:e0:21:45:53:ed:38:2c:67:5b:77:3d:d6:bd: 4c:8b:38:14:e9:5a:ca:1b:88:e1:da:39:c2:49:e7:21: b5:44:26:98:b4:11:ef:2f:3b:0f:12:50:a6:8c:e0:36: 5c:d6:0d:93:f8:ae:7e:9b:01:88:8b:a0:6b:33:14:fa: 5a:06:00:32:91:59:ff:ac:57:8b:17:40:28:f0:3e:78: f8:5e:d3:93:7c:b0:6f:c1:c5:f8:ed:39:7a:ce:3d:12: 9b:50:c1:c5:82:31:0d:fe:a2:37:6a:09:6d:5c:38:0a: 6c:9a:31:e7:68:7c:54:46:1c:ab:37:93:ed:6f:55:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:11:18:49:7c:9d:73:d5:76:5e:f2:49:9a:bf:9e:8b: 52:25:c7:b1:a2:e7:79:8c:8c:b7:1d:29:a0:05:f7:86: dd:c2:9b:4e:1e:ab:25:cf:c2:23:aa:7c:ce:65:f1:45: b1:c2:be:59:6e:f8:4f:aa:c8:39:a7:b7:a9:09:78:1c: 11:3a:0e:1c:31:e2:18:d0:ca:57:cc:7c:23:43:f9:aa: b6:ad:43:0e:6f:38:66:0a:b5:12:34:eb:38:76:80:67: 4a:af:34:6d:13:5c:38:ce:a9:2c:fe:d6:7e:30:42:5c: 9a:a0:f0:eb:6a:90:16:08:b9:68:4d:3c:bf:8c:26:cf: 8f:f6:a4:17:5a:22:2e:9d:29:04:54:39:3e:5e:3e:f0: 8c:dc:46:e5:b5:40:fb:a3:58:3c:d1:5d:1b:77:4e:86: 70:48:21:68:47:33:78:5c:6c:8a:8b:76:ca:8b:14:dd: 9c:02:c9:5c:43:df:32:de:99:3c:4f:49:e7:2f:92:e8: 76:26:1e:28:46:6f:4e:7e:ac:1a:73:e9:4c:4d:15:b2: 89:96:3f:11:64:2c:c1:8c:6c:48:0f:12:5c:4e:34:6e: af:ae:3c:81:58:18:7a:eb:f2:07:38:3b:15:90:8e:bf: b9:03:ee:36:f9:ed:d9:74:8c:96:33:3c:50:83:0d:b8 Fingerprint (SHA-256): D1:49:58:65:C9:13:62:37:C1:8B:E7:44:6F:3A:F9:32:85:B8:5A:9F:F2:1C:EE:ED:BB:60:A1:1C:2F:D3:EB:8C Fingerprint (SHA1): 2B:50:E7:83:BD:92:B1:31:3A:3E:AB:0C:C5:71:7A:5D:D4:48:DC:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142745 (0x3cafa019) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:27:45 2023 Not After : Wed Oct 18 14:27:45 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:40:66:80:b7:04:3a:d2:e0:60:6b:66:c8:d5:81:c1: a4:90:5e:b9:4c:79:5b:ac:6f:cd:9b:80:19:44:19:ba: ba:47:a5:44:e8:f1:df:0d:47:48:37:f9:84:d3:f9:3c: e4:00:ca:b3:9b:d8:f5:4e:35:4c:4d:9c:d4:ad:a2:91: de:de:4d:49:87:e7:0c:fb:ab:af:73:58:07:99:63:5e: 10:a2:4a:20:46:ad:13:e6:bf:32:58:21:61:cc:d4:8e: 5f:0a:28:44:e0:34:f5:73:04:22:4a:54:e2:ab:43:34: f4:0e:0f:05:88:c0:12:fe:f3:19:90:b0:fe:47:a4:ff: b2:4c:2c:29:93:d7:f1:c7:ff:ee:ae:da:6d:47:da:fc: 88:27:79:f3:1e:91:43:89:32:28:9f:d3:ff:61:c9:4f: 52:4c:14:a1:d0:fb:61:bb:58:65:a5:e8:2b:ad:52:08: 55:0d:21:ff:2a:53:80:dc:c7:6e:ce:09:7d:fc:cb:9a: ca:fc:2a:47:af:62:9a:cf:ca:bb:c2:a5:2d:95:08:61: e6:39:49:87:7c:da:78:f1:07:32:67:b3:71:f2:d3:7a: e5:22:c6:a8:e1:59:36:b7:7d:97:99:15:88:be:d6:b1: bf:27:83:1b:4e:99:c3:71:9c:e3:92:9c:07:1a:dd:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:f0:11:3f:48:00:ae:fe:f0:d1:33:ac:a4:7d:36:98: 98:28:69:a8:d8:ad:0f:df:4b:c5:03:4d:66:75:cc:8e: 55:9c:b8:14:b4:7d:87:46:41:1e:e5:78:8c:3f:95:66: 08:79:59:da:a6:c4:19:6d:c4:d4:82:c6:76:20:e1:bd: 1e:ec:89:cb:b3:22:27:7f:15:c6:14:97:5e:3a:1d:63: e7:46:84:aa:45:3d:23:e3:0b:4a:d1:87:9e:b0:5a:98: 42:4c:60:da:2c:d1:cf:ad:19:92:0f:ed:48:b4:e0:6a: d0:d4:d1:61:b2:8e:76:6e:93:2e:d2:25:e1:9c:6c:c7: 8b:51:49:94:7f:3b:e5:e5:7e:e0:6f:86:f0:28:9a:49: c8:eb:f2:84:55:e3:4d:79:a0:c2:8c:bc:da:c4:cb:49: 6b:a2:57:6b:da:78:a9:53:4a:e3:d9:3a:75:e5:0b:72: c5:71:cb:58:46:6d:8e:16:36:4d:aa:4e:6f:6d:ba:db: bb:35:5f:e3:e5:00:d4:16:b5:5e:a4:e3:7b:d6:5e:9a: 6a:ca:a8:3a:ef:11:ec:fa:65:d4:d6:ce:95:16:96:0a: 62:58:8f:a2:dd:66:71:7e:1d:14:d8:3e:79:fe:84:a4: 6c:fe:c7:5c:e9:de:92:95:e7:4c:16:65:e0:ce:bf:d2 Fingerprint (SHA-256): FB:00:30:F2:70:A3:F3:5F:39:0F:1F:45:57:79:0E:22:26:37:68:18:3F:5C:E1:D8:40:53:19:0F:A9:21:E5:19 Fingerprint (SHA1): 44:17:87:B1:2C:0D:70:8C:41:EC:F3:86:14:B6:DB:E5:37:49:34:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 6517 at Wed Oct 18 14:28:58 UTC 2023 kill -USR1 6517 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 6517 killed at Wed Oct 18 14:28:58 UTC 2023 httpserv starting at Wed Oct 18 14:28:58 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 14:28:58 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 6718 >/dev/null 2>/dev/null httpserv with PID 6718 found at Wed Oct 18 14:28:58 UTC 2023 httpserv with PID 6718 started at Wed Oct 18 14:28:58 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142745 (0x3cafa019) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:27:45 2023 Not After : Wed Oct 18 14:27:45 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:40:66:80:b7:04:3a:d2:e0:60:6b:66:c8:d5:81:c1: a4:90:5e:b9:4c:79:5b:ac:6f:cd:9b:80:19:44:19:ba: ba:47:a5:44:e8:f1:df:0d:47:48:37:f9:84:d3:f9:3c: e4:00:ca:b3:9b:d8:f5:4e:35:4c:4d:9c:d4:ad:a2:91: de:de:4d:49:87:e7:0c:fb:ab:af:73:58:07:99:63:5e: 10:a2:4a:20:46:ad:13:e6:bf:32:58:21:61:cc:d4:8e: 5f:0a:28:44:e0:34:f5:73:04:22:4a:54:e2:ab:43:34: f4:0e:0f:05:88:c0:12:fe:f3:19:90:b0:fe:47:a4:ff: b2:4c:2c:29:93:d7:f1:c7:ff:ee:ae:da:6d:47:da:fc: 88:27:79:f3:1e:91:43:89:32:28:9f:d3:ff:61:c9:4f: 52:4c:14:a1:d0:fb:61:bb:58:65:a5:e8:2b:ad:52:08: 55:0d:21:ff:2a:53:80:dc:c7:6e:ce:09:7d:fc:cb:9a: ca:fc:2a:47:af:62:9a:cf:ca:bb:c2:a5:2d:95:08:61: e6:39:49:87:7c:da:78:f1:07:32:67:b3:71:f2:d3:7a: e5:22:c6:a8:e1:59:36:b7:7d:97:99:15:88:be:d6:b1: bf:27:83:1b:4e:99:c3:71:9c:e3:92:9c:07:1a:dd:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:f0:11:3f:48:00:ae:fe:f0:d1:33:ac:a4:7d:36:98: 98:28:69:a8:d8:ad:0f:df:4b:c5:03:4d:66:75:cc:8e: 55:9c:b8:14:b4:7d:87:46:41:1e:e5:78:8c:3f:95:66: 08:79:59:da:a6:c4:19:6d:c4:d4:82:c6:76:20:e1:bd: 1e:ec:89:cb:b3:22:27:7f:15:c6:14:97:5e:3a:1d:63: e7:46:84:aa:45:3d:23:e3:0b:4a:d1:87:9e:b0:5a:98: 42:4c:60:da:2c:d1:cf:ad:19:92:0f:ed:48:b4:e0:6a: d0:d4:d1:61:b2:8e:76:6e:93:2e:d2:25:e1:9c:6c:c7: 8b:51:49:94:7f:3b:e5:e5:7e:e0:6f:86:f0:28:9a:49: c8:eb:f2:84:55:e3:4d:79:a0:c2:8c:bc:da:c4:cb:49: 6b:a2:57:6b:da:78:a9:53:4a:e3:d9:3a:75:e5:0b:72: c5:71:cb:58:46:6d:8e:16:36:4d:aa:4e:6f:6d:ba:db: bb:35:5f:e3:e5:00:d4:16:b5:5e:a4:e3:7b:d6:5e:9a: 6a:ca:a8:3a:ef:11:ec:fa:65:d4:d6:ce:95:16:96:0a: 62:58:8f:a2:dd:66:71:7e:1d:14:d8:3e:79:fe:84:a4: 6c:fe:c7:5c:e9:de:92:95:e7:4c:16:65:e0:ce:bf:d2 Fingerprint (SHA-256): FB:00:30:F2:70:A3:F3:5F:39:0F:1F:45:57:79:0E:22:26:37:68:18:3F:5C:E1:D8:40:53:19:0F:A9:21:E5:19 Fingerprint (SHA1): 44:17:87:B1:2C:0D:70:8C:41:EC:F3:86:14:B6:DB:E5:37:49:34:7C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 6718 at Wed Oct 18 14:28:59 UTC 2023 kill -USR1 6718 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 6718 killed at Wed Oct 18 14:28:59 UTC 2023 httpserv starting at Wed Oct 18 14:28:59 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 14:28:59 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 6937 >/dev/null 2>/dev/null httpserv with PID 6937 found at Wed Oct 18 14:29:00 UTC 2023 httpserv with PID 6937 started at Wed Oct 18 14:29:00 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142762 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142763 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018142764 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018142765 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018142766 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142763 (0x3cafa02b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:29:02 2023 Not After : Wed Oct 18 14:29:02 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:97:72:ff:4d:f9:3b:87:08:2a:ae:c6:be:4c:8a:69: dc:bd:c4:17:68:0b:98:69:97:81:21:76:55:23:57:e4: 14:03:52:07:7d:0f:65:0e:36:5d:92:e4:23:25:0f:b9: 8e:29:09:71:f9:8c:62:14:2c:59:11:70:65:e6:57:81: 7a:a5:bd:3a:5f:d7:0d:96:4e:14:30:ac:02:12:44:67: 70:41:4e:04:e4:d5:37:de:43:2f:f6:0e:44:95:c3:7a: c0:31:a5:b8:6f:b6:e6:f2:28:a3:99:1c:88:a6:6f:62: dc:47:1c:a0:39:8b:bf:0b:d4:01:ab:12:8a:36:48:16: e3:85:e7:36:9e:68:da:e2:59:33:9c:8d:e7:84:4d:4c: c4:1a:80:bd:9d:7c:6e:f2:c9:3c:b0:fb:ae:ac:9d:2a: 55:1a:59:0e:8d:fc:45:79:4f:e8:9d:0b:bb:64:a9:c1: fd:c5:0d:d9:d4:f9:e9:46:4b:b2:2d:75:ef:19:ca:1c: e0:f2:19:aa:76:d4:c1:03:db:18:d7:16:9e:7f:18:90: c9:e8:79:99:9a:af:e5:29:30:59:89:1d:b3:a0:dd:e3: 47:d4:d1:cc:01:6c:24:c8:40:b6:18:01:90:36:41:89: d7:29:44:89:e8:cc:d9:80:03:f7:c3:34:ba:24:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1e:32:b0:08:bb:14:d2:08:d4:cd:8f:10:18:02:c3: c9:f3:3e:fa:49:3b:c8:66:a3:c1:7c:fd:f7:5c:3c:3e: ae:17:f8:3b:c4:9f:78:99:c9:92:c3:09:eb:9a:0c:86: c7:e6:9f:4b:2f:ec:9b:a9:7e:c0:c7:c2:12:f7:94:50: db:58:43:a6:d4:68:46:2b:34:fc:b9:9c:93:51:db:56: c9:c1:fd:41:c2:bc:96:c2:7f:9d:b9:44:f2:03:22:fb: 89:1c:c8:c8:6f:25:62:cf:6d:f5:e8:97:12:a8:ab:81: fe:26:62:47:c4:2c:03:87:08:2d:b8:e9:2c:09:99:6f: 37:ea:91:b1:dd:f5:9d:1c:db:ed:d4:c8:a6:5f:8b:bc: 31:86:37:f4:ee:e2:49:43:00:b8:fb:43:d7:fc:96:5c: 1e:6a:83:3e:27:8c:d0:3b:cd:96:cb:41:96:a4:ea:84: 01:27:bc:cc:4f:b6:26:2e:5d:77:e1:c5:a4:39:ee:73: 8b:62:17:68:ea:d1:69:f7:be:cd:d6:ce:e9:72:1a:da: 41:e1:19:50:f4:ec:1b:87:fa:35:17:fa:08:e7:8a:76: 71:ad:0c:ca:25:21:52:51:d1:34:c6:81:09:68:a9:05: 4a:ab:f3:80:fb:79:34:bd:b1:ef:68:24:74:0b:ee:67 Fingerprint (SHA-256): 67:F2:3E:75:73:E9:52:D9:49:7F:D9:A3:08:56:CD:16:0B:DB:87:B6:79:49:42:95:1E:E6:B8:B3:AA:4F:9E:F6 Fingerprint (SHA1): B0:90:BB:1E:B3:30:F7:D4:56:E5:B1:F0:69:9D:FC:A9:F1:E8:92:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142762 (0x3cafa02a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:29:01 2023 Not After : Wed Oct 18 14:29:01 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:bc:20:06:c3:82:bb:d6:39:42:6f:bb:49:f8:24:43: c3:e6:ce:d2:e0:a6:f3:98:fa:5a:34:86:ba:2f:cb:47: 5e:5c:cb:a6:b3:dd:a7:a3:d1:76:79:86:4e:ff:07:41: 97:46:fa:72:9e:6d:77:0a:5d:57:fe:84:52:5c:d6:35: 92:53:c8:f3:e5:70:6a:21:3a:ea:ca:eb:5c:bf:87:57: d5:fd:7f:5a:d0:01:9e:e1:56:6b:de:81:af:e2:8a:89: 70:d1:85:1c:1f:51:36:2f:c8:66:13:4c:0a:f1:e7:73: 81:06:0f:9b:0c:c2:03:5a:8e:9e:88:b3:65:43:69:6c: 61:3e:ff:19:4b:91:35:16:7a:af:29:51:d7:82:1a:68: 60:02:34:16:c4:3a:31:1b:90:bd:21:87:a6:88:1f:63: 2e:85:72:6c:df:a6:6d:0b:83:5b:cb:f8:ab:ff:ef:67: 8e:5f:48:eb:06:a5:d4:a8:95:b7:a7:bf:ef:3f:b7:19: df:86:e9:9c:f8:a5:62:8b:5b:70:92:a1:74:57:7a:9a: 45:64:11:34:9f:9c:52:d2:c6:8c:4d:62:90:64:aa:f7: 19:b4:6c:3a:4d:79:12:61:df:65:3c:25:2a:09:40:da: fc:42:5e:91:f6:47:87:c9:67:59:53:f9:92:52:a7:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:45:81:2d:a4:ec:9a:df:1d:7d:c8:5c:be:7c:ef:f4: 89:44:dc:e3:ff:ad:83:05:94:3c:75:11:c0:74:66:16: c4:bc:70:b6:c9:18:94:05:84:e8:d5:8e:a2:68:a2:01: be:9c:85:06:07:ac:46:7e:05:70:10:3c:89:8c:f0:2c: 05:89:60:b3:69:9b:18:b7:c9:9d:fc:83:a1:4d:2e:6a: a7:95:8b:88:e7:da:0c:c3:4a:a2:43:63:2d:25:62:4f: 4f:52:21:15:1a:a0:db:d9:43:b4:68:a5:16:4d:22:3c: fd:66:7a:80:06:08:c8:20:c5:d6:6c:39:dc:ec:66:3e: 59:da:89:fa:7f:0c:6b:e4:5d:29:27:43:8b:35:72:08: 3c:d3:cb:bc:f6:5b:3b:04:4e:b3:fb:6a:d5:3b:5f:d3: 81:3b:99:99:0b:6b:cd:83:91:f5:e3:96:db:7a:f3:87: 59:59:86:26:ad:e6:e8:8e:81:c8:31:f1:5c:ce:25:59: f3:92:45:5e:72:f7:10:01:14:05:77:22:95:dd:d8:d6: e4:cd:d5:4b:0a:cb:cb:ed:17:71:50:d0:c4:e5:84:7d: 0a:09:84:df:62:95:24:f0:e5:b8:a4:94:47:0f:9b:c1: 23:10:aa:ea:ae:f2:9e:14:e6:34:8d:ba:3c:4c:36:00 Fingerprint (SHA-256): 7D:A5:10:02:7A:BF:55:30:E3:6D:9E:85:A6:D5:6C:3E:62:86:26:72:ED:2F:E3:53:D8:EA:4F:89:F6:E0:B5:48 Fingerprint (SHA1): 77:1C:EA:2E:54:C9:52:41:56:C6:0C:07:F6:F6:5D:96:7F:E5:DC:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142762 (0x3cafa02a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:29:01 2023 Not After : Wed Oct 18 14:29:01 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:bc:20:06:c3:82:bb:d6:39:42:6f:bb:49:f8:24:43: c3:e6:ce:d2:e0:a6:f3:98:fa:5a:34:86:ba:2f:cb:47: 5e:5c:cb:a6:b3:dd:a7:a3:d1:76:79:86:4e:ff:07:41: 97:46:fa:72:9e:6d:77:0a:5d:57:fe:84:52:5c:d6:35: 92:53:c8:f3:e5:70:6a:21:3a:ea:ca:eb:5c:bf:87:57: d5:fd:7f:5a:d0:01:9e:e1:56:6b:de:81:af:e2:8a:89: 70:d1:85:1c:1f:51:36:2f:c8:66:13:4c:0a:f1:e7:73: 81:06:0f:9b:0c:c2:03:5a:8e:9e:88:b3:65:43:69:6c: 61:3e:ff:19:4b:91:35:16:7a:af:29:51:d7:82:1a:68: 60:02:34:16:c4:3a:31:1b:90:bd:21:87:a6:88:1f:63: 2e:85:72:6c:df:a6:6d:0b:83:5b:cb:f8:ab:ff:ef:67: 8e:5f:48:eb:06:a5:d4:a8:95:b7:a7:bf:ef:3f:b7:19: df:86:e9:9c:f8:a5:62:8b:5b:70:92:a1:74:57:7a:9a: 45:64:11:34:9f:9c:52:d2:c6:8c:4d:62:90:64:aa:f7: 19:b4:6c:3a:4d:79:12:61:df:65:3c:25:2a:09:40:da: fc:42:5e:91:f6:47:87:c9:67:59:53:f9:92:52:a7:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:45:81:2d:a4:ec:9a:df:1d:7d:c8:5c:be:7c:ef:f4: 89:44:dc:e3:ff:ad:83:05:94:3c:75:11:c0:74:66:16: c4:bc:70:b6:c9:18:94:05:84:e8:d5:8e:a2:68:a2:01: be:9c:85:06:07:ac:46:7e:05:70:10:3c:89:8c:f0:2c: 05:89:60:b3:69:9b:18:b7:c9:9d:fc:83:a1:4d:2e:6a: a7:95:8b:88:e7:da:0c:c3:4a:a2:43:63:2d:25:62:4f: 4f:52:21:15:1a:a0:db:d9:43:b4:68:a5:16:4d:22:3c: fd:66:7a:80:06:08:c8:20:c5:d6:6c:39:dc:ec:66:3e: 59:da:89:fa:7f:0c:6b:e4:5d:29:27:43:8b:35:72:08: 3c:d3:cb:bc:f6:5b:3b:04:4e:b3:fb:6a:d5:3b:5f:d3: 81:3b:99:99:0b:6b:cd:83:91:f5:e3:96:db:7a:f3:87: 59:59:86:26:ad:e6:e8:8e:81:c8:31:f1:5c:ce:25:59: f3:92:45:5e:72:f7:10:01:14:05:77:22:95:dd:d8:d6: e4:cd:d5:4b:0a:cb:cb:ed:17:71:50:d0:c4:e5:84:7d: 0a:09:84:df:62:95:24:f0:e5:b8:a4:94:47:0f:9b:c1: 23:10:aa:ea:ae:f2:9e:14:e6:34:8d:ba:3c:4c:36:00 Fingerprint (SHA-256): 7D:A5:10:02:7A:BF:55:30:E3:6D:9E:85:A6:D5:6C:3E:62:86:26:72:ED:2F:E3:53:D8:EA:4F:89:F6:E0:B5:48 Fingerprint (SHA1): 77:1C:EA:2E:54:C9:52:41:56:C6:0C:07:F6:F6:5D:96:7F:E5:DC:EB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142763 (0x3cafa02b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:29:02 2023 Not After : Wed Oct 18 14:29:02 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:97:72:ff:4d:f9:3b:87:08:2a:ae:c6:be:4c:8a:69: dc:bd:c4:17:68:0b:98:69:97:81:21:76:55:23:57:e4: 14:03:52:07:7d:0f:65:0e:36:5d:92:e4:23:25:0f:b9: 8e:29:09:71:f9:8c:62:14:2c:59:11:70:65:e6:57:81: 7a:a5:bd:3a:5f:d7:0d:96:4e:14:30:ac:02:12:44:67: 70:41:4e:04:e4:d5:37:de:43:2f:f6:0e:44:95:c3:7a: c0:31:a5:b8:6f:b6:e6:f2:28:a3:99:1c:88:a6:6f:62: dc:47:1c:a0:39:8b:bf:0b:d4:01:ab:12:8a:36:48:16: e3:85:e7:36:9e:68:da:e2:59:33:9c:8d:e7:84:4d:4c: c4:1a:80:bd:9d:7c:6e:f2:c9:3c:b0:fb:ae:ac:9d:2a: 55:1a:59:0e:8d:fc:45:79:4f:e8:9d:0b:bb:64:a9:c1: fd:c5:0d:d9:d4:f9:e9:46:4b:b2:2d:75:ef:19:ca:1c: e0:f2:19:aa:76:d4:c1:03:db:18:d7:16:9e:7f:18:90: c9:e8:79:99:9a:af:e5:29:30:59:89:1d:b3:a0:dd:e3: 47:d4:d1:cc:01:6c:24:c8:40:b6:18:01:90:36:41:89: d7:29:44:89:e8:cc:d9:80:03:f7:c3:34:ba:24:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1e:32:b0:08:bb:14:d2:08:d4:cd:8f:10:18:02:c3: c9:f3:3e:fa:49:3b:c8:66:a3:c1:7c:fd:f7:5c:3c:3e: ae:17:f8:3b:c4:9f:78:99:c9:92:c3:09:eb:9a:0c:86: c7:e6:9f:4b:2f:ec:9b:a9:7e:c0:c7:c2:12:f7:94:50: db:58:43:a6:d4:68:46:2b:34:fc:b9:9c:93:51:db:56: c9:c1:fd:41:c2:bc:96:c2:7f:9d:b9:44:f2:03:22:fb: 89:1c:c8:c8:6f:25:62:cf:6d:f5:e8:97:12:a8:ab:81: fe:26:62:47:c4:2c:03:87:08:2d:b8:e9:2c:09:99:6f: 37:ea:91:b1:dd:f5:9d:1c:db:ed:d4:c8:a6:5f:8b:bc: 31:86:37:f4:ee:e2:49:43:00:b8:fb:43:d7:fc:96:5c: 1e:6a:83:3e:27:8c:d0:3b:cd:96:cb:41:96:a4:ea:84: 01:27:bc:cc:4f:b6:26:2e:5d:77:e1:c5:a4:39:ee:73: 8b:62:17:68:ea:d1:69:f7:be:cd:d6:ce:e9:72:1a:da: 41:e1:19:50:f4:ec:1b:87:fa:35:17:fa:08:e7:8a:76: 71:ad:0c:ca:25:21:52:51:d1:34:c6:81:09:68:a9:05: 4a:ab:f3:80:fb:79:34:bd:b1:ef:68:24:74:0b:ee:67 Fingerprint (SHA-256): 67:F2:3E:75:73:E9:52:D9:49:7F:D9:A3:08:56:CD:16:0B:DB:87:B6:79:49:42:95:1E:E6:B8:B3:AA:4F:9E:F6 Fingerprint (SHA1): B0:90:BB:1E:B3:30:F7:D4:56:E5:B1:F0:69:9D:FC:A9:F1:E8:92:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142763 (0x3cafa02b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:29:02 2023 Not After : Wed Oct 18 14:29:02 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:97:72:ff:4d:f9:3b:87:08:2a:ae:c6:be:4c:8a:69: dc:bd:c4:17:68:0b:98:69:97:81:21:76:55:23:57:e4: 14:03:52:07:7d:0f:65:0e:36:5d:92:e4:23:25:0f:b9: 8e:29:09:71:f9:8c:62:14:2c:59:11:70:65:e6:57:81: 7a:a5:bd:3a:5f:d7:0d:96:4e:14:30:ac:02:12:44:67: 70:41:4e:04:e4:d5:37:de:43:2f:f6:0e:44:95:c3:7a: c0:31:a5:b8:6f:b6:e6:f2:28:a3:99:1c:88:a6:6f:62: dc:47:1c:a0:39:8b:bf:0b:d4:01:ab:12:8a:36:48:16: e3:85:e7:36:9e:68:da:e2:59:33:9c:8d:e7:84:4d:4c: c4:1a:80:bd:9d:7c:6e:f2:c9:3c:b0:fb:ae:ac:9d:2a: 55:1a:59:0e:8d:fc:45:79:4f:e8:9d:0b:bb:64:a9:c1: fd:c5:0d:d9:d4:f9:e9:46:4b:b2:2d:75:ef:19:ca:1c: e0:f2:19:aa:76:d4:c1:03:db:18:d7:16:9e:7f:18:90: c9:e8:79:99:9a:af:e5:29:30:59:89:1d:b3:a0:dd:e3: 47:d4:d1:cc:01:6c:24:c8:40:b6:18:01:90:36:41:89: d7:29:44:89:e8:cc:d9:80:03:f7:c3:34:ba:24:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1e:32:b0:08:bb:14:d2:08:d4:cd:8f:10:18:02:c3: c9:f3:3e:fa:49:3b:c8:66:a3:c1:7c:fd:f7:5c:3c:3e: ae:17:f8:3b:c4:9f:78:99:c9:92:c3:09:eb:9a:0c:86: c7:e6:9f:4b:2f:ec:9b:a9:7e:c0:c7:c2:12:f7:94:50: db:58:43:a6:d4:68:46:2b:34:fc:b9:9c:93:51:db:56: c9:c1:fd:41:c2:bc:96:c2:7f:9d:b9:44:f2:03:22:fb: 89:1c:c8:c8:6f:25:62:cf:6d:f5:e8:97:12:a8:ab:81: fe:26:62:47:c4:2c:03:87:08:2d:b8:e9:2c:09:99:6f: 37:ea:91:b1:dd:f5:9d:1c:db:ed:d4:c8:a6:5f:8b:bc: 31:86:37:f4:ee:e2:49:43:00:b8:fb:43:d7:fc:96:5c: 1e:6a:83:3e:27:8c:d0:3b:cd:96:cb:41:96:a4:ea:84: 01:27:bc:cc:4f:b6:26:2e:5d:77:e1:c5:a4:39:ee:73: 8b:62:17:68:ea:d1:69:f7:be:cd:d6:ce:e9:72:1a:da: 41:e1:19:50:f4:ec:1b:87:fa:35:17:fa:08:e7:8a:76: 71:ad:0c:ca:25:21:52:51:d1:34:c6:81:09:68:a9:05: 4a:ab:f3:80:fb:79:34:bd:b1:ef:68:24:74:0b:ee:67 Fingerprint (SHA-256): 67:F2:3E:75:73:E9:52:D9:49:7F:D9:A3:08:56:CD:16:0B:DB:87:B6:79:49:42:95:1E:E6:B8:B3:AA:4F:9E:F6 Fingerprint (SHA1): B0:90:BB:1E:B3:30:F7:D4:56:E5:B1:F0:69:9D:FC:A9:F1:E8:92:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142763 (0x3cafa02b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:29:02 2023 Not After : Wed Oct 18 14:29:02 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:97:72:ff:4d:f9:3b:87:08:2a:ae:c6:be:4c:8a:69: dc:bd:c4:17:68:0b:98:69:97:81:21:76:55:23:57:e4: 14:03:52:07:7d:0f:65:0e:36:5d:92:e4:23:25:0f:b9: 8e:29:09:71:f9:8c:62:14:2c:59:11:70:65:e6:57:81: 7a:a5:bd:3a:5f:d7:0d:96:4e:14:30:ac:02:12:44:67: 70:41:4e:04:e4:d5:37:de:43:2f:f6:0e:44:95:c3:7a: c0:31:a5:b8:6f:b6:e6:f2:28:a3:99:1c:88:a6:6f:62: dc:47:1c:a0:39:8b:bf:0b:d4:01:ab:12:8a:36:48:16: e3:85:e7:36:9e:68:da:e2:59:33:9c:8d:e7:84:4d:4c: c4:1a:80:bd:9d:7c:6e:f2:c9:3c:b0:fb:ae:ac:9d:2a: 55:1a:59:0e:8d:fc:45:79:4f:e8:9d:0b:bb:64:a9:c1: fd:c5:0d:d9:d4:f9:e9:46:4b:b2:2d:75:ef:19:ca:1c: e0:f2:19:aa:76:d4:c1:03:db:18:d7:16:9e:7f:18:90: c9:e8:79:99:9a:af:e5:29:30:59:89:1d:b3:a0:dd:e3: 47:d4:d1:cc:01:6c:24:c8:40:b6:18:01:90:36:41:89: d7:29:44:89:e8:cc:d9:80:03:f7:c3:34:ba:24:c7:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:1e:32:b0:08:bb:14:d2:08:d4:cd:8f:10:18:02:c3: c9:f3:3e:fa:49:3b:c8:66:a3:c1:7c:fd:f7:5c:3c:3e: ae:17:f8:3b:c4:9f:78:99:c9:92:c3:09:eb:9a:0c:86: c7:e6:9f:4b:2f:ec:9b:a9:7e:c0:c7:c2:12:f7:94:50: db:58:43:a6:d4:68:46:2b:34:fc:b9:9c:93:51:db:56: c9:c1:fd:41:c2:bc:96:c2:7f:9d:b9:44:f2:03:22:fb: 89:1c:c8:c8:6f:25:62:cf:6d:f5:e8:97:12:a8:ab:81: fe:26:62:47:c4:2c:03:87:08:2d:b8:e9:2c:09:99:6f: 37:ea:91:b1:dd:f5:9d:1c:db:ed:d4:c8:a6:5f:8b:bc: 31:86:37:f4:ee:e2:49:43:00:b8:fb:43:d7:fc:96:5c: 1e:6a:83:3e:27:8c:d0:3b:cd:96:cb:41:96:a4:ea:84: 01:27:bc:cc:4f:b6:26:2e:5d:77:e1:c5:a4:39:ee:73: 8b:62:17:68:ea:d1:69:f7:be:cd:d6:ce:e9:72:1a:da: 41:e1:19:50:f4:ec:1b:87:fa:35:17:fa:08:e7:8a:76: 71:ad:0c:ca:25:21:52:51:d1:34:c6:81:09:68:a9:05: 4a:ab:f3:80:fb:79:34:bd:b1:ef:68:24:74:0b:ee:67 Fingerprint (SHA-256): 67:F2:3E:75:73:E9:52:D9:49:7F:D9:A3:08:56:CD:16:0B:DB:87:B6:79:49:42:95:1E:E6:B8:B3:AA:4F:9E:F6 Fingerprint (SHA1): B0:90:BB:1E:B3:30:F7:D4:56:E5:B1:F0:69:9D:FC:A9:F1:E8:92:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142762 (0x3cafa02a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:29:01 2023 Not After : Wed Oct 18 14:29:01 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:bc:20:06:c3:82:bb:d6:39:42:6f:bb:49:f8:24:43: c3:e6:ce:d2:e0:a6:f3:98:fa:5a:34:86:ba:2f:cb:47: 5e:5c:cb:a6:b3:dd:a7:a3:d1:76:79:86:4e:ff:07:41: 97:46:fa:72:9e:6d:77:0a:5d:57:fe:84:52:5c:d6:35: 92:53:c8:f3:e5:70:6a:21:3a:ea:ca:eb:5c:bf:87:57: d5:fd:7f:5a:d0:01:9e:e1:56:6b:de:81:af:e2:8a:89: 70:d1:85:1c:1f:51:36:2f:c8:66:13:4c:0a:f1:e7:73: 81:06:0f:9b:0c:c2:03:5a:8e:9e:88:b3:65:43:69:6c: 61:3e:ff:19:4b:91:35:16:7a:af:29:51:d7:82:1a:68: 60:02:34:16:c4:3a:31:1b:90:bd:21:87:a6:88:1f:63: 2e:85:72:6c:df:a6:6d:0b:83:5b:cb:f8:ab:ff:ef:67: 8e:5f:48:eb:06:a5:d4:a8:95:b7:a7:bf:ef:3f:b7:19: df:86:e9:9c:f8:a5:62:8b:5b:70:92:a1:74:57:7a:9a: 45:64:11:34:9f:9c:52:d2:c6:8c:4d:62:90:64:aa:f7: 19:b4:6c:3a:4d:79:12:61:df:65:3c:25:2a:09:40:da: fc:42:5e:91:f6:47:87:c9:67:59:53:f9:92:52:a7:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:45:81:2d:a4:ec:9a:df:1d:7d:c8:5c:be:7c:ef:f4: 89:44:dc:e3:ff:ad:83:05:94:3c:75:11:c0:74:66:16: c4:bc:70:b6:c9:18:94:05:84:e8:d5:8e:a2:68:a2:01: be:9c:85:06:07:ac:46:7e:05:70:10:3c:89:8c:f0:2c: 05:89:60:b3:69:9b:18:b7:c9:9d:fc:83:a1:4d:2e:6a: a7:95:8b:88:e7:da:0c:c3:4a:a2:43:63:2d:25:62:4f: 4f:52:21:15:1a:a0:db:d9:43:b4:68:a5:16:4d:22:3c: fd:66:7a:80:06:08:c8:20:c5:d6:6c:39:dc:ec:66:3e: 59:da:89:fa:7f:0c:6b:e4:5d:29:27:43:8b:35:72:08: 3c:d3:cb:bc:f6:5b:3b:04:4e:b3:fb:6a:d5:3b:5f:d3: 81:3b:99:99:0b:6b:cd:83:91:f5:e3:96:db:7a:f3:87: 59:59:86:26:ad:e6:e8:8e:81:c8:31:f1:5c:ce:25:59: f3:92:45:5e:72:f7:10:01:14:05:77:22:95:dd:d8:d6: e4:cd:d5:4b:0a:cb:cb:ed:17:71:50:d0:c4:e5:84:7d: 0a:09:84:df:62:95:24:f0:e5:b8:a4:94:47:0f:9b:c1: 23:10:aa:ea:ae:f2:9e:14:e6:34:8d:ba:3c:4c:36:00 Fingerprint (SHA-256): 7D:A5:10:02:7A:BF:55:30:E3:6D:9E:85:A6:D5:6C:3E:62:86:26:72:ED:2F:E3:53:D8:EA:4F:89:F6:E0:B5:48 Fingerprint (SHA1): 77:1C:EA:2E:54:C9:52:41:56:C6:0C:07:F6:F6:5D:96:7F:E5:DC:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142762 (0x3cafa02a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:29:01 2023 Not After : Wed Oct 18 14:29:01 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:bc:20:06:c3:82:bb:d6:39:42:6f:bb:49:f8:24:43: c3:e6:ce:d2:e0:a6:f3:98:fa:5a:34:86:ba:2f:cb:47: 5e:5c:cb:a6:b3:dd:a7:a3:d1:76:79:86:4e:ff:07:41: 97:46:fa:72:9e:6d:77:0a:5d:57:fe:84:52:5c:d6:35: 92:53:c8:f3:e5:70:6a:21:3a:ea:ca:eb:5c:bf:87:57: d5:fd:7f:5a:d0:01:9e:e1:56:6b:de:81:af:e2:8a:89: 70:d1:85:1c:1f:51:36:2f:c8:66:13:4c:0a:f1:e7:73: 81:06:0f:9b:0c:c2:03:5a:8e:9e:88:b3:65:43:69:6c: 61:3e:ff:19:4b:91:35:16:7a:af:29:51:d7:82:1a:68: 60:02:34:16:c4:3a:31:1b:90:bd:21:87:a6:88:1f:63: 2e:85:72:6c:df:a6:6d:0b:83:5b:cb:f8:ab:ff:ef:67: 8e:5f:48:eb:06:a5:d4:a8:95:b7:a7:bf:ef:3f:b7:19: df:86:e9:9c:f8:a5:62:8b:5b:70:92:a1:74:57:7a:9a: 45:64:11:34:9f:9c:52:d2:c6:8c:4d:62:90:64:aa:f7: 19:b4:6c:3a:4d:79:12:61:df:65:3c:25:2a:09:40:da: fc:42:5e:91:f6:47:87:c9:67:59:53:f9:92:52:a7:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:45:81:2d:a4:ec:9a:df:1d:7d:c8:5c:be:7c:ef:f4: 89:44:dc:e3:ff:ad:83:05:94:3c:75:11:c0:74:66:16: c4:bc:70:b6:c9:18:94:05:84:e8:d5:8e:a2:68:a2:01: be:9c:85:06:07:ac:46:7e:05:70:10:3c:89:8c:f0:2c: 05:89:60:b3:69:9b:18:b7:c9:9d:fc:83:a1:4d:2e:6a: a7:95:8b:88:e7:da:0c:c3:4a:a2:43:63:2d:25:62:4f: 4f:52:21:15:1a:a0:db:d9:43:b4:68:a5:16:4d:22:3c: fd:66:7a:80:06:08:c8:20:c5:d6:6c:39:dc:ec:66:3e: 59:da:89:fa:7f:0c:6b:e4:5d:29:27:43:8b:35:72:08: 3c:d3:cb:bc:f6:5b:3b:04:4e:b3:fb:6a:d5:3b:5f:d3: 81:3b:99:99:0b:6b:cd:83:91:f5:e3:96:db:7a:f3:87: 59:59:86:26:ad:e6:e8:8e:81:c8:31:f1:5c:ce:25:59: f3:92:45:5e:72:f7:10:01:14:05:77:22:95:dd:d8:d6: e4:cd:d5:4b:0a:cb:cb:ed:17:71:50:d0:c4:e5:84:7d: 0a:09:84:df:62:95:24:f0:e5:b8:a4:94:47:0f:9b:c1: 23:10:aa:ea:ae:f2:9e:14:e6:34:8d:ba:3c:4c:36:00 Fingerprint (SHA-256): 7D:A5:10:02:7A:BF:55:30:E3:6D:9E:85:A6:D5:6C:3E:62:86:26:72:ED:2F:E3:53:D8:EA:4F:89:F6:E0:B5:48 Fingerprint (SHA1): 77:1C:EA:2E:54:C9:52:41:56:C6:0C:07:F6:F6:5D:96:7F:E5:DC:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142767 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142768 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142769 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142770 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142771 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142772 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142773 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142774 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142775 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018142776 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018142777 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018142778 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018142779 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018142780 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018142781 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018142782 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018142783 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018142784 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018142785 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018142786 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018142787 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018142788 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142789 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142767 (0x3cafa02f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:29:10 2023 Not After : Wed Oct 18 14:29:10 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:a6:e0:5e:39:50:44:1c:58:6e:9b:50:33:e6:7a:85: 04:c9:49:a6:9d:d3:fc:be:99:f4:dc:16:7e:5e:3f:38: 4d:f3:c2:d7:69:b6:29:e8:72:6a:af:70:f3:a4:60:bc: e1:05:db:f3:e3:85:e8:bf:0d:50:62:1d:bd:14:bc:74: 73:c8:78:ce:26:74:17:6a:8a:5c:4b:d6:9b:f8:f1:27: 21:fe:2f:9d:01:96:60:fa:f4:1b:95:24:f9:de:85:8e: 61:08:37:19:0b:0c:98:77:58:87:b0:6e:1f:00:77:8e: 0a:b9:4d:59:d9:d0:42:f2:9d:31:ea:c6:d6:d5:48:60: fc:2f:ab:78:cb:2f:2f:35:28:9a:49:e3:60:3a:3b:0a: ab:38:a9:d6:2a:86:2b:d2:13:1d:e5:24:31:ce:6b:19: 18:39:c4:a4:30:c8:55:7b:50:41:32:3b:97:5d:12:e6: 7f:74:bc:12:0a:06:b8:6f:57:35:04:46:16:8a:2c:c5: bf:b9:c5:99:9e:9c:05:5e:1c:87:22:45:2f:c7:ed:57: 78:f8:10:d2:f2:75:02:26:68:e3:39:70:9f:88:5d:2a: 27:1f:34:8c:47:a3:36:c3:a5:b3:72:a5:4d:49:90:eb: 89:f7:4e:4b:60:af:d5:c8:41:ed:01:db:89:98:c7:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:77:34:71:1f:99:48:4b:8e:ad:08:79:60:3a:a8:b2: 9d:6e:15:21:3b:04:52:4e:4e:ed:8e:07:1a:30:36:c4: c2:a5:49:ba:20:81:ab:ba:d0:85:02:21:e9:de:eb:2b: 0d:94:fc:7d:41:ac:5e:88:ed:3c:eb:e6:df:1f:41:78: ab:e5:c1:54:d9:48:37:c2:c7:d2:94:42:ae:ea:1b:95: 32:2f:49:2e:34:4c:83:83:d8:52:c4:5b:ee:71:e2:72: 72:5b:61:ad:78:ee:b4:c1:39:43:83:da:51:e2:47:a8: fe:ea:8d:c3:7e:9b:ce:1b:77:ac:4d:d9:37:3a:c7:ae: d2:25:1a:83:f1:27:e8:0a:3d:fe:f8:bf:56:34:4a:b7: 48:ce:10:b2:20:2e:8f:f6:9f:07:45:33:34:2a:0b:4b: b5:1a:98:5f:52:bd:a6:bc:a0:8e:3b:59:34:77:3d:94: 94:39:a5:2b:f6:11:4d:87:13:0f:72:2f:f6:c0:a7:72: 42:d8:ca:bf:c4:94:52:3e:5a:6b:82:28:20:9d:23:46: ad:dd:d6:14:d8:f2:4d:a9:02:69:88:ba:24:72:63:98: 06:c6:be:0c:41:ab:44:7a:e5:aa:f6:90:a8:fd:af:da: 90:40:3e:83:d6:60:df:52:d6:fd:52:d3:b6:18:42:d0 Fingerprint (SHA-256): 76:9E:BA:42:54:F1:09:13:F5:15:4A:B5:FA:10:DC:71:24:29:94:E9:6F:14:56:95:64:E9:EF:98:DA:FF:DA:9C Fingerprint (SHA1): 1E:8C:FE:8D:DA:F7:FF:CE:58:84:05:7B:51:E0:16:3C:6D:81:F2:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142768 (0x3cafa030) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:29:11 2023 Not After : Wed Oct 18 14:29:11 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:1e:71:92:3a:4b:df:f3:9b:1e:02:67:9a:3a:89:17: 7c:eb:0c:44:c5:dd:80:79:12:c1:19:4a:b1:45:6f:0b: a5:3d:30:25:64:0f:62:8a:4b:da:bc:8a:69:11:58:55: 38:07:e9:af:33:91:bf:77:5c:91:b4:32:51:e6:16:bf: 51:6c:92:08:7a:d1:37:c9:fd:e6:83:af:0b:95:19:dc: e8:8b:27:ed:ef:aa:31:af:fe:f9:10:01:15:5b:99:c1: 3c:aa:fa:4a:ad:02:01:59:56:13:d7:41:08:79:ff:2f: c3:04:ff:81:d9:b2:f1:0e:7b:60:5c:ad:12:e0:56:4b: 5e:fd:a7:3b:b3:86:8e:cc:07:93:27:73:9f:74:80:1d: c5:66:bb:64:4f:8a:48:ab:e0:64:7d:a7:ea:69:bc:8a: bd:3e:51:78:45:9b:63:64:10:a6:2e:3c:26:03:8d:6b: ad:53:e8:c4:34:ee:66:26:3d:06:1d:89:4c:3a:17:2c: 42:46:3c:08:fd:ec:8a:b9:d7:2e:fe:0e:9e:80:ed:5a: 48:66:44:3b:4f:55:a8:19:5c:da:9f:0c:d6:b3:80:9a: 39:04:62:23:73:b3:14:b4:8f:67:c0:80:48:69:52:f2: 0c:da:ae:50:04:bd:27:98:3e:c3:50:6f:71:10:01:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:23:d5:1a:30:6e:cb:df:d9:03:f2:23:87:07:98:1d: 6f:66:1a:05:82:ca:f3:db:61:7e:5b:1e:bb:74:e2:ef: f6:23:25:55:ba:c6:30:28:c3:7e:f4:c7:a4:a3:bf:7e: 94:40:8c:f3:4d:c0:ed:63:ea:6d:c8:14:c0:82:04:b4: 56:65:b3:04:af:af:29:81:0e:5f:16:2a:d6:6f:9d:24: 40:2e:82:08:da:f3:03:13:4e:c9:3d:78:cb:04:18:46: 49:d9:cd:6e:a1:e4:f3:a4:7f:1e:a6:4a:14:31:07:01: 20:e6:32:27:77:a4:51:04:c1:fa:c8:c4:52:0c:c5:60: 7d:64:14:c6:04:c6:9f:9d:0e:ae:0c:63:1e:bc:ef:03: de:98:6b:39:99:fb:c1:8e:bc:e1:c1:b4:d9:ad:de:73: 22:b5:99:a3:d2:29:5d:8f:65:72:bd:7a:06:18:4a:6c: f7:4c:97:98:63:c8:7d:52:52:e5:59:28:63:33:2d:49: 52:02:e8:dc:68:fb:e9:3a:09:e3:b1:fe:4e:1b:8e:64: a1:b4:0b:e8:28:a7:60:fc:0c:e8:87:01:bc:12:3a:ac: 9e:0c:b9:ed:9f:cb:5a:a6:5e:7c:ae:31:d8:a8:5e:bb: f6:ed:70:29:f0:46:81:6b:9d:0c:3c:a9:68:1b:c4:46 Fingerprint (SHA-256): 43:DF:29:E2:38:66:02:D3:16:75:AD:7E:F1:F0:5A:AF:B2:D8:E3:EB:50:C8:32:C9:6B:1A:A5:79:F7:9E:64:26 Fingerprint (SHA1): 42:95:E5:DE:F0:FD:84:50:29:A9:F5:78:85:9C:94:4D:1F:F3:03:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142769 (0x3cafa031) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:29:12 2023 Not After : Wed Oct 18 14:29:12 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:00:4d:cd:10:70:1d:d0:16:6f:d7:72:de:f0:89:8c: 75:92:c9:26:9e:7b:5f:be:44:53:5e:c0:1a:97:ef:23: 83:59:88:a8:88:9c:1f:50:f3:93:fa:44:9e:a5:eb:74: 30:99:d0:3f:36:d2:1a:8a:5a:fb:1f:d4:af:46:a4:eb: 3b:cd:98:8d:d8:07:48:71:49:d7:f1:05:04:b7:d4:cd: 2d:18:7d:ed:15:b3:ee:1e:37:78:89:47:43:97:10:fe: 31:e3:de:ae:ba:92:97:0d:56:44:93:65:9c:1a:b7:50: 41:fe:b2:7f:1c:36:3e:36:98:ef:a3:e8:03:8e:7d:79: e1:c8:19:ad:1b:46:58:60:36:da:62:a3:3d:10:60:0d: f9:92:5a:19:e4:48:40:33:39:25:76:b5:26:9f:58:fa: cb:ef:87:1c:c0:01:ce:5f:12:86:17:8f:bb:7b:4e:1d: b4:d3:9a:8a:19:6a:72:d3:a6:a8:f9:5b:cd:8a:ac:db: 33:4c:0b:ec:96:e1:c3:f0:67:27:d5:db:50:02:92:8c: 46:db:dc:55:64:8f:81:b4:bd:fb:b8:92:b8:a6:ac:c8: a4:de:0c:8d:28:9c:f5:f5:45:5c:d8:b1:93:b2:0e:b1: 0f:50:ac:3a:a7:36:f9:54:9b:32:02:6f:1c:17:0b:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:8a:57:8c:78:54:75:05:08:17:22:cd:90:62:06:d1: 81:33:f5:b2:8b:f9:c8:12:fc:43:f7:27:6b:89:02:8e: b2:ad:54:80:31:16:e3:aa:6f:78:18:2f:b4:dc:db:da: b4:0c:47:ba:4f:ac:7d:70:bf:78:2e:3c:68:5e:ef:67: 72:0f:5f:53:bc:29:e8:d1:b9:93:06:a5:b6:b8:0b:e2: 48:c7:f7:ab:77:1d:eb:9e:cf:ad:26:3c:80:f2:bb:90: 08:80:26:66:66:84:e4:19:65:9e:22:18:04:23:37:e5: 3c:55:1c:06:eb:06:15:bc:d2:1e:28:ab:12:80:aa:c1: 43:8c:a1:0e:52:8c:a5:15:c3:63:a3:a4:3c:15:cb:15: 40:da:a2:07:c3:c8:c5:03:5a:bc:74:83:d4:59:e4:a5: 11:33:e9:da:9c:2d:e4:46:ca:dd:13:87:0f:e1:57:a5: d0:80:ab:d0:42:6f:d4:49:b1:c3:18:06:0d:7a:51:5c: 62:78:1b:c6:d5:2e:49:96:2c:cd:05:a7:13:55:0f:a3: 4f:b0:e3:fd:cf:b1:4a:07:c5:38:8a:0e:b2:af:68:e1: 2e:4b:58:33:a5:cb:94:77:5f:70:84:04:ce:04:6c:bb: 7b:0c:95:d0:dd:cb:96:69:f8:35:13:0c:7f:f8:35:f2 Fingerprint (SHA-256): B2:0F:69:0D:A4:2E:7C:B3:55:48:37:0B:49:7D:A7:F9:6C:C2:20:03:91:27:0F:94:84:7D:00:DC:25:B7:2F:2E Fingerprint (SHA1): 9E:D3:07:E2:4F:A2:14:D3:35:D2:77:32:7D:4F:A3:72:16:03:A3:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142770 (0x3cafa032) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:29:13 2023 Not After : Wed Oct 18 14:29:13 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:2b:cf:c0:27:9e:4d:6b:1e:a3:64:f5:c8:d7:3d:55: 13:95:87:c5:88:4e:b4:2b:f6:34:98:25:81:f4:9f:d9: d1:b6:9e:73:8b:23:ed:91:bd:f9:8d:bc:76:a1:29:3e: 0b:71:2e:b3:88:d1:9d:2a:1e:88:d5:e5:23:da:b0:5e: a1:ad:8b:86:a5:91:3a:6e:6a:03:f0:0c:7c:53:77:d4: ee:09:63:24:68:f1:75:c8:b5:04:7d:e2:03:f4:5c:a2: c2:7d:d3:ed:48:ce:8c:e4:ca:f3:50:48:cf:d9:f8:b6: c8:e1:b1:9c:97:9f:8d:91:23:d2:18:b4:00:e3:56:5c: 86:77:93:b4:9b:22:02:93:26:12:87:95:3a:2d:ee:48: d0:4d:13:a3:49:7a:e7:f3:bf:9d:82:66:d0:4a:3f:34: ff:d6:7d:54:14:88:16:92:1e:b3:99:4d:81:26:c1:17: bc:38:f5:47:0a:11:35:07:aa:b7:68:81:d6:45:62:c0: 26:e3:05:05:c8:78:5d:7d:ee:94:ad:8a:5c:0b:24:75: 71:bd:6a:da:de:df:b7:70:ae:74:ed:75:ba:30:3e:26: 11:2b:d4:fa:e5:f0:84:90:9b:2b:5e:d8:90:41:45:de: 5e:e7:2f:75:8a:de:1b:cc:f6:ec:49:76:3a:7a:d5:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:6f:ce:0c:e4:21:3e:dc:c8:0d:9c:0a:d3:bf:c5:64: 13:01:17:d1:8e:6e:5e:b8:9e:70:66:c4:09:69:05:d1: 05:27:41:f3:76:1c:58:4b:54:4b:06:be:a5:a2:a0:06: 7e:57:d6:8f:14:d6:a3:5c:80:8c:94:74:4d:92:04:0a: f2:4c:9b:8a:b0:ac:a6:8c:ff:13:6b:aa:c5:65:22:71: dc:9d:1b:8c:9b:c7:3e:d7:b8:ef:dd:fa:a0:84:c3:d3: 5f:67:12:2a:e8:ea:77:dc:6b:83:c6:cb:0b:d5:4f:71: af:c7:02:93:d6:f2:06:3b:03:0b:bc:dc:ac:3d:49:24: aa:bd:c9:b7:99:51:67:f7:82:ea:c1:61:91:0f:70:50: 1a:a6:7d:d4:a2:7b:16:8e:2c:51:22:49:c7:df:4e:31: 47:f2:a3:5b:39:a2:4f:58:95:67:0c:10:67:c3:ba:ee: a5:4c:40:7f:f1:bb:ce:61:96:15:5c:18:f3:3b:17:d0: e3:1a:78:36:98:17:35:c5:62:26:58:3a:4a:ef:e5:f6: 26:76:94:31:92:28:d0:cb:9e:6e:01:03:29:e6:d9:d6: 89:06:63:8a:38:03:cb:1a:01:d6:20:db:a9:a4:00:21: 8f:bf:51:3d:ba:d5:7d:bd:5e:84:a0:3a:a5:86:35:c3 Fingerprint (SHA-256): B8:86:E5:73:88:F4:A4:45:87:50:84:C1:DD:C4:75:95:94:8A:C8:38:76:74:52:F6:A7:9C:99:C7:F7:17:8C:65 Fingerprint (SHA1): FF:D1:B7:37:62:AF:66:98:B4:51:26:58:E7:BA:7C:AB:A8:A9:81:1B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142771 (0x3cafa033) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:29:15 2023 Not After : Wed Oct 18 14:29:15 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:35:7e:7d:0c:82:99:6f:86:8d:50:06:73:d4:63:1f: b9:37:ed:8c:54:bc:44:49:87:36:30:35:2d:af:5f:e0: 8a:3b:ee:9d:13:6d:29:da:3d:d2:54:5f:29:55:80:a5: 09:12:0c:d6:d3:5b:ec:ec:6e:8e:7a:35:e9:0b:37:d2: ec:5b:68:4a:a2:21:ac:a0:7e:eb:8f:95:e4:d2:bf:ed: 4b:b8:95:69:e7:f2:82:ee:98:15:a1:de:3e:2c:73:2a: d5:2a:a9:18:6b:1a:d7:51:c8:81:bb:90:da:b6:3b:a0: d8:30:af:e9:99:78:0f:84:28:c4:92:9e:13:06:c2:65: bb:b7:99:5d:61:3a:f0:b8:85:7c:0a:7a:68:f4:c9:10: fa:02:95:b3:23:89:96:ae:2e:b7:61:e7:bd:e0:df:ad: 10:bf:55:27:ca:c8:7b:a6:79:bc:06:87:d6:3a:9a:c8: be:b9:5c:40:2d:14:e4:cd:48:d3:79:a9:dc:70:bc:0e: d6:41:ff:6f:2f:ab:84:7a:1c:49:5a:df:97:4f:95:28: a6:fd:1b:76:09:c2:9b:02:29:ca:c0:44:6a:5b:b0:aa: 72:be:b6:86:66:65:02:5a:3a:b0:f0:b3:35:29:5c:3a: d1:a8:b7:91:4a:a0:c8:ae:00:74:78:58:03:ab:5d:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:a6:84:85:75:f2:54:16:83:9b:47:cd:27:c7:16:c6: 2c:d6:63:1a:a7:51:58:f6:1d:5f:d0:d0:b5:c0:54:30: 0f:60:ca:bc:95:e2:16:f8:cb:c8:66:6d:6f:c4:73:af: cc:28:67:5f:8b:ac:85:2a:89:c3:fb:66:c7:b8:4c:46: be:03:89:70:14:92:de:a5:47:88:f0:e2:d1:c8:91:f6: 3a:7c:0e:2e:51:16:bb:86:a3:62:76:95:4d:cc:4b:33: 72:72:3d:ad:96:ca:0b:59:03:4f:82:57:f1:02:53:da: ae:2c:22:5d:ee:4c:5a:a1:b0:5e:81:66:21:9c:d1:b2: 82:ab:5b:29:0b:22:f9:bc:96:7a:ee:e4:11:b3:94:bf: 4f:e3:e8:c0:64:75:ab:ef:3d:c6:a8:1f:c7:27:94:a5: 36:79:65:a5:6a:f0:2f:0d:0b:ca:f6:91:15:85:86:c2: a5:21:e7:d9:96:e7:51:c5:aa:ed:ac:59:9c:c5:de:3e: 19:94:cb:14:d3:7b:4b:f9:7f:d2:24:56:01:2e:a1:1d: a1:53:ec:e1:6e:d9:ea:84:97:f5:13:61:16:d2:28:0c: 62:4e:1c:a5:ac:e6:34:05:b4:4e:75:78:b4:b2:5e:f9: 4a:e2:29:5e:55:20:7b:4c:15:27:89:ce:8e:23:13:e5 Fingerprint (SHA-256): 48:7B:53:B3:E9:81:FE:FB:11:96:4F:C1:A9:F9:ED:A6:1C:2C:3A:C4:86:FB:EF:5F:96:23:24:F8:B2:E7:13:30 Fingerprint (SHA1): D2:2D:82:6E:D3:74:FD:17:F8:91:70:5E:FE:73:69:BA:63:39:84:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142772 (0x3cafa034) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:29:16 2023 Not After : Wed Oct 18 14:29:16 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:92:15:42:2b:31:77:5b:a7:fc:3e:80:08:99:f7:82: 0b:88:1c:39:33:7b:20:bc:9a:79:3d:f4:83:55:0c:0b: 85:46:66:9c:29:4d:3a:a5:9d:d3:7b:c9:a3:b4:8d:13: 08:65:8b:12:c7:0f:51:c8:55:07:3d:fb:80:8f:6a:8f: 74:7c:82:b0:dc:0f:39:d8:c2:39:27:7d:7c:48:e0:bb: 61:c4:a3:b1:f6:3a:a9:bb:41:b4:26:a2:d7:a2:90:00: 3a:49:e8:8c:d9:97:8b:cc:3b:c0:4c:89:e7:be:ec:d5: 7c:02:c1:d2:ab:ee:c6:36:ff:b2:dd:9d:8a:92:c0:07: ca:ae:25:7c:fa:68:10:85:e4:ac:b3:01:9a:8b:8a:b2: c5:96:e4:60:08:a0:79:76:40:7d:e7:82:ee:64:1c:3c: da:e0:fe:22:6b:91:82:ee:08:95:92:e7:d5:db:4d:16: fe:51:92:fc:68:cc:13:a6:1e:2d:1e:ed:ba:1b:0c:eb: 61:e9:65:d6:6d:e3:b1:f5:5b:2a:17:dd:15:89:8e:93: 89:00:76:67:bc:13:b7:bc:fc:62:51:8e:ce:c3:db:44: 93:2d:c6:5e:47:ae:2b:f4:d1:b1:a2:99:1c:d9:9f:70: f2:17:2e:37:12:d5:f7:a3:dd:6d:ef:a7:1d:9f:4b:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:57:43:b8:b6:b1:b2:f2:2a:72:01:00:ad:0b:42:a0: 2a:6d:ec:b4:2c:b7:e1:bb:d6:88:f5:d5:6a:d5:72:21: 4b:7a:5b:56:ab:45:39:39:e0:2a:ea:fd:e5:52:8c:9f: 2e:0c:f0:58:90:c1:37:7b:55:09:c8:2b:f2:a6:a2:9a: 3f:9c:70:c8:3c:c2:86:38:bc:c8:d4:bb:ac:11:e5:4f: d1:7a:fa:02:54:6f:83:9e:26:f1:e8:96:c3:48:ef:3f: 0f:56:53:5c:d4:04:fa:db:8c:ef:b0:82:6b:cc:69:53: 7b:a1:23:e2:08:82:15:35:34:5c:ec:05:55:63:5e:10: 3f:b3:42:b1:71:1b:09:c7:2f:59:15:23:33:1e:0b:ad: df:6b:b2:67:80:17:43:84:3a:b7:8b:27:b5:a1:ba:68: 1f:cd:c6:47:b9:40:26:67:16:f1:5a:12:a6:11:38:25: df:50:68:2b:fb:27:32:70:3b:b8:1e:d7:de:a8:a3:fa: cf:65:4e:60:ed:5c:8b:d3:96:0a:58:06:a2:98:90:df: a0:47:d7:d1:bc:6e:d3:b4:be:c9:b5:de:52:0e:5e:89: 15:f8:32:7e:2f:51:d3:fc:3f:84:fd:b4:92:02:6f:a3: 03:07:3d:91:d4:9d:80:5b:86:05:08:56:fd:98:08:95 Fingerprint (SHA-256): 35:3C:77:2B:D7:E5:62:1F:56:53:24:94:4A:96:A8:AD:7B:5E:B6:5A:1E:0F:03:0C:59:58:52:56:94:71:8F:0E Fingerprint (SHA1): 8E:84:80:C0:86:24:8E:F6:43:16:3B:41:33:7A:3C:5C:EF:75:D9:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142773 (0x3cafa035) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:29:17 2023 Not After : Wed Oct 18 14:29:17 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:0e:bf:66:25:63:b1:42:a9:d3:36:53:06:a5:76:7a: d3:32:f5:df:98:df:29:04:f4:24:e2:a2:90:88:4a:1b: a1:8b:fb:8d:e6:03:c0:48:47:48:09:ce:46:99:af:69: 98:ac:89:64:5b:a6:fb:1e:ad:bd:78:3b:37:9b:94:76: 83:7f:02:7d:1f:ce:82:ed:ec:d6:29:42:6a:8c:e9:ea: e7:6c:32:4e:20:cf:03:db:9e:0a:99:1b:52:60:78:f2: bb:25:08:6a:6d:9b:b9:1c:9a:40:b0:1f:41:c4:a7:73: 61:7a:df:91:e8:b4:da:cb:72:e2:7a:d5:51:56:29:b5: 02:75:23:c5:65:27:10:59:6d:48:ad:6f:44:39:b6:48: e3:42:d0:81:d5:d7:19:0a:c9:77:51:22:b5:e4:23:36: b2:85:cb:c9:d8:61:a0:70:d9:c7:cd:11:46:63:e0:68: 1f:f4:4d:99:51:c8:6b:c4:f2:25:33:3a:bc:28:52:15: 23:4c:3b:c1:38:97:10:a7:78:e6:e4:1c:68:c6:79:2d: 09:e3:c1:f5:3a:49:29:96:53:7d:d9:85:ca:3a:d0:61: 97:91:88:d1:45:d7:72:ae:6f:3f:10:43:59:b9:45:bb: 1f:45:f9:f7:12:63:ab:9b:92:b2:e7:fe:4f:94:a8:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d9:d5:f3:92:42:a3:9f:05:8e:85:bf:77:dc:4f:09: f9:34:03:f3:bd:f5:2c:ad:41:c6:0b:c9:ac:ad:f3:95: 02:35:aa:f4:29:c5:8b:0d:aa:73:e6:bb:7a:81:02:61: 77:48:a4:5f:22:65:53:41:a1:e0:13:dd:92:9e:c0:0b: b4:7a:cf:b3:18:5b:dd:b0:15:e1:2f:63:b0:8e:7d:22: 9e:01:7a:f3:40:79:30:39:ea:58:d2:fd:e2:59:09:0b: 7f:ea:81:ee:1b:15:b4:47:ec:f1:ed:ed:f0:c7:8d:45: 0c:b0:12:5c:2e:d5:28:69:a9:48:54:84:d5:ce:03:41: 63:a1:fc:4f:7f:49:bd:31:43:2f:5e:92:c9:49:c5:7f: 30:d7:cc:88:08:7c:aa:95:f7:31:4a:97:37:2c:ad:ae: 97:59:ea:b8:7e:14:05:d8:a7:e6:c1:94:1d:8d:b1:d8: ce:6a:a1:55:44:9f:7d:cf:5e:9d:97:6a:95:7e:cf:f7: 2a:f2:c2:0f:0e:ec:93:15:e5:f4:d4:0b:19:78:fb:53: ac:f9:ad:4d:0b:a6:1c:90:43:83:4e:ff:0e:d9:55:01: c3:f8:20:5d:d7:73:74:10:f3:75:c9:1c:5d:36:56:61: 33:0e:ec:a6:46:8b:48:d6:b8:0f:57:21:ac:b7:d5:14 Fingerprint (SHA-256): 76:9C:0B:DC:81:75:74:AF:7D:DD:F5:A9:38:F4:36:21:98:47:72:1B:57:5D:B8:2D:78:BB:4F:64:4D:76:69:FB Fingerprint (SHA1): C7:78:8A:6B:09:4A:41:E1:DA:F5:7B:5B:40:0D:07:76:1F:EA:01:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142774 (0x3cafa036) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:29:18 2023 Not After : Wed Oct 18 14:29:18 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:a4:d4:d3:df:85:f0:c0:b8:08:65:d2:36:53:7d:22: 92:d6:e9:a7:f1:8e:6b:12:fd:84:8f:3f:96:2b:fb:c3: 59:40:e2:1a:6c:92:5f:cf:94:86:8c:5b:ab:28:b1:b1: a1:92:f2:18:c3:56:78:75:52:f0:04:a6:49:78:86:19: c8:ea:b3:a7:32:07:c1:f2:f7:bf:c0:df:dc:51:47:56: 9c:56:a9:a1:04:7f:9a:b7:68:b0:0e:43:2d:9a:f8:0f: 9f:90:0f:8e:c2:cb:04:2d:90:4b:01:66:d6:7a:83:2a: ef:f7:70:38:63:13:f0:a6:ab:78:84:a4:03:be:ba:44: f8:8e:3d:f9:0d:e3:45:6c:80:d7:b1:c4:01:00:fa:d8: 2e:23:87:b5:2f:fb:73:e3:50:c0:ff:a9:c9:da:95:dc: 5f:38:6d:e1:b5:d6:5f:f9:54:f3:ff:57:4a:a3:9a:5c: d0:a3:52:e2:91:d8:ac:87:e8:4f:af:86:1a:53:28:22: 19:3a:f1:10:37:dc:90:b4:d9:fd:0d:84:ff:82:a1:bb: 2a:88:29:b5:3c:2d:67:bf:de:c4:c3:72:89:83:7b:92: 9f:e6:1e:05:7d:ad:c4:1c:28:36:29:c8:d4:3d:61:ad: 57:da:4b:5b:74:bc:f0:7c:ca:69:d5:f9:4b:0a:8e:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:bf:6c:43:c5:4b:05:03:55:82:1f:b0:69:ed:e4:19: a9:6f:c2:16:6b:de:43:e9:62:dc:73:9f:9a:9a:15:19: 6e:de:3c:5b:df:dd:22:34:af:68:8e:9a:ef:97:b6:1f: 33:6e:b5:88:ef:24:93:eb:1b:e8:61:d3:7f:79:da:70: 25:52:c6:e0:78:64:95:21:4f:06:25:21:46:71:0a:c3: 05:ad:35:64:1b:78:73:4d:c6:55:52:ee:40:6f:78:e4: 6a:21:e3:03:9a:c1:89:57:f6:be:8b:13:42:e6:52:50: eb:28:27:f8:1a:6c:cd:e3:d3:b4:3a:ce:0c:0e:7b:cd: d1:1e:95:ed:20:d9:5c:8d:9e:17:28:be:a5:ef:60:ad: 87:8b:68:2b:3b:a2:cc:89:79:a8:3e:de:1a:87:2d:f0: b6:da:9e:bf:03:85:d2:4a:e8:7a:fb:07:9c:07:f3:03: d0:d1:fa:6a:54:de:76:70:bf:7b:66:6a:62:ea:f0:cf: 32:8e:b1:66:96:4b:c7:da:b3:17:a6:2c:07:9b:ca:4b: d9:7b:67:b6:a0:ea:99:0b:91:97:1f:aa:10:87:4d:3b: e6:ff:fc:14:04:8e:8d:9b:ab:02:fb:4c:57:61:82:e2: 8a:87:61:71:2b:3c:35:0d:2a:8f:33:15:95:2c:b1:a2 Fingerprint (SHA-256): 05:BC:BE:83:57:62:40:7B:45:BA:94:74:F4:B9:A9:BF:B6:24:59:C6:C6:97:6E:C6:5D:90:8F:B3:C6:03:99:28 Fingerprint (SHA1): 3B:8A:AB:F4:E2:59:E6:A5:05:8A:AA:D0:61:2C:1A:BC:28:33:AE:26 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142775 (0x3cafa037) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:29:19 2023 Not After : Wed Oct 18 14:29:19 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ef:99:2c:65:1a:ac:23:96:76:4a:0b:73:ce:44:9b:10: fa:d4:b5:96:88:9a:16:30:af:91:b3:2a:f8:8c:73:55: 0d:ad:4e:e8:e2:23:37:c6:31:7f:fb:9a:16:cd:a2:97: a3:27:1a:88:8d:23:8b:aa:8c:ed:f8:01:5d:b9:a3:58: d0:f7:a7:4e:30:ca:c2:af:a8:de:f0:3c:89:71:23:7e: 0b:fb:27:ce:9f:a9:83:b4:ac:75:ea:08:88:25:d9:b3: 2c:70:50:f5:34:af:96:9c:70:3e:a2:a4:71:7e:21:f8: f8:8d:22:e4:6e:75:aa:83:63:5d:32:15:08:56:8d:28: 44:76:9f:33:98:e3:78:94:27:e3:22:d3:ba:fd:b3:ad: f8:76:8a:f4:7a:13:7b:07:ac:a4:41:71:04:91:ec:6d: 23:b7:eb:d3:c4:9b:6e:53:6f:ec:17:f7:9d:24:87:21: 2c:a0:e4:10:25:cb:63:0f:61:5d:07:41:42:67:91:89: ef:49:22:23:66:7d:44:ff:b4:85:a0:12:d5:3d:8d:81: 39:7c:27:8c:bd:19:ce:3c:61:3c:14:3d:e5:f9:e2:d7: d5:5c:51:2d:c0:8c:f0:e5:9c:d2:82:8a:d7:15:f2:e3: 86:de:4b:93:0b:97:78:ef:6a:dd:04:60:c6:4f:d7:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:85:15:c0:a1:13:21:dd:48:f9:59:eb:20:7d:3b:5e: c3:e1:5f:90:45:e1:28:f1:ab:e2:06:72:dd:c4:24:27: 9a:22:f7:cf:1c:cf:b5:be:6c:75:13:41:e1:3f:cf:7d: 97:0e:a9:94:7e:15:60:59:45:dc:42:ee:e1:b0:cc:ac: a0:7a:70:da:3d:eb:e9:19:3c:92:13:37:ba:d3:73:28: d2:2e:0f:0d:70:15:44:e8:98:89:04:4b:e0:43:4b:22: 6f:6f:c9:be:67:57:10:2f:87:ab:b0:84:06:e8:90:34: 97:5b:a3:7d:fc:b2:52:09:24:c3:e0:03:c0:46:33:c0: 3c:63:c5:ea:68:66:2b:83:ee:84:ec:bf:52:0f:2d:03: 98:f1:16:96:fd:bb:2e:38:7f:6b:8f:0b:29:35:18:17: 71:5d:22:4d:4c:64:a4:42:86:c8:5a:77:31:c6:8c:0b: 7c:49:a8:b9:40:d1:3e:16:1b:de:2c:bb:72:62:00:a4: 04:ce:94:28:7b:3b:c8:38:db:42:f5:1c:89:ae:d8:91: 21:c7:bf:8f:91:2f:2b:e0:64:ad:68:9a:56:3d:38:35: 63:f5:4d:40:4e:5d:8b:34:33:b4:0b:2e:85:dd:39:43: ec:34:cb:b3:1a:e8:88:63:0d:1c:eb:66:f1:9a:04:1e Fingerprint (SHA-256): 15:EF:99:F9:CB:CC:42:2B:F9:CB:F1:46:4C:EC:0E:4A:13:18:EF:66:94:BD:05:AB:61:1C:7B:1B:2A:8D:DB:C1 Fingerprint (SHA1): 81:83:0E:E6:A6:D7:12:8A:B3:99:AE:9C:D9:6A:8A:D6:83:35:A8:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142790 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142791 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142792 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142793 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142790 (0x3cafa046) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:32 2023 Not After : Wed Oct 18 14:29:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:26:a6:d6:98:f1:50:35:68:dc:bd:e4:a4:f7:d1:27: 17:1b:a2:63:7c:07:51:30:61:21:75:89:54:19:af:d7: cf:52:f0:9b:b0:0c:12:84:6b:d2:04:2f:66:79:9d:11: 11:f5:4a:3a:a4:62:f2:99:05:45:b4:24:f4:4c:b2:bf: b8:62:e7:22:13:2f:70:f6:12:a5:76:62:68:ee:a3:1e: 67:73:98:80:41:65:78:8c:5c:4b:9e:d7:cf:66:3c:99: 2b:fa:7d:a2:9d:84:07:d4:fe:cc:e0:af:42:31:f1:fc: 3c:98:87:5b:dd:f3:fd:3d:60:3b:5c:08:d9:2a:1f:d6: 54:4a:17:7e:21:2e:1d:04:e1:b9:e7:c2:14:e1:d1:2f: 4b:66:37:60:7e:94:ac:81:6b:45:0d:bd:5d:37:76:f1: 2d:43:df:cb:63:56:42:1b:7a:72:80:02:81:d3:b8:42: 8c:81:46:a9:fb:16:7d:6a:81:63:ca:93:be:ac:7a:a2: af:fb:0b:82:01:24:eb:59:bb:b8:f1:50:78:34:ce:1e: 1d:26:01:95:3a:cc:75:ee:db:58:b1:5e:e0:3d:58:ba: 2d:95:02:e7:ac:a3:e9:a9:7f:46:04:00:40:dd:13:2e: e7:17:95:9d:a9:e4:ae:e1:22:89:dc:c8:07:4b:f6:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:e6:fc:e6:82:ca:88:94:03:62:e1:f8:ac:a4:8d:dc: 7e:c5:17:97:e4:49:36:e3:79:d6:6c:e0:85:29:25:61: 84:45:02:49:46:68:c5:e2:f0:6f:c4:16:a4:e2:04:1e: 46:52:10:18:f1:0c:75:46:a9:ea:bd:09:6a:62:b5:bb: ef:1f:2e:05:d3:da:cf:72:5e:52:00:c5:19:e8:e2:ed: 7c:49:8d:fe:ad:f8:8d:93:ca:33:12:9d:2b:61:92:5a: 4a:9a:4d:bf:cc:b5:0d:5d:5b:f2:28:25:15:2c:c4:3b: fe:2d:ba:3e:2f:8d:99:26:14:dd:7d:ab:53:fa:f6:5e: 29:2c:9b:8d:5a:3c:9e:3c:0e:ac:0d:8d:75:33:9f:0c: bd:03:95:fb:79:b5:a8:64:76:be:2c:98:6d:b9:d8:39: a5:2c:5b:49:62:4c:3d:c1:99:58:33:ba:3e:58:4a:37: 86:ce:c1:fd:c6:28:2a:17:af:52:0a:92:43:78:d9:1b: bf:15:cd:d0:09:3d:cf:01:73:be:b9:a6:36:71:00:d0: 4e:a7:7e:b5:56:e2:e7:19:d5:94:20:c6:6b:ac:6b:63: 84:45:de:a0:ea:d8:d8:56:c0:ac:e4:51:f7:11:5e:e0: d4:af:a6:cc:62:ac:77:ea:8d:08:df:6f:f8:bb:6a:31 Fingerprint (SHA-256): D1:AA:49:3B:95:E1:12:44:29:6F:90:9B:03:D8:2F:9B:77:03:E4:40:05:01:A4:C0:02:A1:15:AA:32:48:CE:AC Fingerprint (SHA1): 2D:45:3C:6F:87:EC:93:0A:65:88:BA:49:E0:88:C4:28:DD:3C:6F:B0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142791 (0x3cafa047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:33 2023 Not After : Wed Oct 18 14:29:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:96:6d:e9:3d:e9:bd:42:ff:c2:7a:74:70:54:86:ac: 54:52:62:4a:15:ea:46:8f:36:cd:af:7c:e4:60:47:87: e6:6e:5f:6f:af:ff:a9:a1:7e:38:45:77:ea:aa:ea:2c: 27:bb:6a:8d:a9:e2:44:ef:ea:4a:41:73:3a:8d:84:f3: 1f:3d:be:a9:04:a6:49:4b:b5:1d:fd:0f:5e:c9:8c:ad: 88:15:ef:05:a7:8e:ad:bf:34:fc:14:10:8f:33:71:e0: 7e:df:f1:f4:62:40:24:c9:fb:06:a7:27:74:cd:15:39: cc:15:2f:59:54:1c:08:e5:53:51:91:d7:91:fc:bd:15: 09:00:c4:46:aa:14:08:0e:86:d3:7c:9a:fb:29:37:3b: e6:ba:08:6b:75:cc:f2:6c:e7:41:c0:de:80:a5:3a:45: 07:a6:8e:d8:2b:ea:a5:81:68:cc:02:63:46:cc:af:00: 40:4b:a1:e0:59:2a:60:e8:a6:dc:ff:de:80:f9:e0:1e: 84:c8:6e:ae:ab:d3:76:80:fc:0f:e1:12:8c:16:16:bb: df:0c:a9:b7:28:b8:eb:a2:2b:2c:d8:6b:f9:fe:e6:0d: d0:8a:08:07:08:da:ae:4b:db:7b:74:2d:4b:78:ef:82: d2:11:fd:48:2a:3d:95:b4:67:40:5b:8a:cb:73:d2:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:97:44:9e:42:35:6b:ef:db:cd:46:89:a7:1e:18:e2: 34:3f:64:70:dd:91:e3:00:e7:b1:a8:a5:fe:29:59:b6: 74:2f:f9:cc:fc:eb:5e:c0:93:3e:8e:c7:26:3e:59:7c: d5:5a:4f:c6:1f:08:0e:e6:6a:ad:bb:13:03:35:5e:6d: 8a:61:2d:60:a7:b9:e9:a3:2e:6d:6f:2d:7f:d1:78:43: ed:98:d4:46:52:3e:07:61:f2:34:64:23:df:03:57:b9: 51:1c:c2:17:45:34:75:50:97:6f:32:17:ed:65:a1:86: 43:8b:62:7e:fc:a2:bc:e7:b6:47:a1:f3:6d:1c:c8:11: f4:ae:0b:5e:f9:53:da:e6:09:72:76:b9:1a:7d:d3:13: 5f:0a:1d:bd:28:17:a6:b7:bf:fb:96:07:4d:49:6d:df: 0a:7d:11:26:21:ad:53:75:b4:fb:b3:69:d6:c8:13:c3: f8:19:41:a0:70:d4:a7:2e:f3:ba:16:bc:23:77:c8:84: 1e:50:8a:60:94:9a:21:41:08:5e:39:51:70:6b:ce:58: 8e:74:65:88:da:85:8b:35:0f:84:3c:d2:14:21:35:78: 10:69:b8:bc:f1:a4:03:83:84:69:37:e1:e0:14:91:77: 93:98:84:0f:96:2d:21:5f:f1:6d:65:6e:35:33:84:3f Fingerprint (SHA-256): 86:7C:85:E4:81:D4:2F:49:59:76:59:97:DA:4F:21:CF:2E:BA:C5:A7:EB:92:82:58:1C:32:67:1D:DF:D5:64:29 Fingerprint (SHA1): 61:EF:45:A7:86:96:D5:1B:3A:05:DA:88:6F:88:9C:C6:28:7D:C3:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142792 (0x3cafa048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:34 2023 Not After : Wed Oct 18 14:29:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:31:01:7e:43:80:8a:f9:ed:7c:ff:d3:15:6a:0f:b5: 8d:69:05:8d:b5:d5:87:6c:76:67:b5:d6:04:d4:c4:60: 44:b6:ff:e4:8e:c0:7d:64:45:03:61:4d:e2:d8:3b:d8: 49:c8:9f:00:3b:87:4c:12:83:74:e7:c2:89:c9:a3:bb: ac:46:d1:2d:89:6f:68:8b:67:9c:20:9b:18:6d:54:89: 41:a1:38:13:c9:c9:2c:44:a1:02:fb:05:96:85:97:2a: 99:a9:cb:f2:fd:90:c7:f7:b9:fd:6e:70:33:14:11:dd: be:5a:77:ec:86:84:d9:81:cf:9c:5f:71:e0:ca:4f:f5: 63:c5:18:06:bf:b3:7d:c5:4c:7c:dc:90:e9:15:db:2c: 70:84:3a:5a:31:1a:42:35:e6:13:49:92:2f:2d:1c:84: db:47:47:93:4e:47:6b:36:f7:6c:16:27:a3:51:7c:5c: c1:c4:cd:0e:00:e2:b7:11:a9:6f:15:96:82:6f:86:79: 65:2a:a7:45:22:98:e1:97:54:22:6e:33:e1:ce:b3:4b: f5:b7:76:5e:ce:97:dd:3f:98:f6:85:d7:8d:df:f8:6e: ad:99:d2:1e:69:11:77:8e:89:9b:3f:fd:93:f9:1d:3d: cd:2d:f5:5c:87:e6:db:7c:d7:06:3b:26:0d:36:74:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:3d:5e:00:b6:d9:8f:24:8c:1c:2d:9c:fb:6b:3e:91: 86:07:2e:ae:91:a7:8c:23:1d:03:4d:24:14:54:ca:90: 62:0d:6e:5f:40:34:25:54:13:52:77:26:ba:7a:96:f5: c2:2b:12:9c:04:27:a4:9c:59:00:c4:ee:0b:86:83:6c: c8:4a:93:94:eb:b5:1e:6d:57:0a:b9:79:11:39:72:02: c9:89:fa:c0:fd:8a:82:fb:24:40:40:e5:a2:c2:54:38: 9d:8a:2b:73:66:89:c6:fd:6a:18:25:32:79:00:82:11: 90:2e:70:09:22:8f:0c:ef:d4:8f:43:b2:c3:b5:bd:05: 85:89:e4:a2:5e:3d:74:58:0d:97:ab:49:1b:0d:4d:3b: 75:3a:35:4f:b3:b3:32:ca:1b:4b:08:67:64:92:8f:0e: 33:f2:b8:95:32:69:80:c9:5f:22:76:1a:fb:dd:ae:91: c7:c4:c6:9c:af:f9:ec:5d:a5:c2:42:ac:eb:c5:33:de: 7f:d4:11:f7:d8:91:df:74:f4:19:01:0f:e2:51:51:5c: 18:be:f3:4d:56:a5:c3:47:b0:4f:bf:18:5e:24:13:4c: 3f:37:db:b9:c4:66:d1:ee:cb:ab:42:23:29:e4:c5:c5: 41:c4:c2:1e:cf:41:fb:47:00:8d:37:f4:19:27:cd:df Fingerprint (SHA-256): 0D:CC:51:6C:49:F4:B6:A2:F1:C9:2B:7D:A0:B6:67:D4:2B:E0:B1:EB:0B:6F:B6:FD:F5:B8:EC:65:B6:06:B3:06 Fingerprint (SHA1): 9D:DC:47:92:C4:B4:51:D9:0F:4F:6F:6B:11:87:6E:37:73:6A:72:38 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142790 (0x3cafa046) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:32 2023 Not After : Wed Oct 18 14:29:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:26:a6:d6:98:f1:50:35:68:dc:bd:e4:a4:f7:d1:27: 17:1b:a2:63:7c:07:51:30:61:21:75:89:54:19:af:d7: cf:52:f0:9b:b0:0c:12:84:6b:d2:04:2f:66:79:9d:11: 11:f5:4a:3a:a4:62:f2:99:05:45:b4:24:f4:4c:b2:bf: b8:62:e7:22:13:2f:70:f6:12:a5:76:62:68:ee:a3:1e: 67:73:98:80:41:65:78:8c:5c:4b:9e:d7:cf:66:3c:99: 2b:fa:7d:a2:9d:84:07:d4:fe:cc:e0:af:42:31:f1:fc: 3c:98:87:5b:dd:f3:fd:3d:60:3b:5c:08:d9:2a:1f:d6: 54:4a:17:7e:21:2e:1d:04:e1:b9:e7:c2:14:e1:d1:2f: 4b:66:37:60:7e:94:ac:81:6b:45:0d:bd:5d:37:76:f1: 2d:43:df:cb:63:56:42:1b:7a:72:80:02:81:d3:b8:42: 8c:81:46:a9:fb:16:7d:6a:81:63:ca:93:be:ac:7a:a2: af:fb:0b:82:01:24:eb:59:bb:b8:f1:50:78:34:ce:1e: 1d:26:01:95:3a:cc:75:ee:db:58:b1:5e:e0:3d:58:ba: 2d:95:02:e7:ac:a3:e9:a9:7f:46:04:00:40:dd:13:2e: e7:17:95:9d:a9:e4:ae:e1:22:89:dc:c8:07:4b:f6:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:e6:fc:e6:82:ca:88:94:03:62:e1:f8:ac:a4:8d:dc: 7e:c5:17:97:e4:49:36:e3:79:d6:6c:e0:85:29:25:61: 84:45:02:49:46:68:c5:e2:f0:6f:c4:16:a4:e2:04:1e: 46:52:10:18:f1:0c:75:46:a9:ea:bd:09:6a:62:b5:bb: ef:1f:2e:05:d3:da:cf:72:5e:52:00:c5:19:e8:e2:ed: 7c:49:8d:fe:ad:f8:8d:93:ca:33:12:9d:2b:61:92:5a: 4a:9a:4d:bf:cc:b5:0d:5d:5b:f2:28:25:15:2c:c4:3b: fe:2d:ba:3e:2f:8d:99:26:14:dd:7d:ab:53:fa:f6:5e: 29:2c:9b:8d:5a:3c:9e:3c:0e:ac:0d:8d:75:33:9f:0c: bd:03:95:fb:79:b5:a8:64:76:be:2c:98:6d:b9:d8:39: a5:2c:5b:49:62:4c:3d:c1:99:58:33:ba:3e:58:4a:37: 86:ce:c1:fd:c6:28:2a:17:af:52:0a:92:43:78:d9:1b: bf:15:cd:d0:09:3d:cf:01:73:be:b9:a6:36:71:00:d0: 4e:a7:7e:b5:56:e2:e7:19:d5:94:20:c6:6b:ac:6b:63: 84:45:de:a0:ea:d8:d8:56:c0:ac:e4:51:f7:11:5e:e0: d4:af:a6:cc:62:ac:77:ea:8d:08:df:6f:f8:bb:6a:31 Fingerprint (SHA-256): D1:AA:49:3B:95:E1:12:44:29:6F:90:9B:03:D8:2F:9B:77:03:E4:40:05:01:A4:C0:02:A1:15:AA:32:48:CE:AC Fingerprint (SHA1): 2D:45:3C:6F:87:EC:93:0A:65:88:BA:49:E0:88:C4:28:DD:3C:6F:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142791 (0x3cafa047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:33 2023 Not After : Wed Oct 18 14:29:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:96:6d:e9:3d:e9:bd:42:ff:c2:7a:74:70:54:86:ac: 54:52:62:4a:15:ea:46:8f:36:cd:af:7c:e4:60:47:87: e6:6e:5f:6f:af:ff:a9:a1:7e:38:45:77:ea:aa:ea:2c: 27:bb:6a:8d:a9:e2:44:ef:ea:4a:41:73:3a:8d:84:f3: 1f:3d:be:a9:04:a6:49:4b:b5:1d:fd:0f:5e:c9:8c:ad: 88:15:ef:05:a7:8e:ad:bf:34:fc:14:10:8f:33:71:e0: 7e:df:f1:f4:62:40:24:c9:fb:06:a7:27:74:cd:15:39: cc:15:2f:59:54:1c:08:e5:53:51:91:d7:91:fc:bd:15: 09:00:c4:46:aa:14:08:0e:86:d3:7c:9a:fb:29:37:3b: e6:ba:08:6b:75:cc:f2:6c:e7:41:c0:de:80:a5:3a:45: 07:a6:8e:d8:2b:ea:a5:81:68:cc:02:63:46:cc:af:00: 40:4b:a1:e0:59:2a:60:e8:a6:dc:ff:de:80:f9:e0:1e: 84:c8:6e:ae:ab:d3:76:80:fc:0f:e1:12:8c:16:16:bb: df:0c:a9:b7:28:b8:eb:a2:2b:2c:d8:6b:f9:fe:e6:0d: d0:8a:08:07:08:da:ae:4b:db:7b:74:2d:4b:78:ef:82: d2:11:fd:48:2a:3d:95:b4:67:40:5b:8a:cb:73:d2:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:97:44:9e:42:35:6b:ef:db:cd:46:89:a7:1e:18:e2: 34:3f:64:70:dd:91:e3:00:e7:b1:a8:a5:fe:29:59:b6: 74:2f:f9:cc:fc:eb:5e:c0:93:3e:8e:c7:26:3e:59:7c: d5:5a:4f:c6:1f:08:0e:e6:6a:ad:bb:13:03:35:5e:6d: 8a:61:2d:60:a7:b9:e9:a3:2e:6d:6f:2d:7f:d1:78:43: ed:98:d4:46:52:3e:07:61:f2:34:64:23:df:03:57:b9: 51:1c:c2:17:45:34:75:50:97:6f:32:17:ed:65:a1:86: 43:8b:62:7e:fc:a2:bc:e7:b6:47:a1:f3:6d:1c:c8:11: f4:ae:0b:5e:f9:53:da:e6:09:72:76:b9:1a:7d:d3:13: 5f:0a:1d:bd:28:17:a6:b7:bf:fb:96:07:4d:49:6d:df: 0a:7d:11:26:21:ad:53:75:b4:fb:b3:69:d6:c8:13:c3: f8:19:41:a0:70:d4:a7:2e:f3:ba:16:bc:23:77:c8:84: 1e:50:8a:60:94:9a:21:41:08:5e:39:51:70:6b:ce:58: 8e:74:65:88:da:85:8b:35:0f:84:3c:d2:14:21:35:78: 10:69:b8:bc:f1:a4:03:83:84:69:37:e1:e0:14:91:77: 93:98:84:0f:96:2d:21:5f:f1:6d:65:6e:35:33:84:3f Fingerprint (SHA-256): 86:7C:85:E4:81:D4:2F:49:59:76:59:97:DA:4F:21:CF:2E:BA:C5:A7:EB:92:82:58:1C:32:67:1D:DF:D5:64:29 Fingerprint (SHA1): 61:EF:45:A7:86:96:D5:1B:3A:05:DA:88:6F:88:9C:C6:28:7D:C3:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142792 (0x3cafa048) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:34 2023 Not After : Wed Oct 18 14:29:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:31:01:7e:43:80:8a:f9:ed:7c:ff:d3:15:6a:0f:b5: 8d:69:05:8d:b5:d5:87:6c:76:67:b5:d6:04:d4:c4:60: 44:b6:ff:e4:8e:c0:7d:64:45:03:61:4d:e2:d8:3b:d8: 49:c8:9f:00:3b:87:4c:12:83:74:e7:c2:89:c9:a3:bb: ac:46:d1:2d:89:6f:68:8b:67:9c:20:9b:18:6d:54:89: 41:a1:38:13:c9:c9:2c:44:a1:02:fb:05:96:85:97:2a: 99:a9:cb:f2:fd:90:c7:f7:b9:fd:6e:70:33:14:11:dd: be:5a:77:ec:86:84:d9:81:cf:9c:5f:71:e0:ca:4f:f5: 63:c5:18:06:bf:b3:7d:c5:4c:7c:dc:90:e9:15:db:2c: 70:84:3a:5a:31:1a:42:35:e6:13:49:92:2f:2d:1c:84: db:47:47:93:4e:47:6b:36:f7:6c:16:27:a3:51:7c:5c: c1:c4:cd:0e:00:e2:b7:11:a9:6f:15:96:82:6f:86:79: 65:2a:a7:45:22:98:e1:97:54:22:6e:33:e1:ce:b3:4b: f5:b7:76:5e:ce:97:dd:3f:98:f6:85:d7:8d:df:f8:6e: ad:99:d2:1e:69:11:77:8e:89:9b:3f:fd:93:f9:1d:3d: cd:2d:f5:5c:87:e6:db:7c:d7:06:3b:26:0d:36:74:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:3d:5e:00:b6:d9:8f:24:8c:1c:2d:9c:fb:6b:3e:91: 86:07:2e:ae:91:a7:8c:23:1d:03:4d:24:14:54:ca:90: 62:0d:6e:5f:40:34:25:54:13:52:77:26:ba:7a:96:f5: c2:2b:12:9c:04:27:a4:9c:59:00:c4:ee:0b:86:83:6c: c8:4a:93:94:eb:b5:1e:6d:57:0a:b9:79:11:39:72:02: c9:89:fa:c0:fd:8a:82:fb:24:40:40:e5:a2:c2:54:38: 9d:8a:2b:73:66:89:c6:fd:6a:18:25:32:79:00:82:11: 90:2e:70:09:22:8f:0c:ef:d4:8f:43:b2:c3:b5:bd:05: 85:89:e4:a2:5e:3d:74:58:0d:97:ab:49:1b:0d:4d:3b: 75:3a:35:4f:b3:b3:32:ca:1b:4b:08:67:64:92:8f:0e: 33:f2:b8:95:32:69:80:c9:5f:22:76:1a:fb:dd:ae:91: c7:c4:c6:9c:af:f9:ec:5d:a5:c2:42:ac:eb:c5:33:de: 7f:d4:11:f7:d8:91:df:74:f4:19:01:0f:e2:51:51:5c: 18:be:f3:4d:56:a5:c3:47:b0:4f:bf:18:5e:24:13:4c: 3f:37:db:b9:c4:66:d1:ee:cb:ab:42:23:29:e4:c5:c5: 41:c4:c2:1e:cf:41:fb:47:00:8d:37:f4:19:27:cd:df Fingerprint (SHA-256): 0D:CC:51:6C:49:F4:B6:A2:F1:C9:2B:7D:A0:B6:67:D4:2B:E0:B1:EB:0B:6F:B6:FD:F5:B8:EC:65:B6:06:B3:06 Fingerprint (SHA1): 9D:DC:47:92:C4:B4:51:D9:0F:4F:6F:6B:11:87:6E:37:73:6A:72:38 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142794 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142795 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142796 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018142797 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018142798 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142794 (0x3cafa04a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:39 2023 Not After : Wed Oct 18 14:29:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:98:64:17:4e:77:30:54:c0:cb:44:56:a5:65:30:0d: 8c:f7:2c:c7:ec:c7:c9:aa:25:82:0a:ec:ca:53:c8:eb: cf:96:0d:1b:35:d9:9e:04:98:75:fe:d9:e3:65:00:ec: 3c:50:92:bf:ab:bd:a6:62:05:3c:63:bd:57:37:2f:84: d8:15:5c:39:03:cf:c5:a4:84:df:8c:49:af:e9:c9:b6: bd:e4:56:1e:6f:43:4b:ae:3c:5c:0c:71:b8:15:0a:71: e3:3b:18:a2:62:22:fb:b9:d0:b1:56:e1:58:1c:64:a7: cf:66:80:e0:28:9b:4c:aa:15:22:2c:8f:23:d0:48:47: 79:73:f7:55:7e:7d:7a:68:30:c5:b9:ae:7e:7c:27:23: cc:84:7e:a7:c3:ce:93:69:5f:3f:43:63:ad:cc:59:60: fb:b6:64:aa:9d:ff:cb:32:49:51:cf:28:e5:e6:b9:e8: a9:77:15:e4:4b:aa:41:e1:c2:6e:09:1b:20:ec:ce:15: 06:0e:e0:0e:fb:2b:cf:5b:7b:86:11:26:e3:e2:58:f4: 4b:e9:c7:9c:0f:e2:d9:98:49:6f:2d:b6:2e:04:3d:c7: 43:2d:8d:8b:b1:e2:c2:fb:2e:9e:ba:e9:99:6c:58:2c: 72:87:f8:a7:e8:88:62:01:6b:11:68:37:c0:90:db:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:4f:a3:94:93:65:bf:49:c5:fc:95:b7:40:2a:c8:66: 23:80:d3:be:47:5b:9d:b6:59:1f:a0:88:19:2f:8e:90: d2:85:b6:ab:ad:99:84:12:b8:0d:bc:ac:69:9a:6d:6c: 58:5f:2d:27:ab:b6:87:c6:75:41:5b:1e:4e:79:64:3b: 54:9f:82:ee:8c:40:b0:11:5e:20:0d:58:26:7f:28:d4: 4e:d1:96:28:06:20:ba:24:37:e6:d6:72:53:4d:95:c8: d8:d2:76:04:61:84:d8:39:8f:b5:16:03:90:52:d9:1e: a4:aa:41:8c:b7:1a:05:11:a9:56:a4:92:26:1a:b4:a4: 28:10:64:8a:7f:a5:94:01:58:91:6a:88:db:10:d0:22: 0d:5f:fa:d6:66:8c:92:6c:e9:b3:09:1d:27:0a:00:e0: 46:02:12:99:02:f9:e8:98:8c:da:a0:d0:05:7d:8d:2e: 20:85:c6:59:9f:a4:d1:d5:56:9f:07:60:a5:5f:bf:c0: 63:cb:51:ed:50:7d:8e:90:88:1a:17:95:a6:38:95:ad: 3d:fc:5e:78:d6:0d:be:d6:d2:9d:d4:29:ae:f7:a7:5e: c7:3e:6d:6d:18:88:ff:34:31:ae:f7:0e:9e:48:04:4d: 38:7f:5b:12:d5:06:f1:cc:af:26:62:ff:57:f6:0a:8b Fingerprint (SHA-256): BA:78:09:3E:9F:7E:FD:93:68:04:89:AB:FD:7D:B8:23:F0:AA:8E:1B:78:14:90:3F:D3:94:BD:B6:7A:E9:AC:11 Fingerprint (SHA1): F3:93:52:48:A6:F9:25:0A:1D:88:67:30:8E:21:89:31:2A:F0:F4:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142795 (0x3cafa04b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:41 2023 Not After : Wed Oct 18 14:29:41 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f7:02:6a:6c:01:5d:93:13:43:54:04:b0:97:b5:2a: be:dd:b3:70:e4:30:bf:d8:54:5f:7c:3a:8c:16:44:ce: 48:3d:46:75:2f:99:55:93:e8:6e:f3:62:72:fd:fe:ad: 87:09:9c:7a:46:f1:11:7b:02:ca:4b:cd:1c:22:c6:1d: 3f:6c:78:d3:61:9d:ce:8e:89:54:0b:2f:51:05:08:9f: 73:7c:26:f0:0f:4c:d6:d8:75:c0:d0:71:7b:48:e1:bc: 43:15:ed:7f:27:a0:99:ef:7c:c7:9a:eb:31:c5:9a:22: b1:20:06:cc:2a:c6:5a:42:f7:e2:69:85:bd:17:87:22: 8d:53:45:15:89:0b:ab:89:cb:25:0f:7d:d5:99:09:47: 39:2a:1e:39:32:83:66:a2:6f:38:b5:9a:eb:92:0f:5c: a8:e7:79:b8:f8:a7:05:8a:df:b5:c2:0d:48:fb:7f:15: 7f:7b:98:dc:7b:5a:4e:7a:15:c0:54:8f:21:06:4a:10: de:07:9e:bb:7b:b5:f0:58:30:e8:56:7a:73:c0:2a:b6: d9:93:d5:ee:3e:61:85:28:d0:29:cb:70:43:51:b1:40: 15:3f:86:65:ec:a4:ea:a3:c2:08:a4:94:12:e9:a6:6a: 74:54:84:be:50:81:a6:b0:15:85:d3:25:76:16:8b:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:65:dc:9a:ad:20:48:63:e9:93:04:39:be:62:52:a8: 7a:ca:95:09:f3:d1:28:81:df:5a:90:b6:92:66:9f:e6: 71:de:1b:04:66:ec:84:d8:f1:5c:c1:17:e9:3b:d5:ae: e7:e4:ca:94:6e:b7:7c:1d:49:7e:e7:50:c2:56:9c:30: c3:db:b5:e8:ab:2f:17:5e:91:b5:29:7e:cb:28:e1:16: ce:51:77:ea:24:41:bf:f5:a8:dd:da:e0:8f:b1:b5:d8: 72:3a:d7:a3:a6:e6:a9:21:eb:2e:6b:91:c7:8f:5f:9d: 3a:2b:5f:11:3a:eb:c0:60:f6:bd:e0:11:19:78:a0:29: 2a:5c:82:b5:1e:9c:06:ed:82:6d:6d:da:94:ef:03:6a: 80:a4:fa:6b:60:04:6a:5f:eb:ea:e9:42:41:19:02:88: 80:16:36:ff:cc:e6:3a:d2:6e:8d:b3:49:3d:41:2e:2e: 16:f2:10:94:91:4c:8c:a6:67:0a:0d:60:61:ec:fb:2b: f0:2b:1f:c9:45:31:ec:2d:22:d4:72:5d:bf:62:04:92: 65:0b:93:f0:c8:49:02:4e:de:76:51:94:e4:25:33:8d: 27:c5:10:57:6a:93:72:1b:46:25:22:39:dc:0b:f5:f4: c2:d4:40:f0:59:fa:c9:ae:c3:48:0e:11:61:51:dd:b7 Fingerprint (SHA-256): 1C:2E:3D:B7:3D:C9:EB:5D:36:5C:3E:5F:5C:72:69:1C:87:81:AB:BB:D1:AA:19:DE:DC:52:12:6E:5D:6D:78:27 Fingerprint (SHA1): 2B:C9:D5:B3:76:10:BE:0F:E0:99:C9:70:78:CC:00:30:2B:76:46:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142796 (0x3cafa04c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:42 2023 Not After : Wed Oct 18 14:29:42 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0a:8f:93:a1:79:5c:5c:16:49:d7:a8:ac:a1:dc:2c: 81:2a:72:ae:e0:63:ae:98:02:c0:0a:e3:cf:74:b1:49: 68:87:87:73:e1:91:a0:3e:ba:2e:a6:0a:cb:99:f7:95: ad:51:c0:26:86:cb:e8:6e:33:ed:75:c4:9b:42:49:50: 32:68:cc:11:88:d2:71:f2:51:ab:3e:3e:bc:b7:64:27: 24:a1:70:0f:0d:8f:e3:6c:30:af:cd:99:72:0e:4f:e4: 0a:77:b7:7f:10:61:a7:40:1a:42:4f:35:24:24:37:f6: 0b:d3:76:6b:11:c6:2c:06:6d:e1:2f:b7:09:3a:36:9b: a0:14:f9:7b:6e:9e:65:da:e3:9c:bc:2e:04:7f:27:39: e2:ce:08:e9:a9:55:02:68:24:c4:05:c6:c5:90:8c:1b: eb:20:6d:59:46:da:b6:14:eb:68:47:09:3b:3e:0f:be: 09:7d:fb:29:65:2b:71:48:af:e3:8a:04:43:29:c6:44: b4:5f:f5:f5:6f:45:7a:e0:b6:bb:5c:87:7f:ef:59:39: da:04:fd:ea:36:ca:f5:67:8d:3a:15:33:f3:ba:7f:e7: a5:e1:a8:30:6f:d4:48:79:82:ea:38:a1:76:8e:a2:b1: 6b:96:4d:97:72:e7:f5:0a:cb:69:f8:53:62:7c:9b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:8e:16:17:80:83:89:75:d0:4a:d9:54:4d:f6:7e:d8: a8:2e:e3:02:d1:73:53:ef:da:78:aa:d1:68:56:ec:82: ef:5d:42:f3:9b:35:4c:41:e8:06:89:f8:eb:b5:fa:ce: 92:ad:78:42:d7:3c:56:09:27:9b:7a:cc:5e:fc:8f:b8: ed:a1:46:13:53:a5:8d:39:58:79:1d:56:97:32:04:ae: d8:15:35:5d:0b:b2:af:94:8e:2e:14:bf:36:96:8e:c7: 9f:1b:c4:ad:c6:46:06:87:79:66:98:2b:00:74:6a:28: ca:43:5a:04:e0:94:cf:93:e4:c8:ec:d9:71:08:71:61: 46:91:b9:39:56:40:52:ea:b9:c1:db:0a:8f:86:fe:06: 45:be:d0:87:ac:bb:3b:7f:f4:41:fd:f9:d9:15:13:1b: 42:28:16:3f:c9:4f:14:40:87:f7:5d:52:c8:6f:64:45: 87:56:5b:b2:fe:70:14:0f:26:49:ac:f1:85:f9:d7:1d: 3f:3d:23:ea:e2:79:06:ce:62:b4:82:99:2c:23:17:51: 4c:eb:07:63:f0:cd:7b:ea:c2:4e:33:25:c1:a3:8f:95: ee:34:9f:bb:95:23:96:1f:01:96:c5:00:9d:23:dc:e2: eb:d7:8b:be:52:25:61:cb:7e:b9:e7:fc:26:61:74:9a Fingerprint (SHA-256): DA:8F:C6:2E:D9:1E:89:E1:AB:E8:AD:26:9D:BC:7B:94:DA:2A:D7:E4:2F:E9:C5:B5:94:B3:1C:58:95:DC:A6:AC Fingerprint (SHA1): F9:B7:F7:86:0F:28:E1:4C:97:DC:7B:02:CF:63:E4:1E:4D:BA:DE:C3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142794 (0x3cafa04a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:39 2023 Not After : Wed Oct 18 14:29:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:98:64:17:4e:77:30:54:c0:cb:44:56:a5:65:30:0d: 8c:f7:2c:c7:ec:c7:c9:aa:25:82:0a:ec:ca:53:c8:eb: cf:96:0d:1b:35:d9:9e:04:98:75:fe:d9:e3:65:00:ec: 3c:50:92:bf:ab:bd:a6:62:05:3c:63:bd:57:37:2f:84: d8:15:5c:39:03:cf:c5:a4:84:df:8c:49:af:e9:c9:b6: bd:e4:56:1e:6f:43:4b:ae:3c:5c:0c:71:b8:15:0a:71: e3:3b:18:a2:62:22:fb:b9:d0:b1:56:e1:58:1c:64:a7: cf:66:80:e0:28:9b:4c:aa:15:22:2c:8f:23:d0:48:47: 79:73:f7:55:7e:7d:7a:68:30:c5:b9:ae:7e:7c:27:23: cc:84:7e:a7:c3:ce:93:69:5f:3f:43:63:ad:cc:59:60: fb:b6:64:aa:9d:ff:cb:32:49:51:cf:28:e5:e6:b9:e8: a9:77:15:e4:4b:aa:41:e1:c2:6e:09:1b:20:ec:ce:15: 06:0e:e0:0e:fb:2b:cf:5b:7b:86:11:26:e3:e2:58:f4: 4b:e9:c7:9c:0f:e2:d9:98:49:6f:2d:b6:2e:04:3d:c7: 43:2d:8d:8b:b1:e2:c2:fb:2e:9e:ba:e9:99:6c:58:2c: 72:87:f8:a7:e8:88:62:01:6b:11:68:37:c0:90:db:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:4f:a3:94:93:65:bf:49:c5:fc:95:b7:40:2a:c8:66: 23:80:d3:be:47:5b:9d:b6:59:1f:a0:88:19:2f:8e:90: d2:85:b6:ab:ad:99:84:12:b8:0d:bc:ac:69:9a:6d:6c: 58:5f:2d:27:ab:b6:87:c6:75:41:5b:1e:4e:79:64:3b: 54:9f:82:ee:8c:40:b0:11:5e:20:0d:58:26:7f:28:d4: 4e:d1:96:28:06:20:ba:24:37:e6:d6:72:53:4d:95:c8: d8:d2:76:04:61:84:d8:39:8f:b5:16:03:90:52:d9:1e: a4:aa:41:8c:b7:1a:05:11:a9:56:a4:92:26:1a:b4:a4: 28:10:64:8a:7f:a5:94:01:58:91:6a:88:db:10:d0:22: 0d:5f:fa:d6:66:8c:92:6c:e9:b3:09:1d:27:0a:00:e0: 46:02:12:99:02:f9:e8:98:8c:da:a0:d0:05:7d:8d:2e: 20:85:c6:59:9f:a4:d1:d5:56:9f:07:60:a5:5f:bf:c0: 63:cb:51:ed:50:7d:8e:90:88:1a:17:95:a6:38:95:ad: 3d:fc:5e:78:d6:0d:be:d6:d2:9d:d4:29:ae:f7:a7:5e: c7:3e:6d:6d:18:88:ff:34:31:ae:f7:0e:9e:48:04:4d: 38:7f:5b:12:d5:06:f1:cc:af:26:62:ff:57:f6:0a:8b Fingerprint (SHA-256): BA:78:09:3E:9F:7E:FD:93:68:04:89:AB:FD:7D:B8:23:F0:AA:8E:1B:78:14:90:3F:D3:94:BD:B6:7A:E9:AC:11 Fingerprint (SHA1): F3:93:52:48:A6:F9:25:0A:1D:88:67:30:8E:21:89:31:2A:F0:F4:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142795 (0x3cafa04b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:41 2023 Not After : Wed Oct 18 14:29:41 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f7:02:6a:6c:01:5d:93:13:43:54:04:b0:97:b5:2a: be:dd:b3:70:e4:30:bf:d8:54:5f:7c:3a:8c:16:44:ce: 48:3d:46:75:2f:99:55:93:e8:6e:f3:62:72:fd:fe:ad: 87:09:9c:7a:46:f1:11:7b:02:ca:4b:cd:1c:22:c6:1d: 3f:6c:78:d3:61:9d:ce:8e:89:54:0b:2f:51:05:08:9f: 73:7c:26:f0:0f:4c:d6:d8:75:c0:d0:71:7b:48:e1:bc: 43:15:ed:7f:27:a0:99:ef:7c:c7:9a:eb:31:c5:9a:22: b1:20:06:cc:2a:c6:5a:42:f7:e2:69:85:bd:17:87:22: 8d:53:45:15:89:0b:ab:89:cb:25:0f:7d:d5:99:09:47: 39:2a:1e:39:32:83:66:a2:6f:38:b5:9a:eb:92:0f:5c: a8:e7:79:b8:f8:a7:05:8a:df:b5:c2:0d:48:fb:7f:15: 7f:7b:98:dc:7b:5a:4e:7a:15:c0:54:8f:21:06:4a:10: de:07:9e:bb:7b:b5:f0:58:30:e8:56:7a:73:c0:2a:b6: d9:93:d5:ee:3e:61:85:28:d0:29:cb:70:43:51:b1:40: 15:3f:86:65:ec:a4:ea:a3:c2:08:a4:94:12:e9:a6:6a: 74:54:84:be:50:81:a6:b0:15:85:d3:25:76:16:8b:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:65:dc:9a:ad:20:48:63:e9:93:04:39:be:62:52:a8: 7a:ca:95:09:f3:d1:28:81:df:5a:90:b6:92:66:9f:e6: 71:de:1b:04:66:ec:84:d8:f1:5c:c1:17:e9:3b:d5:ae: e7:e4:ca:94:6e:b7:7c:1d:49:7e:e7:50:c2:56:9c:30: c3:db:b5:e8:ab:2f:17:5e:91:b5:29:7e:cb:28:e1:16: ce:51:77:ea:24:41:bf:f5:a8:dd:da:e0:8f:b1:b5:d8: 72:3a:d7:a3:a6:e6:a9:21:eb:2e:6b:91:c7:8f:5f:9d: 3a:2b:5f:11:3a:eb:c0:60:f6:bd:e0:11:19:78:a0:29: 2a:5c:82:b5:1e:9c:06:ed:82:6d:6d:da:94:ef:03:6a: 80:a4:fa:6b:60:04:6a:5f:eb:ea:e9:42:41:19:02:88: 80:16:36:ff:cc:e6:3a:d2:6e:8d:b3:49:3d:41:2e:2e: 16:f2:10:94:91:4c:8c:a6:67:0a:0d:60:61:ec:fb:2b: f0:2b:1f:c9:45:31:ec:2d:22:d4:72:5d:bf:62:04:92: 65:0b:93:f0:c8:49:02:4e:de:76:51:94:e4:25:33:8d: 27:c5:10:57:6a:93:72:1b:46:25:22:39:dc:0b:f5:f4: c2:d4:40:f0:59:fa:c9:ae:c3:48:0e:11:61:51:dd:b7 Fingerprint (SHA-256): 1C:2E:3D:B7:3D:C9:EB:5D:36:5C:3E:5F:5C:72:69:1C:87:81:AB:BB:D1:AA:19:DE:DC:52:12:6E:5D:6D:78:27 Fingerprint (SHA1): 2B:C9:D5:B3:76:10:BE:0F:E0:99:C9:70:78:CC:00:30:2B:76:46:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142796 (0x3cafa04c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:42 2023 Not After : Wed Oct 18 14:29:42 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0a:8f:93:a1:79:5c:5c:16:49:d7:a8:ac:a1:dc:2c: 81:2a:72:ae:e0:63:ae:98:02:c0:0a:e3:cf:74:b1:49: 68:87:87:73:e1:91:a0:3e:ba:2e:a6:0a:cb:99:f7:95: ad:51:c0:26:86:cb:e8:6e:33:ed:75:c4:9b:42:49:50: 32:68:cc:11:88:d2:71:f2:51:ab:3e:3e:bc:b7:64:27: 24:a1:70:0f:0d:8f:e3:6c:30:af:cd:99:72:0e:4f:e4: 0a:77:b7:7f:10:61:a7:40:1a:42:4f:35:24:24:37:f6: 0b:d3:76:6b:11:c6:2c:06:6d:e1:2f:b7:09:3a:36:9b: a0:14:f9:7b:6e:9e:65:da:e3:9c:bc:2e:04:7f:27:39: e2:ce:08:e9:a9:55:02:68:24:c4:05:c6:c5:90:8c:1b: eb:20:6d:59:46:da:b6:14:eb:68:47:09:3b:3e:0f:be: 09:7d:fb:29:65:2b:71:48:af:e3:8a:04:43:29:c6:44: b4:5f:f5:f5:6f:45:7a:e0:b6:bb:5c:87:7f:ef:59:39: da:04:fd:ea:36:ca:f5:67:8d:3a:15:33:f3:ba:7f:e7: a5:e1:a8:30:6f:d4:48:79:82:ea:38:a1:76:8e:a2:b1: 6b:96:4d:97:72:e7:f5:0a:cb:69:f8:53:62:7c:9b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:8e:16:17:80:83:89:75:d0:4a:d9:54:4d:f6:7e:d8: a8:2e:e3:02:d1:73:53:ef:da:78:aa:d1:68:56:ec:82: ef:5d:42:f3:9b:35:4c:41:e8:06:89:f8:eb:b5:fa:ce: 92:ad:78:42:d7:3c:56:09:27:9b:7a:cc:5e:fc:8f:b8: ed:a1:46:13:53:a5:8d:39:58:79:1d:56:97:32:04:ae: d8:15:35:5d:0b:b2:af:94:8e:2e:14:bf:36:96:8e:c7: 9f:1b:c4:ad:c6:46:06:87:79:66:98:2b:00:74:6a:28: ca:43:5a:04:e0:94:cf:93:e4:c8:ec:d9:71:08:71:61: 46:91:b9:39:56:40:52:ea:b9:c1:db:0a:8f:86:fe:06: 45:be:d0:87:ac:bb:3b:7f:f4:41:fd:f9:d9:15:13:1b: 42:28:16:3f:c9:4f:14:40:87:f7:5d:52:c8:6f:64:45: 87:56:5b:b2:fe:70:14:0f:26:49:ac:f1:85:f9:d7:1d: 3f:3d:23:ea:e2:79:06:ce:62:b4:82:99:2c:23:17:51: 4c:eb:07:63:f0:cd:7b:ea:c2:4e:33:25:c1:a3:8f:95: ee:34:9f:bb:95:23:96:1f:01:96:c5:00:9d:23:dc:e2: eb:d7:8b:be:52:25:61:cb:7e:b9:e7:fc:26:61:74:9a Fingerprint (SHA-256): DA:8F:C6:2E:D9:1E:89:E1:AB:E8:AD:26:9D:BC:7B:94:DA:2A:D7:E4:2F:E9:C5:B5:94:B3:1C:58:95:DC:A6:AC Fingerprint (SHA1): F9:B7:F7:86:0F:28:E1:4C:97:DC:7B:02:CF:63:E4:1E:4D:BA:DE:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142794 (0x3cafa04a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:39 2023 Not After : Wed Oct 18 14:29:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:98:64:17:4e:77:30:54:c0:cb:44:56:a5:65:30:0d: 8c:f7:2c:c7:ec:c7:c9:aa:25:82:0a:ec:ca:53:c8:eb: cf:96:0d:1b:35:d9:9e:04:98:75:fe:d9:e3:65:00:ec: 3c:50:92:bf:ab:bd:a6:62:05:3c:63:bd:57:37:2f:84: d8:15:5c:39:03:cf:c5:a4:84:df:8c:49:af:e9:c9:b6: bd:e4:56:1e:6f:43:4b:ae:3c:5c:0c:71:b8:15:0a:71: e3:3b:18:a2:62:22:fb:b9:d0:b1:56:e1:58:1c:64:a7: cf:66:80:e0:28:9b:4c:aa:15:22:2c:8f:23:d0:48:47: 79:73:f7:55:7e:7d:7a:68:30:c5:b9:ae:7e:7c:27:23: cc:84:7e:a7:c3:ce:93:69:5f:3f:43:63:ad:cc:59:60: fb:b6:64:aa:9d:ff:cb:32:49:51:cf:28:e5:e6:b9:e8: a9:77:15:e4:4b:aa:41:e1:c2:6e:09:1b:20:ec:ce:15: 06:0e:e0:0e:fb:2b:cf:5b:7b:86:11:26:e3:e2:58:f4: 4b:e9:c7:9c:0f:e2:d9:98:49:6f:2d:b6:2e:04:3d:c7: 43:2d:8d:8b:b1:e2:c2:fb:2e:9e:ba:e9:99:6c:58:2c: 72:87:f8:a7:e8:88:62:01:6b:11:68:37:c0:90:db:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:4f:a3:94:93:65:bf:49:c5:fc:95:b7:40:2a:c8:66: 23:80:d3:be:47:5b:9d:b6:59:1f:a0:88:19:2f:8e:90: d2:85:b6:ab:ad:99:84:12:b8:0d:bc:ac:69:9a:6d:6c: 58:5f:2d:27:ab:b6:87:c6:75:41:5b:1e:4e:79:64:3b: 54:9f:82:ee:8c:40:b0:11:5e:20:0d:58:26:7f:28:d4: 4e:d1:96:28:06:20:ba:24:37:e6:d6:72:53:4d:95:c8: d8:d2:76:04:61:84:d8:39:8f:b5:16:03:90:52:d9:1e: a4:aa:41:8c:b7:1a:05:11:a9:56:a4:92:26:1a:b4:a4: 28:10:64:8a:7f:a5:94:01:58:91:6a:88:db:10:d0:22: 0d:5f:fa:d6:66:8c:92:6c:e9:b3:09:1d:27:0a:00:e0: 46:02:12:99:02:f9:e8:98:8c:da:a0:d0:05:7d:8d:2e: 20:85:c6:59:9f:a4:d1:d5:56:9f:07:60:a5:5f:bf:c0: 63:cb:51:ed:50:7d:8e:90:88:1a:17:95:a6:38:95:ad: 3d:fc:5e:78:d6:0d:be:d6:d2:9d:d4:29:ae:f7:a7:5e: c7:3e:6d:6d:18:88:ff:34:31:ae:f7:0e:9e:48:04:4d: 38:7f:5b:12:d5:06:f1:cc:af:26:62:ff:57:f6:0a:8b Fingerprint (SHA-256): BA:78:09:3E:9F:7E:FD:93:68:04:89:AB:FD:7D:B8:23:F0:AA:8E:1B:78:14:90:3F:D3:94:BD:B6:7A:E9:AC:11 Fingerprint (SHA1): F3:93:52:48:A6:F9:25:0A:1D:88:67:30:8E:21:89:31:2A:F0:F4:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142794 (0x3cafa04a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:39 2023 Not After : Wed Oct 18 14:29:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:98:64:17:4e:77:30:54:c0:cb:44:56:a5:65:30:0d: 8c:f7:2c:c7:ec:c7:c9:aa:25:82:0a:ec:ca:53:c8:eb: cf:96:0d:1b:35:d9:9e:04:98:75:fe:d9:e3:65:00:ec: 3c:50:92:bf:ab:bd:a6:62:05:3c:63:bd:57:37:2f:84: d8:15:5c:39:03:cf:c5:a4:84:df:8c:49:af:e9:c9:b6: bd:e4:56:1e:6f:43:4b:ae:3c:5c:0c:71:b8:15:0a:71: e3:3b:18:a2:62:22:fb:b9:d0:b1:56:e1:58:1c:64:a7: cf:66:80:e0:28:9b:4c:aa:15:22:2c:8f:23:d0:48:47: 79:73:f7:55:7e:7d:7a:68:30:c5:b9:ae:7e:7c:27:23: cc:84:7e:a7:c3:ce:93:69:5f:3f:43:63:ad:cc:59:60: fb:b6:64:aa:9d:ff:cb:32:49:51:cf:28:e5:e6:b9:e8: a9:77:15:e4:4b:aa:41:e1:c2:6e:09:1b:20:ec:ce:15: 06:0e:e0:0e:fb:2b:cf:5b:7b:86:11:26:e3:e2:58:f4: 4b:e9:c7:9c:0f:e2:d9:98:49:6f:2d:b6:2e:04:3d:c7: 43:2d:8d:8b:b1:e2:c2:fb:2e:9e:ba:e9:99:6c:58:2c: 72:87:f8:a7:e8:88:62:01:6b:11:68:37:c0:90:db:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:4f:a3:94:93:65:bf:49:c5:fc:95:b7:40:2a:c8:66: 23:80:d3:be:47:5b:9d:b6:59:1f:a0:88:19:2f:8e:90: d2:85:b6:ab:ad:99:84:12:b8:0d:bc:ac:69:9a:6d:6c: 58:5f:2d:27:ab:b6:87:c6:75:41:5b:1e:4e:79:64:3b: 54:9f:82:ee:8c:40:b0:11:5e:20:0d:58:26:7f:28:d4: 4e:d1:96:28:06:20:ba:24:37:e6:d6:72:53:4d:95:c8: d8:d2:76:04:61:84:d8:39:8f:b5:16:03:90:52:d9:1e: a4:aa:41:8c:b7:1a:05:11:a9:56:a4:92:26:1a:b4:a4: 28:10:64:8a:7f:a5:94:01:58:91:6a:88:db:10:d0:22: 0d:5f:fa:d6:66:8c:92:6c:e9:b3:09:1d:27:0a:00:e0: 46:02:12:99:02:f9:e8:98:8c:da:a0:d0:05:7d:8d:2e: 20:85:c6:59:9f:a4:d1:d5:56:9f:07:60:a5:5f:bf:c0: 63:cb:51:ed:50:7d:8e:90:88:1a:17:95:a6:38:95:ad: 3d:fc:5e:78:d6:0d:be:d6:d2:9d:d4:29:ae:f7:a7:5e: c7:3e:6d:6d:18:88:ff:34:31:ae:f7:0e:9e:48:04:4d: 38:7f:5b:12:d5:06:f1:cc:af:26:62:ff:57:f6:0a:8b Fingerprint (SHA-256): BA:78:09:3E:9F:7E:FD:93:68:04:89:AB:FD:7D:B8:23:F0:AA:8E:1B:78:14:90:3F:D3:94:BD:B6:7A:E9:AC:11 Fingerprint (SHA1): F3:93:52:48:A6:F9:25:0A:1D:88:67:30:8E:21:89:31:2A:F0:F4:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142795 (0x3cafa04b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:41 2023 Not After : Wed Oct 18 14:29:41 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f7:02:6a:6c:01:5d:93:13:43:54:04:b0:97:b5:2a: be:dd:b3:70:e4:30:bf:d8:54:5f:7c:3a:8c:16:44:ce: 48:3d:46:75:2f:99:55:93:e8:6e:f3:62:72:fd:fe:ad: 87:09:9c:7a:46:f1:11:7b:02:ca:4b:cd:1c:22:c6:1d: 3f:6c:78:d3:61:9d:ce:8e:89:54:0b:2f:51:05:08:9f: 73:7c:26:f0:0f:4c:d6:d8:75:c0:d0:71:7b:48:e1:bc: 43:15:ed:7f:27:a0:99:ef:7c:c7:9a:eb:31:c5:9a:22: b1:20:06:cc:2a:c6:5a:42:f7:e2:69:85:bd:17:87:22: 8d:53:45:15:89:0b:ab:89:cb:25:0f:7d:d5:99:09:47: 39:2a:1e:39:32:83:66:a2:6f:38:b5:9a:eb:92:0f:5c: a8:e7:79:b8:f8:a7:05:8a:df:b5:c2:0d:48:fb:7f:15: 7f:7b:98:dc:7b:5a:4e:7a:15:c0:54:8f:21:06:4a:10: de:07:9e:bb:7b:b5:f0:58:30:e8:56:7a:73:c0:2a:b6: d9:93:d5:ee:3e:61:85:28:d0:29:cb:70:43:51:b1:40: 15:3f:86:65:ec:a4:ea:a3:c2:08:a4:94:12:e9:a6:6a: 74:54:84:be:50:81:a6:b0:15:85:d3:25:76:16:8b:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:65:dc:9a:ad:20:48:63:e9:93:04:39:be:62:52:a8: 7a:ca:95:09:f3:d1:28:81:df:5a:90:b6:92:66:9f:e6: 71:de:1b:04:66:ec:84:d8:f1:5c:c1:17:e9:3b:d5:ae: e7:e4:ca:94:6e:b7:7c:1d:49:7e:e7:50:c2:56:9c:30: c3:db:b5:e8:ab:2f:17:5e:91:b5:29:7e:cb:28:e1:16: ce:51:77:ea:24:41:bf:f5:a8:dd:da:e0:8f:b1:b5:d8: 72:3a:d7:a3:a6:e6:a9:21:eb:2e:6b:91:c7:8f:5f:9d: 3a:2b:5f:11:3a:eb:c0:60:f6:bd:e0:11:19:78:a0:29: 2a:5c:82:b5:1e:9c:06:ed:82:6d:6d:da:94:ef:03:6a: 80:a4:fa:6b:60:04:6a:5f:eb:ea:e9:42:41:19:02:88: 80:16:36:ff:cc:e6:3a:d2:6e:8d:b3:49:3d:41:2e:2e: 16:f2:10:94:91:4c:8c:a6:67:0a:0d:60:61:ec:fb:2b: f0:2b:1f:c9:45:31:ec:2d:22:d4:72:5d:bf:62:04:92: 65:0b:93:f0:c8:49:02:4e:de:76:51:94:e4:25:33:8d: 27:c5:10:57:6a:93:72:1b:46:25:22:39:dc:0b:f5:f4: c2:d4:40:f0:59:fa:c9:ae:c3:48:0e:11:61:51:dd:b7 Fingerprint (SHA-256): 1C:2E:3D:B7:3D:C9:EB:5D:36:5C:3E:5F:5C:72:69:1C:87:81:AB:BB:D1:AA:19:DE:DC:52:12:6E:5D:6D:78:27 Fingerprint (SHA1): 2B:C9:D5:B3:76:10:BE:0F:E0:99:C9:70:78:CC:00:30:2B:76:46:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142795 (0x3cafa04b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:29:41 2023 Not After : Wed Oct 18 14:29:41 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f7:02:6a:6c:01:5d:93:13:43:54:04:b0:97:b5:2a: be:dd:b3:70:e4:30:bf:d8:54:5f:7c:3a:8c:16:44:ce: 48:3d:46:75:2f:99:55:93:e8:6e:f3:62:72:fd:fe:ad: 87:09:9c:7a:46:f1:11:7b:02:ca:4b:cd:1c:22:c6:1d: 3f:6c:78:d3:61:9d:ce:8e:89:54:0b:2f:51:05:08:9f: 73:7c:26:f0:0f:4c:d6:d8:75:c0:d0:71:7b:48:e1:bc: 43:15:ed:7f:27:a0:99:ef:7c:c7:9a:eb:31:c5:9a:22: b1:20:06:cc:2a:c6:5a:42:f7:e2:69:85:bd:17:87:22: 8d:53:45:15:89:0b:ab:89:cb:25:0f:7d:d5:99:09:47: 39:2a:1e:39:32:83:66:a2:6f:38:b5:9a:eb:92:0f:5c: a8:e7:79:b8:f8:a7:05:8a:df:b5:c2:0d:48:fb:7f:15: 7f:7b:98:dc:7b:5a:4e:7a:15:c0:54:8f:21:06:4a:10: de:07:9e:bb:7b:b5:f0:58:30:e8:56:7a:73:c0:2a:b6: d9:93:d5:ee:3e:61:85:28:d0:29:cb:70:43:51:b1:40: 15:3f:86:65:ec:a4:ea:a3:c2:08:a4:94:12:e9:a6:6a: 74:54:84:be:50:81:a6:b0:15:85:d3:25:76:16:8b:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:65:dc:9a:ad:20:48:63:e9:93:04:39:be:62:52:a8: 7a:ca:95:09:f3:d1:28:81:df:5a:90:b6:92:66:9f:e6: 71:de:1b:04:66:ec:84:d8:f1:5c:c1:17:e9:3b:d5:ae: e7:e4:ca:94:6e:b7:7c:1d:49:7e:e7:50:c2:56:9c:30: c3:db:b5:e8:ab:2f:17:5e:91:b5:29:7e:cb:28:e1:16: ce:51:77:ea:24:41:bf:f5:a8:dd:da:e0:8f:b1:b5:d8: 72:3a:d7:a3:a6:e6:a9:21:eb:2e:6b:91:c7:8f:5f:9d: 3a:2b:5f:11:3a:eb:c0:60:f6:bd:e0:11:19:78:a0:29: 2a:5c:82:b5:1e:9c:06:ed:82:6d:6d:da:94:ef:03:6a: 80:a4:fa:6b:60:04:6a:5f:eb:ea:e9:42:41:19:02:88: 80:16:36:ff:cc:e6:3a:d2:6e:8d:b3:49:3d:41:2e:2e: 16:f2:10:94:91:4c:8c:a6:67:0a:0d:60:61:ec:fb:2b: f0:2b:1f:c9:45:31:ec:2d:22:d4:72:5d:bf:62:04:92: 65:0b:93:f0:c8:49:02:4e:de:76:51:94:e4:25:33:8d: 27:c5:10:57:6a:93:72:1b:46:25:22:39:dc:0b:f5:f4: c2:d4:40:f0:59:fa:c9:ae:c3:48:0e:11:61:51:dd:b7 Fingerprint (SHA-256): 1C:2E:3D:B7:3D:C9:EB:5D:36:5C:3E:5F:5C:72:69:1C:87:81:AB:BB:D1:AA:19:DE:DC:52:12:6E:5D:6D:78:27 Fingerprint (SHA1): 2B:C9:D5:B3:76:10:BE:0F:E0:99:C9:70:78:CC:00:30:2B:76:46:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142796 (0x3cafa04c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:42 2023 Not After : Wed Oct 18 14:29:42 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0a:8f:93:a1:79:5c:5c:16:49:d7:a8:ac:a1:dc:2c: 81:2a:72:ae:e0:63:ae:98:02:c0:0a:e3:cf:74:b1:49: 68:87:87:73:e1:91:a0:3e:ba:2e:a6:0a:cb:99:f7:95: ad:51:c0:26:86:cb:e8:6e:33:ed:75:c4:9b:42:49:50: 32:68:cc:11:88:d2:71:f2:51:ab:3e:3e:bc:b7:64:27: 24:a1:70:0f:0d:8f:e3:6c:30:af:cd:99:72:0e:4f:e4: 0a:77:b7:7f:10:61:a7:40:1a:42:4f:35:24:24:37:f6: 0b:d3:76:6b:11:c6:2c:06:6d:e1:2f:b7:09:3a:36:9b: a0:14:f9:7b:6e:9e:65:da:e3:9c:bc:2e:04:7f:27:39: e2:ce:08:e9:a9:55:02:68:24:c4:05:c6:c5:90:8c:1b: eb:20:6d:59:46:da:b6:14:eb:68:47:09:3b:3e:0f:be: 09:7d:fb:29:65:2b:71:48:af:e3:8a:04:43:29:c6:44: b4:5f:f5:f5:6f:45:7a:e0:b6:bb:5c:87:7f:ef:59:39: da:04:fd:ea:36:ca:f5:67:8d:3a:15:33:f3:ba:7f:e7: a5:e1:a8:30:6f:d4:48:79:82:ea:38:a1:76:8e:a2:b1: 6b:96:4d:97:72:e7:f5:0a:cb:69:f8:53:62:7c:9b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:8e:16:17:80:83:89:75:d0:4a:d9:54:4d:f6:7e:d8: a8:2e:e3:02:d1:73:53:ef:da:78:aa:d1:68:56:ec:82: ef:5d:42:f3:9b:35:4c:41:e8:06:89:f8:eb:b5:fa:ce: 92:ad:78:42:d7:3c:56:09:27:9b:7a:cc:5e:fc:8f:b8: ed:a1:46:13:53:a5:8d:39:58:79:1d:56:97:32:04:ae: d8:15:35:5d:0b:b2:af:94:8e:2e:14:bf:36:96:8e:c7: 9f:1b:c4:ad:c6:46:06:87:79:66:98:2b:00:74:6a:28: ca:43:5a:04:e0:94:cf:93:e4:c8:ec:d9:71:08:71:61: 46:91:b9:39:56:40:52:ea:b9:c1:db:0a:8f:86:fe:06: 45:be:d0:87:ac:bb:3b:7f:f4:41:fd:f9:d9:15:13:1b: 42:28:16:3f:c9:4f:14:40:87:f7:5d:52:c8:6f:64:45: 87:56:5b:b2:fe:70:14:0f:26:49:ac:f1:85:f9:d7:1d: 3f:3d:23:ea:e2:79:06:ce:62:b4:82:99:2c:23:17:51: 4c:eb:07:63:f0:cd:7b:ea:c2:4e:33:25:c1:a3:8f:95: ee:34:9f:bb:95:23:96:1f:01:96:c5:00:9d:23:dc:e2: eb:d7:8b:be:52:25:61:cb:7e:b9:e7:fc:26:61:74:9a Fingerprint (SHA-256): DA:8F:C6:2E:D9:1E:89:E1:AB:E8:AD:26:9D:BC:7B:94:DA:2A:D7:E4:2F:E9:C5:B5:94:B3:1C:58:95:DC:A6:AC Fingerprint (SHA1): F9:B7:F7:86:0F:28:E1:4C:97:DC:7B:02:CF:63:E4:1E:4D:BA:DE:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142796 (0x3cafa04c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:29:42 2023 Not After : Wed Oct 18 14:29:42 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:0a:8f:93:a1:79:5c:5c:16:49:d7:a8:ac:a1:dc:2c: 81:2a:72:ae:e0:63:ae:98:02:c0:0a:e3:cf:74:b1:49: 68:87:87:73:e1:91:a0:3e:ba:2e:a6:0a:cb:99:f7:95: ad:51:c0:26:86:cb:e8:6e:33:ed:75:c4:9b:42:49:50: 32:68:cc:11:88:d2:71:f2:51:ab:3e:3e:bc:b7:64:27: 24:a1:70:0f:0d:8f:e3:6c:30:af:cd:99:72:0e:4f:e4: 0a:77:b7:7f:10:61:a7:40:1a:42:4f:35:24:24:37:f6: 0b:d3:76:6b:11:c6:2c:06:6d:e1:2f:b7:09:3a:36:9b: a0:14:f9:7b:6e:9e:65:da:e3:9c:bc:2e:04:7f:27:39: e2:ce:08:e9:a9:55:02:68:24:c4:05:c6:c5:90:8c:1b: eb:20:6d:59:46:da:b6:14:eb:68:47:09:3b:3e:0f:be: 09:7d:fb:29:65:2b:71:48:af:e3:8a:04:43:29:c6:44: b4:5f:f5:f5:6f:45:7a:e0:b6:bb:5c:87:7f:ef:59:39: da:04:fd:ea:36:ca:f5:67:8d:3a:15:33:f3:ba:7f:e7: a5:e1:a8:30:6f:d4:48:79:82:ea:38:a1:76:8e:a2:b1: 6b:96:4d:97:72:e7:f5:0a:cb:69:f8:53:62:7c:9b:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:8e:16:17:80:83:89:75:d0:4a:d9:54:4d:f6:7e:d8: a8:2e:e3:02:d1:73:53:ef:da:78:aa:d1:68:56:ec:82: ef:5d:42:f3:9b:35:4c:41:e8:06:89:f8:eb:b5:fa:ce: 92:ad:78:42:d7:3c:56:09:27:9b:7a:cc:5e:fc:8f:b8: ed:a1:46:13:53:a5:8d:39:58:79:1d:56:97:32:04:ae: d8:15:35:5d:0b:b2:af:94:8e:2e:14:bf:36:96:8e:c7: 9f:1b:c4:ad:c6:46:06:87:79:66:98:2b:00:74:6a:28: ca:43:5a:04:e0:94:cf:93:e4:c8:ec:d9:71:08:71:61: 46:91:b9:39:56:40:52:ea:b9:c1:db:0a:8f:86:fe:06: 45:be:d0:87:ac:bb:3b:7f:f4:41:fd:f9:d9:15:13:1b: 42:28:16:3f:c9:4f:14:40:87:f7:5d:52:c8:6f:64:45: 87:56:5b:b2:fe:70:14:0f:26:49:ac:f1:85:f9:d7:1d: 3f:3d:23:ea:e2:79:06:ce:62:b4:82:99:2c:23:17:51: 4c:eb:07:63:f0:cd:7b:ea:c2:4e:33:25:c1:a3:8f:95: ee:34:9f:bb:95:23:96:1f:01:96:c5:00:9d:23:dc:e2: eb:d7:8b:be:52:25:61:cb:7e:b9:e7:fc:26:61:74:9a Fingerprint (SHA-256): DA:8F:C6:2E:D9:1E:89:E1:AB:E8:AD:26:9D:BC:7B:94:DA:2A:D7:E4:2F:E9:C5:B5:94:B3:1C:58:95:DC:A6:AC Fingerprint (SHA1): F9:B7:F7:86:0F:28:E1:4C:97:DC:7B:02:CF:63:E4:1E:4D:BA:DE:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142799 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018142800 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142801 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018142802 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018142803 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018142804 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018142805 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142799 (0x3cafa04f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:49 2023 Not After : Wed Oct 18 14:29:49 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:81:e5:05:17:a9:84:87:c0:aa:28:6e:a4:9d:e1:77: c1:e2:ad:66:8d:48:89:bf:b4:a6:c5:2d:f2:eb:a1:b5: 38:f5:ac:66:68:1d:dd:8e:1d:f8:d2:05:4c:98:dc:50: 2a:17:55:98:9f:e8:88:1b:f7:a1:75:8c:f5:d3:1a:d4: c1:5d:ef:7d:7f:87:f1:52:ac:0e:39:38:fd:0e:46:58: 39:6c:6c:68:56:5f:59:51:d6:c5:7a:27:5f:70:a7:eb: 99:67:33:ee:1d:97:a1:69:74:41:09:9d:4e:4e:aa:14: 09:33:22:3e:80:40:4a:8e:3e:ae:2d:95:92:98:74:e5: 76:0a:7a:ba:47:2f:c0:7a:e0:eb:88:c0:05:f0:e9:58: 81:f7:74:82:77:8d:13:2a:6c:86:6d:bf:88:f8:fb:ca: 39:43:c1:9d:cb:35:f7:dc:da:d4:33:34:73:5b:ff:8f: 17:4d:5b:11:cd:95:6a:f1:c9:3f:fe:0f:89:14:b4:d7: e0:37:43:42:b2:10:b9:23:a6:78:46:76:14:92:87:b9: ca:10:1f:a4:67:26:e8:60:48:67:b6:42:48:1a:32:a2: ee:f2:50:45:37:aa:ce:fb:85:1d:7c:8d:f3:89:72:69: 9d:d3:03:e7:a0:1d:45:b5:69:b6:46:c6:16:ed:a9:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:4e:46:1c:c6:18:20:9c:da:5d:b4:d9:10:51:fc:39: 7a:2e:ba:de:d0:29:da:a8:4d:dc:d2:b9:14:f7:07:16: 9e:ef:6f:2f:cd:be:54:88:8b:af:42:c2:ed:6b:8f:e3: 68:3b:ba:41:ce:89:b2:00:9c:b8:26:42:67:36:57:69: c5:97:38:c5:be:39:9f:f9:02:7d:4d:5c:db:58:25:a9: 93:05:1b:a8:81:79:d9:ff:6c:48:2b:94:f2:fa:e6:12: 55:91:e0:dc:a9:a9:f1:40:10:8d:60:9d:be:4b:ba:e0: 17:76:53:e7:aa:68:be:36:fe:25:99:61:e8:69:80:6e: 5c:79:f3:f5:c1:f3:d7:87:cd:a9:09:35:02:4b:52:01: a2:e7:c1:eb:a1:ee:4b:c8:80:a8:30:b2:b6:9a:16:ef: de:b3:86:13:75:8a:f2:cd:14:b1:37:c9:65:2e:04:15: e8:b7:15:4e:cc:01:54:19:c9:b4:ee:eb:77:aa:3c:1e: 44:1a:c7:d6:d4:e3:5e:1b:87:1d:87:a6:ae:39:a0:1c: ba:5b:c1:6a:36:94:0d:36:60:c0:99:8d:18:21:7d:02: eb:d7:a6:91:7c:ee:3d:27:fc:9f:d3:b1:05:c4:c0:e4: 71:45:9e:f2:3c:d1:8a:5c:78:f7:dc:ac:cb:fd:89:c2 Fingerprint (SHA-256): 04:79:AB:57:0E:6D:F0:A0:34:B3:36:E4:B5:8D:EF:17:92:27:69:27:54:12:AD:41:FA:48:75:50:42:27:7F:20 Fingerprint (SHA1): 6F:A1:DD:D9:1D:82:DD:36:62:D1:38:F0:E9:4B:C0:26:CF:5B:66:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142799 (0x3cafa04f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:49 2023 Not After : Wed Oct 18 14:29:49 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:81:e5:05:17:a9:84:87:c0:aa:28:6e:a4:9d:e1:77: c1:e2:ad:66:8d:48:89:bf:b4:a6:c5:2d:f2:eb:a1:b5: 38:f5:ac:66:68:1d:dd:8e:1d:f8:d2:05:4c:98:dc:50: 2a:17:55:98:9f:e8:88:1b:f7:a1:75:8c:f5:d3:1a:d4: c1:5d:ef:7d:7f:87:f1:52:ac:0e:39:38:fd:0e:46:58: 39:6c:6c:68:56:5f:59:51:d6:c5:7a:27:5f:70:a7:eb: 99:67:33:ee:1d:97:a1:69:74:41:09:9d:4e:4e:aa:14: 09:33:22:3e:80:40:4a:8e:3e:ae:2d:95:92:98:74:e5: 76:0a:7a:ba:47:2f:c0:7a:e0:eb:88:c0:05:f0:e9:58: 81:f7:74:82:77:8d:13:2a:6c:86:6d:bf:88:f8:fb:ca: 39:43:c1:9d:cb:35:f7:dc:da:d4:33:34:73:5b:ff:8f: 17:4d:5b:11:cd:95:6a:f1:c9:3f:fe:0f:89:14:b4:d7: e0:37:43:42:b2:10:b9:23:a6:78:46:76:14:92:87:b9: ca:10:1f:a4:67:26:e8:60:48:67:b6:42:48:1a:32:a2: ee:f2:50:45:37:aa:ce:fb:85:1d:7c:8d:f3:89:72:69: 9d:d3:03:e7:a0:1d:45:b5:69:b6:46:c6:16:ed:a9:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:4e:46:1c:c6:18:20:9c:da:5d:b4:d9:10:51:fc:39: 7a:2e:ba:de:d0:29:da:a8:4d:dc:d2:b9:14:f7:07:16: 9e:ef:6f:2f:cd:be:54:88:8b:af:42:c2:ed:6b:8f:e3: 68:3b:ba:41:ce:89:b2:00:9c:b8:26:42:67:36:57:69: c5:97:38:c5:be:39:9f:f9:02:7d:4d:5c:db:58:25:a9: 93:05:1b:a8:81:79:d9:ff:6c:48:2b:94:f2:fa:e6:12: 55:91:e0:dc:a9:a9:f1:40:10:8d:60:9d:be:4b:ba:e0: 17:76:53:e7:aa:68:be:36:fe:25:99:61:e8:69:80:6e: 5c:79:f3:f5:c1:f3:d7:87:cd:a9:09:35:02:4b:52:01: a2:e7:c1:eb:a1:ee:4b:c8:80:a8:30:b2:b6:9a:16:ef: de:b3:86:13:75:8a:f2:cd:14:b1:37:c9:65:2e:04:15: e8:b7:15:4e:cc:01:54:19:c9:b4:ee:eb:77:aa:3c:1e: 44:1a:c7:d6:d4:e3:5e:1b:87:1d:87:a6:ae:39:a0:1c: ba:5b:c1:6a:36:94:0d:36:60:c0:99:8d:18:21:7d:02: eb:d7:a6:91:7c:ee:3d:27:fc:9f:d3:b1:05:c4:c0:e4: 71:45:9e:f2:3c:d1:8a:5c:78:f7:dc:ac:cb:fd:89:c2 Fingerprint (SHA-256): 04:79:AB:57:0E:6D:F0:A0:34:B3:36:E4:B5:8D:EF:17:92:27:69:27:54:12:AD:41:FA:48:75:50:42:27:7F:20 Fingerprint (SHA1): 6F:A1:DD:D9:1D:82:DD:36:62:D1:38:F0:E9:4B:C0:26:CF:5B:66:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142806 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018142807 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018142808 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018142809 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018142810 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018142811 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018142812 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018142813 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018142814 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018142815 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018142816 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018142817 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018142818 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018142819 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018142820 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018142821 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018142822 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018142823 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018142824 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018142825 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018142826 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018142827 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018142828 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018142829 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018142830 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018142831 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018142832 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018142833 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018142834 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018142835 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142806 (0x3cafa056) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:29:58 2023 Not After : Wed Oct 18 14:29:58 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2d:0b:02:b0:eb:78:a4:2d:f8:7e:6e:60:db:b2:84: 42:13:3b:5d:e5:55:2f:24:52:a2:e2:48:81:1b:fa:1c: 4b:f2:10:f9:da:55:aa:c9:96:9f:92:b0:b3:b3:6d:9f: c7:2e:c9:b4:27:98:d5:a8:31:0b:03:06:6e:3b:b9:9f: a3:99:c2:07:ed:c3:fc:12:b0:90:35:d0:47:7b:f6:30: 67:5f:fe:3c:8f:be:19:e6:98:42:24:4a:8e:8d:21:30: 29:7d:49:c5:b4:bd:0b:ed:8b:1d:ae:c7:76:6b:1e:3b: 87:40:9f:af:35:8b:76:34:fb:50:e5:f9:fb:e7:ed:97: 27:a2:32:db:68:be:bb:0c:4e:37:42:ef:32:5c:8b:c9: 0c:95:37:78:fc:76:29:63:c8:41:9d:82:f4:18:8f:73: b0:b5:46:32:32:05:79:f0:8b:be:4c:4d:d9:55:bc:a8: 16:c6:00:b8:f6:50:06:67:fe:2e:58:02:5d:ef:3c:73: 17:00:d1:67:b8:6c:0b:3b:09:e4:9a:e7:88:12:df:9e: 95:48:4f:e4:c0:58:7e:f6:83:30:fb:8d:29:05:90:f8: 6a:3b:4f:8c:2f:60:d9:44:e1:91:65:87:c8:40:a6:1b: b7:e6:53:85:71:e4:27:d8:82:25:b7:d2:19:d6:7e:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1a:17:dd:e1:57:83:9a:79:e8:63:d5:ea:24:8c:f5: 20:35:81:62:05:61:b9:ed:1b:9e:2b:87:b7:e9:ab:40: d3:74:9b:eb:63:8a:dc:0a:7c:96:fa:f8:3e:90:25:0d: 27:14:bc:7c:7e:83:a7:27:1c:4c:d3:2a:19:94:93:7d: 7f:59:80:91:7f:5b:4b:a0:95:66:05:dd:84:85:24:eb: cf:71:18:5e:ab:b2:a6:b6:20:c3:29:6a:7d:74:65:d5: 20:59:82:39:84:16:50:b1:66:fc:2d:5d:62:31:cd:64: da:59:7b:37:ae:e2:33:5b:7d:12:51:6e:be:c1:a0:24: 53:ac:ee:36:c6:9e:f6:19:00:07:0d:3b:02:97:e0:e3: 8e:8a:65:bd:94:4c:44:d3:c4:41:8a:4e:72:6f:ea:34: 2c:73:cf:92:af:59:15:a5:24:29:57:b5:65:6c:e3:10: 37:36:96:a1:6c:f7:7d:e2:eb:e7:f5:c2:1c:b2:b2:5c: c8:c5:73:aa:81:86:6f:ee:54:1b:f8:f9:b9:9e:bc:9e: dc:e5:f2:e8:b7:ec:ab:c6:57:d9:b6:3d:1e:6c:8e:ca: 8f:8a:a8:e1:94:8c:2f:45:54:3e:f0:87:57:60:94:0a: a5:b7:1a:ac:33:12:c4:69:f4:d2:38:e6:e7:90:af:e0 Fingerprint (SHA-256): 2B:D1:55:42:9D:7C:F6:BF:B9:5B:21:0B:26:93:9A:3D:17:EC:D5:95:D2:F9:0C:F4:31:00:93:DA:77:3D:A6:71 Fingerprint (SHA1): 25:44:87:25:D3:19:35:50:65:8C:A9:FC:DE:F8:F0:89:C4:5C:81:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142836 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018142837 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018142838 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018142839 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018142840 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018142841 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018142842 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142836 (0x3cafa074) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:37 2023 Not After : Wed Oct 18 14:30:37 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:8a:af:3e:5d:91:77:ae:c4:f0:13:ba:d5:d7:b5:58: 79:f9:75:ce:78:14:1f:0e:f7:25:28:55:ad:c4:2f:61: 4c:5d:6d:e8:c1:47:0b:71:4f:4a:e4:33:2c:26:94:d3: f8:88:83:93:92:78:e2:3c:0b:a1:a9:ea:c4:02:e3:6d: a6:4a:fc:aa:ed:30:1b:cb:13:7f:fd:6b:0c:0d:34:ce: 38:45:18:85:14:a0:d2:4e:f5:91:d2:01:9d:ab:0c:ea: da:9b:c9:b8:00:1a:49:8d:74:20:7c:ec:71:41:c7:6f: e9:6a:49:73:f7:12:50:7d:ce:b3:1e:b2:27:82:ec:fc: 08:2a:ba:e2:88:77:07:ac:e4:98:bb:4e:7b:94:df:67: ab:a8:f5:83:7c:31:5d:a8:c6:60:2b:38:31:8d:b2:ad: 38:34:16:5a:51:54:bc:db:cc:91:b0:58:80:d2:3b:e9: 63:47:d0:fe:90:8c:88:49:a4:23:48:f3:ab:5c:f1:9c: ad:49:c2:5a:81:5b:2f:94:e4:aa:76:29:a0:1f:9b:b6: cc:7d:c2:e4:fe:60:7c:7d:a1:5a:50:ab:1c:5e:fe:24: 62:62:c9:9e:af:f1:58:12:11:af:84:b3:f4:63:2b:58: b4:ae:8a:7e:50:8f:8d:63:4d:31:86:84:a4:90:14:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:f9:66:a0:e8:e2:32:13:4e:97:7d:93:2d:a7:50:03: 01:42:e8:20:ea:f6:1f:9c:c9:e7:b4:69:b7:ed:41:2a: c1:4d:c6:85:b5:e7:84:5d:a4:01:b8:a2:6f:45:11:55: 05:57:6f:95:cf:7a:e0:94:fb:5e:35:41:55:8e:52:f1: da:68:33:b5:76:5d:32:8f:f4:b6:87:8a:c5:44:36:e7: 4f:ee:e9:f7:97:3a:bc:c0:e1:e5:ac:e7:4e:29:24:dc: 18:dd:46:59:4e:44:86:6c:18:a9:0c:d2:e1:c1:ec:a9: b4:92:93:0b:72:6a:0b:38:88:85:ed:ac:91:29:41:c1: 93:b6:0b:e1:0a:46:32:d9:70:9c:7b:a2:94:ed:e0:a0: ca:0a:2a:01:8f:3e:a6:4b:60:0c:e1:3e:e2:51:bd:bf: 96:ea:c8:82:ec:22:e9:c0:c4:5d:c0:c7:25:c5:8f:cc: dd:e7:86:27:ce:4d:8c:cd:9b:72:35:24:72:c7:f1:cc: 37:1b:96:fd:7c:1e:65:fa:c7:0d:88:cf:12:ee:f7:43: 99:38:df:65:74:0c:b9:10:12:56:4a:e5:e3:50:be:54: cb:8f:cd:ae:17:ab:ad:5b:fe:7a:8c:57:6f:6a:f5:d9: 51:aa:5c:a3:c6:3c:f9:5d:f7:b1:e2:23:1a:6e:d7:19 Fingerprint (SHA-256): A1:CD:29:37:41:68:5E:4C:62:E3:5B:7D:12:C2:15:1E:D2:BF:37:31:34:BB:1C:A7:D3:7B:F6:CF:1E:1B:32:24 Fingerprint (SHA1): 09:F2:3A:42:16:8F:AD:C6:83:FC:EF:5F:67:AD:B3:9F:F6:6F:FA:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142836 (0x3cafa074) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:37 2023 Not After : Wed Oct 18 14:30:37 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:8a:af:3e:5d:91:77:ae:c4:f0:13:ba:d5:d7:b5:58: 79:f9:75:ce:78:14:1f:0e:f7:25:28:55:ad:c4:2f:61: 4c:5d:6d:e8:c1:47:0b:71:4f:4a:e4:33:2c:26:94:d3: f8:88:83:93:92:78:e2:3c:0b:a1:a9:ea:c4:02:e3:6d: a6:4a:fc:aa:ed:30:1b:cb:13:7f:fd:6b:0c:0d:34:ce: 38:45:18:85:14:a0:d2:4e:f5:91:d2:01:9d:ab:0c:ea: da:9b:c9:b8:00:1a:49:8d:74:20:7c:ec:71:41:c7:6f: e9:6a:49:73:f7:12:50:7d:ce:b3:1e:b2:27:82:ec:fc: 08:2a:ba:e2:88:77:07:ac:e4:98:bb:4e:7b:94:df:67: ab:a8:f5:83:7c:31:5d:a8:c6:60:2b:38:31:8d:b2:ad: 38:34:16:5a:51:54:bc:db:cc:91:b0:58:80:d2:3b:e9: 63:47:d0:fe:90:8c:88:49:a4:23:48:f3:ab:5c:f1:9c: ad:49:c2:5a:81:5b:2f:94:e4:aa:76:29:a0:1f:9b:b6: cc:7d:c2:e4:fe:60:7c:7d:a1:5a:50:ab:1c:5e:fe:24: 62:62:c9:9e:af:f1:58:12:11:af:84:b3:f4:63:2b:58: b4:ae:8a:7e:50:8f:8d:63:4d:31:86:84:a4:90:14:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:f9:66:a0:e8:e2:32:13:4e:97:7d:93:2d:a7:50:03: 01:42:e8:20:ea:f6:1f:9c:c9:e7:b4:69:b7:ed:41:2a: c1:4d:c6:85:b5:e7:84:5d:a4:01:b8:a2:6f:45:11:55: 05:57:6f:95:cf:7a:e0:94:fb:5e:35:41:55:8e:52:f1: da:68:33:b5:76:5d:32:8f:f4:b6:87:8a:c5:44:36:e7: 4f:ee:e9:f7:97:3a:bc:c0:e1:e5:ac:e7:4e:29:24:dc: 18:dd:46:59:4e:44:86:6c:18:a9:0c:d2:e1:c1:ec:a9: b4:92:93:0b:72:6a:0b:38:88:85:ed:ac:91:29:41:c1: 93:b6:0b:e1:0a:46:32:d9:70:9c:7b:a2:94:ed:e0:a0: ca:0a:2a:01:8f:3e:a6:4b:60:0c:e1:3e:e2:51:bd:bf: 96:ea:c8:82:ec:22:e9:c0:c4:5d:c0:c7:25:c5:8f:cc: dd:e7:86:27:ce:4d:8c:cd:9b:72:35:24:72:c7:f1:cc: 37:1b:96:fd:7c:1e:65:fa:c7:0d:88:cf:12:ee:f7:43: 99:38:df:65:74:0c:b9:10:12:56:4a:e5:e3:50:be:54: cb:8f:cd:ae:17:ab:ad:5b:fe:7a:8c:57:6f:6a:f5:d9: 51:aa:5c:a3:c6:3c:f9:5d:f7:b1:e2:23:1a:6e:d7:19 Fingerprint (SHA-256): A1:CD:29:37:41:68:5E:4C:62:E3:5B:7D:12:C2:15:1E:D2:BF:37:31:34:BB:1C:A7:D3:7B:F6:CF:1E:1B:32:24 Fingerprint (SHA1): 09:F2:3A:42:16:8F:AD:C6:83:FC:EF:5F:67:AD:B3:9F:F6:6F:FA:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142843 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142844 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142845 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142846 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142843 (0x3cafa07b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:48 2023 Not After : Wed Oct 18 14:30:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:b1:7e:c2:85:b5:4e:f2:5b:b3:ec:55:c6:98:15:fd: 1a:fd:f7:e4:58:3b:02:6d:29:99:50:fd:da:9f:6f:46: 11:ec:35:58:a7:e9:e5:02:21:7e:d2:0d:45:90:c8:38: 28:9c:dd:a3:ce:f9:30:03:20:de:84:da:55:8d:2c:6f: 8f:ad:68:31:73:cd:a1:ed:81:f1:3e:c5:90:52:0e:41: 18:f8:86:cc:5d:74:21:85:27:e9:d5:36:1f:f2:ea:9e: 11:9f:83:12:a2:f6:aa:83:75:97:d4:ff:45:96:c7:f5: 19:55:d4:a3:c8:aa:cb:02:e6:52:93:36:02:5e:c8:e5: 40:3e:9c:3d:c8:c4:ab:48:3b:32:e2:97:11:d3:1e:b8: 04:89:84:35:32:c9:19:cc:45:9b:f7:34:27:dc:14:c3: 16:d2:46:58:2b:60:ad:92:5a:9f:46:c6:8c:ca:26:ff: f9:c1:70:f8:a1:8d:c0:b7:a0:ec:6e:03:5b:86:73:64: 88:65:12:30:15:0a:8d:52:e5:b0:cb:81:87:0b:3d:68: 3c:76:46:eb:01:4e:82:37:7f:d6:2e:c0:25:94:ec:df: 98:37:31:40:6c:ab:e8:01:27:02:66:c1:9b:2a:0c:ac: eb:ee:61:00:68:0b:d7:69:31:14:64:5b:d4:c2:7a:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:78:11:61:9c:ba:0a:5a:4f:51:ff:02:9b:92:24:05: bf:7f:ac:8d:dc:99:44:75:a7:9d:b7:b1:aa:2a:40:70: 69:01:27:9d:25:47:5b:ce:dc:f1:76:9f:d9:fd:c9:45: 16:80:cc:de:f1:2e:5b:24:2d:68:9c:3a:b2:e0:72:67: 19:32:41:48:22:18:ec:3d:b8:9f:1c:29:1d:02:7a:8c: ac:0e:59:86:db:8f:28:4d:77:03:bc:59:ad:6c:d8:f2: ac:52:52:bf:f2:be:95:a5:f6:69:11:78:bc:a4:df:39: 78:f5:52:0e:f8:05:0e:53:7a:9e:ae:a0:9f:aa:2c:34: fd:a2:80:1d:f7:02:e3:f6:10:65:06:90:6e:dd:d8:70: 7c:08:73:18:aa:d4:c0:b2:83:f1:89:7e:28:80:51:be: fe:7b:35:19:08:09:b2:14:c0:af:cd:ef:94:bd:45:f2: 49:f5:08:6d:5c:4a:45:64:7c:a7:82:8e:50:34:9b:6b: 76:dd:7e:29:3b:01:68:97:75:7d:0a:41:5a:79:0f:47: 31:fa:bd:7a:53:2b:12:56:27:40:35:f7:d2:a4:41:64: 89:85:3f:59:cd:b3:c2:27:8d:20:41:a0:05:92:03:25: 98:73:19:f3:eb:06:7b:8f:27:73:8e:c2:de:31:52:6b Fingerprint (SHA-256): D0:1E:9F:64:F4:A6:E6:E2:8D:AF:12:8A:F4:AD:8A:DF:0D:FE:FB:87:DF:06:F3:58:EF:56:F5:CE:1A:F6:58:E7 Fingerprint (SHA1): 7F:95:C9:94:36:DA:24:51:E0:D2:9D:6E:13:39:21:30:82:A3:88:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142844 (0x3cafa07c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:49 2023 Not After : Wed Oct 18 14:30:49 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:dd:31:f7:cc:ba:16:6a:52:43:b8:84:e0:50:ad:e3: d3:1d:38:9b:dd:81:e2:5f:4d:f6:17:e1:6e:df:cd:c7: 5c:fe:7d:57:ea:ac:ab:53:1d:ce:ee:d0:03:09:73:42: e0:43:58:a4:ae:40:0f:af:39:58:88:48:18:f0:d3:9d: 4d:30:6d:7d:c5:5a:91:01:47:8a:42:bb:d5:2e:a2:b5: 51:50:00:1e:f4:b6:e0:de:ce:e5:1d:61:26:bc:ad:54: eb:a4:54:9c:a2:80:3b:75:e5:10:69:ca:ae:80:51:f9: ba:a3:46:92:8a:da:8f:7c:61:00:62:0f:05:3a:e9:84: 4a:1a:25:bb:b5:24:b9:ac:32:0c:2c:93:be:2a:fe:98: 77:83:b5:ee:21:80:7d:43:e3:ec:ae:d5:48:69:1a:7b: d6:1a:30:95:fa:5e:a7:3e:1c:89:b8:fa:38:41:70:6e: d9:b3:6e:c8:d5:6a:d1:bd:90:35:b1:4a:0d:97:99:0b: 51:87:27:1c:27:dc:31:2e:b6:73:1d:1f:20:d8:9b:04: 81:67:d4:5e:76:dc:64:3b:de:61:81:9b:94:24:da:64: 12:5b:83:02:9c:ac:c4:d6:1b:22:ac:15:e6:d0:b0:24: 6a:5c:4c:1a:ed:c4:e6:c5:82:11:39:da:7b:d3:e0:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:97:30:d8:bb:86:0f:ca:ff:4e:c7:f5:88:03:9a:29: 28:8b:2c:99:ad:ef:44:83:c4:06:8a:ed:ee:01:be:52: bd:9b:f7:38:4e:48:a3:79:ad:69:cf:35:67:2e:31:af: 46:28:f3:a7:6e:cf:e5:61:38:ea:e0:a4:17:7c:4f:76: 6f:53:3e:2a:71:db:96:4b:ec:17:9f:55:da:7a:34:4f: d7:28:11:36:68:0e:a5:52:9c:f7:9d:3f:fe:8f:30:62: ff:fd:83:9f:80:88:ff:88:95:9d:71:7e:d4:56:34:0c: 32:ec:65:d9:ef:e3:f4:46:ed:2a:c7:67:95:79:08:6d: 10:91:76:bc:6f:b9:f7:c1:dd:aa:ef:49:21:9c:d6:55: ec:76:28:24:f7:b2:7d:ef:d2:49:06:26:35:11:18:22: ed:49:17:8d:6d:c7:96:c6:83:34:2a:ae:88:02:89:06: ec:aa:42:43:a3:70:58:c8:30:53:aa:b5:ec:cf:55:63: 55:76:0c:d3:45:18:a5:60:89:d6:91:35:9c:d5:bf:6d: fb:24:7e:35:6c:d7:36:45:ce:1b:54:71:7f:51:1c:24: 64:65:ae:b4:41:45:49:f0:c6:20:c0:26:6b:d5:82:74: 8c:56:e4:78:be:54:3f:fb:4e:f2:58:41:ac:13:fe:35 Fingerprint (SHA-256): 3B:20:56:77:0F:38:26:59:56:9B:5B:3E:E2:04:FE:6C:BF:70:F8:44:BD:0A:9E:7A:2B:0B:D3:44:EB:11:56:E4 Fingerprint (SHA1): 65:CE:F9:ED:B0:F4:19:8A:9B:49:93:AE:BF:29:CB:52:49:FC:93:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142845 (0x3cafa07d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:30:50 2023 Not After : Wed Oct 18 14:30:50 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:81:0d:18:d1:37:56:2f:04:e1:44:aa:97:18:77:4d: e9:f8:f2:60:65:45:45:92:2f:76:a7:cf:bd:1d:14:93: ef:45:64:3b:6c:8a:24:45:00:74:48:66:6a:83:b2:34: 7a:4d:f8:16:69:3a:00:65:9e:9c:9e:80:07:26:52:53: 36:ba:a2:d3:4c:ef:3d:1a:7c:76:71:a9:62:97:39:23: 7e:54:9b:3d:59:f1:2a:3b:da:6c:5c:80:2f:17:27:e3: 8e:f6:b7:8d:de:40:81:0c:d0:a7:05:f7:92:65:51:bd: 6b:50:78:fb:0d:26:b8:e6:7e:ff:75:aa:91:93:9b:c4: fc:4f:f2:d5:62:eb:d6:3e:aa:32:3b:e6:a3:99:98:e0: 2e:3f:2b:8a:1c:b8:00:7a:c6:8d:72:3f:b7:36:21:5a: 21:55:e8:29:f3:e1:c2:22:6c:00:8f:f2:e4:c7:03:37: 6b:3d:f7:d2:d4:84:60:37:b0:e0:6a:69:61:05:fc:57: 7a:77:e8:b1:c2:c4:95:2d:06:4f:76:1a:b1:d7:bf:7d: bf:ad:a1:13:0d:3b:d9:71:53:24:26:ae:6a:b8:a9:ee: df:4a:08:74:2e:a3:97:78:38:6e:75:bf:cc:b3:34:a1: cc:64:9b:ac:48:81:67:98:76:6f:7f:6a:92:d8:81:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c3:e0:b8:26:dd:1a:ef:e9:91:c4:f1:eb:91:9c:b0:4e: 88:80:fe:cd:7b:2d:57:0b:86:d9:f9:58:9d:6d:a7:ce: 34:c4:33:e2:42:9b:51:6b:de:de:0f:fb:41:e7:ae:86: 6a:fa:59:52:c0:2c:51:39:4f:cc:33:de:8a:10:3c:32: d6:3f:37:42:6e:f4:61:61:de:1c:e6:4d:9f:d7:87:66: 66:69:7e:ed:99:5b:09:e5:aa:06:50:d1:12:8b:25:df: bd:f2:b0:7e:c9:2d:41:c6:a3:5b:e1:d1:f0:ce:42:27: ca:20:28:c4:5b:a5:d4:de:96:7f:5a:9a:3e:71:75:4a: 60:e3:14:11:af:77:d2:e9:83:9d:d4:ba:1a:dc:a3:ea: 3e:06:ff:d8:05:72:5b:c7:d3:b8:5f:9d:22:2f:7c:fb: 93:f8:bb:e4:86:94:8e:71:82:62:2f:06:2c:22:47:0e: fd:68:02:db:06:c6:fb:17:9e:e5:72:e6:c9:15:d7:02: 28:57:30:8d:10:23:f0:2a:4f:a0:63:1a:0f:f3:b1:b4: ad:ae:68:8f:ef:c9:b7:ca:b8:b2:5f:98:bc:b2:8a:2d: e3:8e:2e:f4:8e:1b:3f:1d:43:26:bd:6a:fe:51:de:d0: 96:0f:15:6c:36:6e:3c:7c:60:c3:35:c6:72:1c:e4:42 Fingerprint (SHA-256): EE:D0:B7:DC:84:72:2F:92:CD:9A:35:99:10:51:10:A0:2D:7D:73:FB:7C:70:81:44:F0:F2:5E:64:44:D6:B3:53 Fingerprint (SHA1): 3D:B3:91:24:2D:15:3E:31:3A:9B:A3:59:A0:74:3D:C5:39:DC:E7:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142847 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142848 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142849 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018142850 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018142851 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142847 (0x3cafa07f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:53 2023 Not After : Wed Oct 18 14:30:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:21:22:a1:47:54:d6:b3:de:c9:fa:93:08:d9:cd:04: 9f:ad:1e:27:4a:aa:07:87:55:26:68:07:35:d2:8f:96: 87:e5:f8:70:46:8e:2d:86:e6:a9:ea:0d:a4:84:76:c2: 34:e1:6c:07:a8:f7:b0:16:7b:68:9a:86:09:e6:e6:d8: cd:4d:59:01:ea:66:74:3d:be:38:e7:cf:f3:cb:57:ce: 17:4a:81:58:d4:16:17:2b:51:a9:6b:55:a4:76:a7:66: 1c:a2:0e:b8:6d:47:ec:9a:c1:7a:d4:cc:02:55:5d:57: 25:78:99:72:d1:cc:6b:e8:2f:bf:7e:63:79:62:bf:92: 3e:c2:5d:d0:33:d3:a9:ff:5b:e1:55:63:09:ce:02:96: c8:71:1f:84:4f:a1:54:ae:ae:88:d7:bf:dc:27:11:17: ae:10:c2:be:3b:31:25:8b:62:97:0f:67:83:b6:54:8b: ba:a0:35:08:11:fe:0d:01:80:22:0f:26:99:58:e2:5d: 73:94:77:7e:5b:a1:99:6f:7d:17:a1:87:d8:b0:d4:7b: ee:05:48:75:d7:b7:43:a0:94:5d:61:30:0a:59:0e:8f: 2f:01:46:1d:12:46:94:b8:2f:ca:f7:75:d4:93:5a:6d: 0d:07:f9:54:0e:75:a3:ec:17:60:c8:45:a2:7d:50:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:49:e0:fc:2d:01:c8:43:3f:43:7b:dd:e1:f9:d1:7d: 56:7b:80:c2:8b:96:f6:c5:43:bf:31:b1:65:a2:7b:80: 88:f8:2c:f5:29:c3:c0:28:e1:42:95:4f:b7:09:22:fc: 4c:30:ef:98:51:75:6b:42:6b:22:45:eb:03:7e:8c:96: 93:2d:55:c4:36:0a:8a:6b:51:de:8d:ad:de:b6:cc:ee: 36:2d:cd:24:ab:5c:97:29:fb:1c:a6:cf:1b:0e:a5:d3: 3b:ba:88:4a:90:fe:4d:fe:b9:46:32:dd:c0:68:d5:35: 02:84:b0:5e:b1:7a:6f:7d:8c:11:2a:bf:8f:a7:5d:32: 96:51:70:a2:07:99:d4:11:87:0b:b3:b0:ef:b6:28:cc: 03:03:45:43:58:a8:1e:80:9c:3a:e2:e4:f6:21:3b:41: b1:c0:70:78:14:45:3f:34:d5:47:8d:bc:09:56:b2:a6: 0b:b6:20:d0:f0:cb:7a:16:bd:a8:d3:f1:eb:52:8f:ff: d4:f5:57:1a:fb:44:1a:1e:df:af:45:a6:7e:67:8b:2f: 62:21:b5:97:71:fb:ed:6b:87:60:e6:76:87:2b:00:c0: c3:47:9f:38:64:b9:c4:be:07:25:63:d4:f0:66:0a:19: 34:16:07:5e:f7:30:7c:d2:6e:9b:16:a2:5b:80:28:46 Fingerprint (SHA-256): E2:80:D5:A9:BA:7A:18:BC:89:4D:0E:F7:AA:9F:71:E2:D9:AB:E0:0E:84:7A:D8:2A:B8:89:E5:C0:AA:D5:62:23 Fingerprint (SHA1): 16:9C:C8:99:D5:EF:FC:50:F7:6B:2C:38:66:F7:5C:18:33:62:BE:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142848 (0x3cafa080) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:30:54 2023 Not After : Wed Oct 18 14:30:54 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:bd:db:f4:61:cd:d2:f4:2b:3c:c8:13:5a:a0:8d:d1: e1:42:d8:1a:5c:88:3f:56:d9:04:25:95:82:b8:a7:6f: ee:b2:66:ad:10:67:18:f7:fa:a0:8f:18:01:91:a4:4c: 42:ef:89:29:19:c0:b4:71:61:92:d1:94:9a:e4:c4:50: fa:40:aa:62:cb:fc:4b:a5:20:69:9f:f0:f0:0b:f0:10: 53:0f:ce:c6:29:86:aa:28:06:5e:d9:37:66:57:02:f0: a1:13:af:1b:83:79:8e:41:4e:f2:9b:c6:ff:30:5a:97: c4:46:25:85:82:3a:2b:4c:92:ff:d1:d3:8e:d6:84:af: 9d:4e:af:d4:7b:d5:48:6b:21:ab:e5:93:a8:e6:bf:82: 8f:aa:b9:f9:07:90:b7:ed:86:57:23:9a:ef:83:53:08: 93:da:35:41:3c:b6:4f:0c:ce:bb:ca:c2:d4:9f:a9:e5: ae:da:96:95:a6:9c:e1:c9:b1:aa:ee:7b:62:06:d2:37: ad:98:a6:94:62:96:88:3c:7d:3a:93:37:5a:f3:ee:4d: 88:c6:7b:37:ce:94:cd:8d:64:10:4c:ca:8c:f8:45:84: 5a:03:6b:27:50:e2:99:cb:e3:f5:2e:cb:ee:3a:5d:2a: cd:9f:a6:69:d1:2f:dd:e7:46:f7:2e:d9:75:6d:7d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:5f:26:7f:22:94:6d:73:cf:e0:7e:fe:45:ed:cc:18: 20:86:99:d6:74:12:87:60:b8:c3:89:d2:fd:e7:30:3d: 3f:35:89:7b:92:5f:25:32:a0:39:dd:1c:09:73:92:a0: 37:fe:b4:e7:b2:25:64:38:6f:6b:54:7d:32:eb:0a:ee: 9a:3e:9c:0b:fd:bb:bf:8c:9b:0b:75:d6:b8:a3:51:16: d3:52:8b:25:14:41:e8:ad:01:4b:ed:f6:20:56:b0:c4: 21:f6:07:0f:00:e4:f7:99:37:fc:cd:17:f9:98:04:f8: 81:53:35:2b:13:70:94:39:4c:37:83:18:16:ca:38:4a: 59:d1:d4:5a:40:e8:af:cf:14:b3:78:9c:28:2d:ed:f7: 6f:8c:3d:15:c3:bb:7a:ed:d1:73:25:4f:32:53:88:a3: 2f:d0:da:d4:cb:cf:69:d7:20:81:f8:fb:73:1b:a5:0c: 9e:8c:4e:87:67:ec:70:d8:76:a7:72:1b:5d:41:14:aa: cb:f0:80:aa:c1:cd:88:1c:62:d9:b7:66:62:5d:68:0c: 32:26:a2:e6:8e:db:b1:4e:e3:63:09:ee:b7:e7:27:f1: 51:66:96:88:3d:8b:38:a2:f5:a1:01:f6:9f:75:f6:2b: 75:23:b1:df:82:12:e5:1d:89:77:49:86:b6:54:0e:97 Fingerprint (SHA-256): 56:75:E1:A6:51:9B:78:39:11:64:B8:64:18:CE:9C:52:67:EF:CB:CB:76:E2:04:83:50:66:ED:22:64:15:DE:51 Fingerprint (SHA1): 1C:74:04:57:FB:32:7E:C7:25:CB:28:39:96:0E:B4:4D:79:86:77:98 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142849 (0x3cafa081) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:30:55 2023 Not After : Wed Oct 18 14:30:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:1e:ac:da:d4:91:f4:07:9b:af:2f:a9:7b:34:70:9d: 0a:8f:5b:a5:a2:ae:ab:f3:87:c6:ca:87:53:a5:5b:ec: ff:24:13:d8:b9:33:1b:fd:68:bd:b8:f7:3b:1f:8a:ca: af:4a:41:67:5d:0d:3b:9f:1a:ce:00:53:91:e9:47:c9: ca:a9:56:00:90:bb:93:d6:53:91:bb:e8:38:c8:b6:e9: 6e:f1:f8:5d:2f:42:69:8b:9f:3c:0b:22:8d:da:83:95: 94:cc:a9:c5:f1:0e:79:c8:56:c4:35:a3:00:40:6e:e0: 4e:bd:b2:83:76:75:fc:e6:c9:e1:89:46:84:1a:27:a4: 77:c2:68:5d:67:2d:28:fa:18:af:57:f8:77:1f:41:e8: 9d:3f:84:18:a6:59:21:1e:83:0c:df:87:66:6e:56:5e: e3:3f:b9:28:2d:84:96:ac:1a:ca:1b:59:97:a5:71:f3: ce:dc:3a:92:83:1b:7f:ee:9b:65:70:71:ab:c9:b0:f3: 60:f4:a4:1b:a5:c6:25:09:1b:75:08:e4:0b:8c:89:bb: 3b:9c:7c:76:43:42:26:fa:c6:ee:05:28:02:4a:a5:4b: 89:3f:c5:d0:4c:3b:51:3d:34:89:41:0d:9e:00:e1:c7: 77:c0:e9:58:a2:e6:0f:9a:1f:79:f1:64:64:82:7c:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:5f:17:c5:51:17:68:a7:83:3a:c2:b7:65:c2:7d:7d: bf:30:e7:d0:d2:c7:03:d1:2f:ec:c3:88:4e:1a:b9:3c: 26:a8:dd:6d:dc:df:3f:b7:0c:fa:e0:9f:9b:24:db:be: ae:55:59:47:e2:bb:79:a0:55:a9:e6:85:8c:8b:f0:9d: fa:06:54:45:4c:53:40:c4:9b:60:71:51:0b:ab:e5:fb: 49:ed:81:e3:84:2d:2c:33:db:3a:3d:71:7e:39:f3:6c: 7d:e9:cc:8e:2c:03:c3:3a:b2:e9:72:a7:22:5d:53:03: 79:c1:91:ab:6f:e4:a0:de:1a:0c:77:cb:8d:b1:0d:87: 47:d5:07:a1:2a:fc:ac:5a:cf:a1:8a:76:b7:f6:a0:75: ee:c3:f6:f1:70:d4:97:2c:60:75:4d:f5:f2:b5:f3:09: c0:5c:ec:0b:3b:3a:ab:b2:be:ee:2e:4b:b7:c7:84:56: d9:30:b8:be:60:38:eb:64:ac:b3:c9:b4:d7:a2:1c:33: b0:da:f8:b1:0c:b1:b6:43:bb:40:16:62:88:b8:59:7b: c6:50:70:d6:f0:0d:41:5f:79:af:42:e1:57:da:ff:d9: 16:00:37:be:03:c3:97:27:e4:74:0e:63:40:5a:c8:b6: 45:cc:8c:63:73:d4:21:c0:21:d4:11:0c:00:ea:81:4b Fingerprint (SHA-256): 8B:4E:CD:09:BB:9B:1B:A1:A3:94:F3:37:C8:7B:8D:C9:E7:EF:44:63:B4:FE:66:FA:0F:E2:67:21:E5:D4:EF:D1 Fingerprint (SHA1): D2:4D:9E:DE:B4:15:46:C7:40:C6:07:D2:93:FC:C9:39:9A:FB:A1:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142852 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142853 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142854 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018142745.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142855 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142852 (0x3cafa084) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:01 2023 Not After : Wed Oct 18 14:31:01 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:75:eb:52:3a:c9:1d:93:67:eb:a9:8e:93:0b:74:1c: 7a:0d:66:0a:db:86:95:46:1f:a7:21:05:e6:05:19:8e: 63:6a:04:af:3a:c0:5b:c1:3f:7f:ec:fd:fc:46:5c:a2: 07:93:65:ca:66:50:e7:0a:d5:a9:84:41:85:35:83:2c: 75:8b:83:98:7b:22:3e:53:56:b2:56:30:28:4a:4f:db: f0:54:29:86:91:7a:63:38:71:01:5a:50:22:0b:d4:9a: bd:79:71:39:94:f0:e8:4d:02:4c:54:5c:10:8a:27:d7: 99:3f:6e:1b:3e:9f:f9:97:02:a9:98:b7:93:3b:65:0a: 03:f9:d2:a4:75:55:0e:a7:11:9a:e1:6a:74:69:7f:bf: 76:97:f4:f9:53:59:03:86:54:61:b3:b0:0d:31:66:f4: dd:b5:54:80:5c:49:62:61:09:b8:0f:b3:81:75:58:e0: 9f:55:2d:4c:aa:21:09:87:08:e0:27:7f:49:a7:4e:0e: f2:c8:8a:46:f0:e8:78:4c:40:58:aa:20:85:73:8f:3a: 44:bf:70:66:c6:f2:e4:56:90:44:25:1b:48:2e:4e:92: 7d:19:5b:c7:ec:8b:2f:48:e9:71:7b:83:4c:e2:2c:f9: 6b:dc:64:0c:4e:1a:09:1e:f8:52:18:35:47:a0:39:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:8a:e1:79:d1:58:e8:27:64:e7:e5:a7:02:d1:9e:82: 21:27:57:cd:d5:4c:c5:86:02:ca:4a:97:2f:f4:d8:98: 10:a6:a7:6d:45:e1:36:91:c2:f5:80:c0:52:6d:a3:d1: 18:dc:98:e7:76:fc:9f:5b:d4:f9:73:91:69:51:3d:b4: e9:0e:3b:94:02:36:b5:1c:e9:11:29:1f:54:9a:b6:81: 84:02:b3:f9:7d:85:d7:ad:b2:da:9a:4f:5d:b7:ba:39: 09:c6:22:9f:25:c1:50:ae:1c:f1:c3:d5:9d:91:42:06: 3b:39:61:05:1a:83:1c:99:b7:b3:fa:40:41:41:c0:02: 22:82:a2:fb:bb:aa:56:8a:46:ad:39:82:8e:42:98:ec: 88:97:6b:fd:0f:c6:08:80:d1:89:3b:5f:a8:71:19:54: 64:f4:27:d3:4e:d4:3d:e4:99:c0:ad:3a:c8:68:d9:28: 6b:43:88:6d:d9:44:ad:58:d8:71:2d:61:30:6c:28:19: ec:67:eb:a0:c0:1c:8a:dc:79:31:d3:94:d7:cb:97:16: fe:72:b4:42:4f:9c:6d:78:3b:d7:42:57:5a:d9:57:a0: 21:7b:15:d2:cd:25:f7:db:44:05:2c:7b:14:a8:ee:b2: 97:9b:08:91:a3:14:ab:53:d1:ac:2f:9b:11:57:72:90 Fingerprint (SHA-256): 3D:EC:A4:AF:8F:5B:4A:DF:E9:CE:15:FB:EC:CD:A0:2B:8A:8A:A0:D0:FF:1F:41:49:3A:52:AB:6D:03:40:78:F3 Fingerprint (SHA1): 5E:E1:3D:00:31:03:A1:62:A4:8D:42:D0:4C:50:93:BA:C3:EC:B9:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142856 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142857 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018142858 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018142859 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018142860 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018142746.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142861 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142857 (0x3cafa089) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:07 2023 Not After : Wed Oct 18 14:31:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:1f:6d:69:61:95:1f:8d:19:04:73:20:75:20:99:6e: a6:28:6b:29:b7:1b:6e:ce:1e:fc:81:16:76:ee:ab:ef: 7e:98:e4:22:f9:f3:79:8c:18:91:3b:c1:74:f7:60:e4: 11:5a:38:ee:96:c2:c0:30:d1:97:b6:8e:7f:2e:56:88: 91:d7:f1:d4:4e:6c:7e:94:7c:96:ed:c0:22:af:09:3a: a1:05:c0:03:b1:02:01:66:7d:a7:fe:a0:bc:b7:4c:12: d4:84:da:38:9c:bc:2a:38:cf:6a:28:18:6b:1e:f9:19: ca:27:74:f9:72:6d:9b:64:b1:01:29:a8:2b:52:69:3d: e3:f0:00:80:76:e9:c9:48:05:84:4d:a6:c5:f7:47:71: f2:e2:45:c1:09:cd:6e:4e:14:b0:8f:a1:49:1d:f3:bb: df:dc:8e:c3:f4:bc:fa:5e:28:b0:f4:45:a1:97:05:73: 94:71:a6:f0:11:0b:66:88:10:41:be:3f:e9:e7:63:74: d1:8d:1c:81:e7:1e:98:3e:e5:6c:d1:1a:16:1f:5e:3d: ac:b0:bf:c3:17:c2:5a:44:aa:26:06:f5:d1:e1:b7:26: 95:75:5f:cd:76:64:fd:b2:c6:89:ee:c8:b4:a3:b7:ba: 0d:d1:03:6a:df:e1:e4:0b:57:30:17:b7:c3:25:d3:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:ee:6b:3d:fa:dd:55:79:ab:f9:e0:90:47:b1:c6:be: f8:12:2a:e8:ff:05:79:38:16:69:de:f7:d9:14:a1:e4: cc:f8:53:5e:96:d4:70:6e:3e:12:75:45:c8:10:9b:62: 3e:a4:52:05:94:c1:17:e2:ae:a3:c8:72:43:4b:b1:fa: c8:c9:91:5d:1d:5d:d6:b2:72:ff:db:1a:02:3f:43:00: 49:c0:43:d0:94:47:32:1f:78:6a:79:b4:49:24:77:7d: c2:63:83:42:06:68:2f:9d:9b:2e:6e:18:60:83:12:6c: a5:8b:f4:a6:94:17:08:1e:2a:1a:6d:ad:46:b7:5a:00: 30:12:70:f2:12:0e:6b:6a:5f:35:8b:d0:da:a2:76:d3: fb:a5:5e:c9:7d:69:b7:2a:4a:c6:fe:5a:f2:6f:a9:2c: 11:93:c6:95:5d:c8:4f:65:5e:8b:2e:20:68:f2:2b:82: 40:e6:96:3f:e3:97:26:cc:ae:3a:55:67:8d:b5:04:7d: 41:22:44:a8:7c:9a:f1:2f:57:f7:13:cd:66:46:ac:9b: fe:7e:9d:7f:8c:5c:4f:4b:fe:07:13:88:98:11:fe:8e: bf:cd:fa:26:ea:31:58:eb:9c:e1:13:2f:c5:a8:d3:5d: fb:60:31:ab:c1:9f:7c:bd:b1:8f:2c:b3:8e:c3:e2:0c Fingerprint (SHA-256): 9F:A8:66:12:22:5B:9E:FD:43:10:3C:9D:D1:FD:0C:68:FB:A9:EF:AB:7C:57:42:15:4D:A4:E0:92:E0:D6:A2:36 Fingerprint (SHA1): 1D:05:B4:4E:A8:42:B5:AE:DA:8B:BF:E4:AE:7C:B1:53:69:A3:DE:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142857 (0x3cafa089) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:07 2023 Not After : Wed Oct 18 14:31:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:1f:6d:69:61:95:1f:8d:19:04:73:20:75:20:99:6e: a6:28:6b:29:b7:1b:6e:ce:1e:fc:81:16:76:ee:ab:ef: 7e:98:e4:22:f9:f3:79:8c:18:91:3b:c1:74:f7:60:e4: 11:5a:38:ee:96:c2:c0:30:d1:97:b6:8e:7f:2e:56:88: 91:d7:f1:d4:4e:6c:7e:94:7c:96:ed:c0:22:af:09:3a: a1:05:c0:03:b1:02:01:66:7d:a7:fe:a0:bc:b7:4c:12: d4:84:da:38:9c:bc:2a:38:cf:6a:28:18:6b:1e:f9:19: ca:27:74:f9:72:6d:9b:64:b1:01:29:a8:2b:52:69:3d: e3:f0:00:80:76:e9:c9:48:05:84:4d:a6:c5:f7:47:71: f2:e2:45:c1:09:cd:6e:4e:14:b0:8f:a1:49:1d:f3:bb: df:dc:8e:c3:f4:bc:fa:5e:28:b0:f4:45:a1:97:05:73: 94:71:a6:f0:11:0b:66:88:10:41:be:3f:e9:e7:63:74: d1:8d:1c:81:e7:1e:98:3e:e5:6c:d1:1a:16:1f:5e:3d: ac:b0:bf:c3:17:c2:5a:44:aa:26:06:f5:d1:e1:b7:26: 95:75:5f:cd:76:64:fd:b2:c6:89:ee:c8:b4:a3:b7:ba: 0d:d1:03:6a:df:e1:e4:0b:57:30:17:b7:c3:25:d3:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:ee:6b:3d:fa:dd:55:79:ab:f9:e0:90:47:b1:c6:be: f8:12:2a:e8:ff:05:79:38:16:69:de:f7:d9:14:a1:e4: cc:f8:53:5e:96:d4:70:6e:3e:12:75:45:c8:10:9b:62: 3e:a4:52:05:94:c1:17:e2:ae:a3:c8:72:43:4b:b1:fa: c8:c9:91:5d:1d:5d:d6:b2:72:ff:db:1a:02:3f:43:00: 49:c0:43:d0:94:47:32:1f:78:6a:79:b4:49:24:77:7d: c2:63:83:42:06:68:2f:9d:9b:2e:6e:18:60:83:12:6c: a5:8b:f4:a6:94:17:08:1e:2a:1a:6d:ad:46:b7:5a:00: 30:12:70:f2:12:0e:6b:6a:5f:35:8b:d0:da:a2:76:d3: fb:a5:5e:c9:7d:69:b7:2a:4a:c6:fe:5a:f2:6f:a9:2c: 11:93:c6:95:5d:c8:4f:65:5e:8b:2e:20:68:f2:2b:82: 40:e6:96:3f:e3:97:26:cc:ae:3a:55:67:8d:b5:04:7d: 41:22:44:a8:7c:9a:f1:2f:57:f7:13:cd:66:46:ac:9b: fe:7e:9d:7f:8c:5c:4f:4b:fe:07:13:88:98:11:fe:8e: bf:cd:fa:26:ea:31:58:eb:9c:e1:13:2f:c5:a8:d3:5d: fb:60:31:ab:c1:9f:7c:bd:b1:8f:2c:b3:8e:c3:e2:0c Fingerprint (SHA-256): 9F:A8:66:12:22:5B:9E:FD:43:10:3C:9D:D1:FD:0C:68:FB:A9:EF:AB:7C:57:42:15:4D:A4:E0:92:E0:D6:A2:36 Fingerprint (SHA1): 1D:05:B4:4E:A8:42:B5:AE:DA:8B:BF:E4:AE:7C:B1:53:69:A3:DE:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142862 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142863 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018142864 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018142865 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018142866 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018142747.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142867 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018142868 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018142748.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018142869 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142863 (0x3cafa08f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:14 2023 Not After : Wed Oct 18 14:31:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:0c:6f:16:be:1e:95:26:61:fb:6b:92:57:79:a4: 37:cb:42:13:92:77:a9:08:ea:49:7c:f1:84:43:fc:49: 57:5a:4f:34:a4:e3:d2:4e:a2:55:d9:8b:c9:68:a1:dc: 76:5f:46:ac:60:b6:1c:5e:7d:a5:b0:fc:d2:c0:53:bc: 28:b3:ab:04:ed:b7:9a:bb:75:47:1b:a3:53:f0:b1:20: 54:8c:c9:be:c5:ac:6d:94:1f:cc:22:1e:82:e5:16:9c: 9d:5e:89:fc:5f:46:2b:9b:5f:b4:22:66:fc:09:56:c2: a4:3e:ed:7a:da:06:b0:8e:e6:9f:93:95:3e:7f:55:5a: 44:a5:17:78:5a:2b:f3:e8:b8:be:66:e3:0f:b2:51:f8: 2a:1c:e4:cd:54:4c:b1:b6:63:2c:86:d2:de:e7:cb:5d: 0e:93:0b:6b:5f:43:4d:74:c0:57:5f:f8:72:87:b6:a6: c7:9b:9e:19:9c:b7:eb:b2:79:59:ba:8f:3a:9e:00:54: ec:65:24:a1:35:f3:e9:f1:8f:c9:52:a5:50:1c:3f:54: e9:98:bb:55:de:6d:ec:20:90:27:6c:23:d2:ab:98:ec: f2:0c:10:fc:c9:f4:83:b3:06:f6:70:c9:e9:7b:71:e6: e5:f2:ad:89:66:6d:a7:24:1d:c4:94:d1:98:27:ff:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:0b:c0:2e:f8:8a:94:6b:50:b3:ce:be:27:56:93:a6: 5c:4e:6c:af:99:1a:cd:f3:ca:37:02:ea:e5:fc:45:5d: 6b:0f:47:ce:5b:9c:5f:8a:ce:a8:57:c3:9d:67:54:f1: 45:89:fb:0e:b1:bb:95:30:e9:b8:de:4b:13:5d:97:de: 27:1f:2e:89:f9:b0:6e:17:0f:a3:3b:f3:d1:2e:d1:ff: f1:36:08:5b:0f:99:db:37:f0:5d:dd:a6:f0:1d:01:ea: 3a:c8:37:32:ef:33:78:ba:31:8e:ea:07:c7:e3:74:5e: 23:39:0d:36:ec:43:2c:0b:02:e5:82:cd:90:44:3e:26: fb:e8:77:be:37:24:d9:a7:66:80:56:cb:db:ba:38:a2: 1a:52:4f:78:19:39:9b:96:a8:aa:8b:96:c2:61:79:89: 00:5c:0f:42:3e:86:4d:b4:e7:91:ce:5a:34:6f:66:85: 67:f5:92:80:e5:8b:af:7b:ec:77:5f:08:e3:0c:b5:d8: 2f:60:ab:c4:37:67:33:3f:19:7f:fa:ff:f6:18:59:a1: 6c:ce:41:0d:8c:c5:52:c3:1a:92:fe:c1:ae:2f:72:4a: dd:bd:0c:9c:55:66:89:ba:c9:b0:0b:8b:24:35:27:ce: 46:1e:a6:df:41:f5:4f:1a:2c:87:07:6e:6f:39:e1:1d Fingerprint (SHA-256): D6:3F:ED:B4:04:93:BF:C3:B0:48:E0:DD:37:1D:73:57:2D:73:01:68:AC:0C:FA:A7:0E:F4:FA:BB:01:18:3A:D5 Fingerprint (SHA1): E2:99:71:7A:7E:6F:94:AF:BB:42:9A:6F:21:45:71:D4:0F:43:EB:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142863 (0x3cafa08f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:14 2023 Not After : Wed Oct 18 14:31:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:0c:6f:16:be:1e:95:26:61:fb:6b:92:57:79:a4: 37:cb:42:13:92:77:a9:08:ea:49:7c:f1:84:43:fc:49: 57:5a:4f:34:a4:e3:d2:4e:a2:55:d9:8b:c9:68:a1:dc: 76:5f:46:ac:60:b6:1c:5e:7d:a5:b0:fc:d2:c0:53:bc: 28:b3:ab:04:ed:b7:9a:bb:75:47:1b:a3:53:f0:b1:20: 54:8c:c9:be:c5:ac:6d:94:1f:cc:22:1e:82:e5:16:9c: 9d:5e:89:fc:5f:46:2b:9b:5f:b4:22:66:fc:09:56:c2: a4:3e:ed:7a:da:06:b0:8e:e6:9f:93:95:3e:7f:55:5a: 44:a5:17:78:5a:2b:f3:e8:b8:be:66:e3:0f:b2:51:f8: 2a:1c:e4:cd:54:4c:b1:b6:63:2c:86:d2:de:e7:cb:5d: 0e:93:0b:6b:5f:43:4d:74:c0:57:5f:f8:72:87:b6:a6: c7:9b:9e:19:9c:b7:eb:b2:79:59:ba:8f:3a:9e:00:54: ec:65:24:a1:35:f3:e9:f1:8f:c9:52:a5:50:1c:3f:54: e9:98:bb:55:de:6d:ec:20:90:27:6c:23:d2:ab:98:ec: f2:0c:10:fc:c9:f4:83:b3:06:f6:70:c9:e9:7b:71:e6: e5:f2:ad:89:66:6d:a7:24:1d:c4:94:d1:98:27:ff:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:0b:c0:2e:f8:8a:94:6b:50:b3:ce:be:27:56:93:a6: 5c:4e:6c:af:99:1a:cd:f3:ca:37:02:ea:e5:fc:45:5d: 6b:0f:47:ce:5b:9c:5f:8a:ce:a8:57:c3:9d:67:54:f1: 45:89:fb:0e:b1:bb:95:30:e9:b8:de:4b:13:5d:97:de: 27:1f:2e:89:f9:b0:6e:17:0f:a3:3b:f3:d1:2e:d1:ff: f1:36:08:5b:0f:99:db:37:f0:5d:dd:a6:f0:1d:01:ea: 3a:c8:37:32:ef:33:78:ba:31:8e:ea:07:c7:e3:74:5e: 23:39:0d:36:ec:43:2c:0b:02:e5:82:cd:90:44:3e:26: fb:e8:77:be:37:24:d9:a7:66:80:56:cb:db:ba:38:a2: 1a:52:4f:78:19:39:9b:96:a8:aa:8b:96:c2:61:79:89: 00:5c:0f:42:3e:86:4d:b4:e7:91:ce:5a:34:6f:66:85: 67:f5:92:80:e5:8b:af:7b:ec:77:5f:08:e3:0c:b5:d8: 2f:60:ab:c4:37:67:33:3f:19:7f:fa:ff:f6:18:59:a1: 6c:ce:41:0d:8c:c5:52:c3:1a:92:fe:c1:ae:2f:72:4a: dd:bd:0c:9c:55:66:89:ba:c9:b0:0b:8b:24:35:27:ce: 46:1e:a6:df:41:f5:4f:1a:2c:87:07:6e:6f:39:e1:1d Fingerprint (SHA-256): D6:3F:ED:B4:04:93:BF:C3:B0:48:E0:DD:37:1D:73:57:2D:73:01:68:AC:0C:FA:A7:0E:F4:FA:BB:01:18:3A:D5 Fingerprint (SHA1): E2:99:71:7A:7E:6F:94:AF:BB:42:9A:6F:21:45:71:D4:0F:43:EB:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142862 (0x3cafa08e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:31:13 2023 Not After : Wed Oct 18 14:31:13 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:ce:37:a4:d3:e6:ed:fe:d0:81:55:41:bb:31:85:bf: 8a:36:ff:73:11:d9:76:50:87:6f:51:c1:70:3c:63:4e: f6:8d:92:e8:bf:bd:11:69:98:55:15:a0:b1:e1:6d:8f: c4:65:d7:5c:8a:bc:d8:d3:50:b4:d2:0f:ba:3d:06:20: 53:32:9c:5e:a1:01:b3:47:57:41:49:6e:f6:d2:de:c7: 20:6b:3c:06:51:87:1e:c7:18:39:54:40:43:c8:dc:ca: 48:4f:3f:c4:ac:7f:fb:f1:d6:2a:c2:4c:0a:c1:03:ef: 3b:36:44:a8:d9:bd:bd:a9:98:d2:bb:94:a7:52:4c:87: 53:9a:b4:98:7a:82:35:49:e8:a6:ff:4a:d6:9b:30:10: 02:fb:42:c5:b6:86:d9:a0:1f:a6:b6:82:37:a0:fd:c0: 4b:28:96:6b:69:c1:77:dd:c3:6e:a7:7d:54:80:0e:7f: ad:1d:40:2a:65:a8:92:03:4f:2e:57:eb:48:33:5a:fa: e7:25:81:1f:ce:d5:12:0d:f9:b7:ec:08:91:40:8c:52: 32:dd:45:4d:ad:e8:65:fb:36:ac:a0:84:de:c5:cf:36: e3:b9:1d:f2:73:58:b8:8b:dd:71:8d:4c:01:39:cc:e1: d1:df:f9:1d:a5:9e:39:27:06:10:b9:0f:54:45:69:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:c5:76:ab:4d:cb:15:b6:0c:ac:dc:7e:ca:03:c0:b9: c2:4c:15:70:a5:f0:0c:c6:2e:80:90:42:de:16:87:01: a0:ca:1c:9b:a7:22:48:ac:69:5d:bb:69:a7:70:ab:4b: d9:05:ff:f0:3e:1b:1c:d0:3d:ba:c8:79:34:57:54:5b: 83:84:6b:e1:4a:d2:f0:0b:83:36:fb:57:08:dd:20:bc: 55:f8:7c:c5:68:dd:7d:5e:79:f7:83:f6:48:71:80:05: a9:64:d4:f8:f9:07:0e:63:8f:1c:40:bf:c7:b8:60:2c: 97:63:b1:71:f7:8f:a2:23:fe:43:48:12:f8:2b:da:ca: dc:7f:7d:51:9c:bf:6f:e5:c7:2e:36:19:50:ee:b3:92: f0:a1:4a:85:61:ea:e5:90:b7:ab:ec:c8:3f:75:8d:87: 28:20:6b:ee:b9:3c:c4:ed:a8:a6:60:5a:c3:f8:4d:28: 94:fe:f4:a9:eb:be:2c:5d:06:c6:6a:a1:ed:b7:0a:a1: 05:0c:2b:35:da:89:08:93:69:f5:8b:b8:bf:b3:5d:5e: f8:43:69:70:96:03:c0:2f:1b:c6:49:18:b2:47:3f:b5: 1a:fb:23:ef:d5:ed:5a:39:f0:95:c0:47:85:2d:9a:e0: ae:50:47:49:a7:dc:30:5d:06:02:5f:d2:b6:52:d7:ef Fingerprint (SHA-256): A4:56:8B:63:BE:DC:EB:FE:16:92:12:A8:6F:06:9E:CE:DE:47:C3:90:38:C1:62:37:3B:22:77:FC:A2:84:A7:96 Fingerprint (SHA1): 21:A8:A8:74:DE:5A:D3:6D:6B:B1:58:13:DF:6A:12:4E:F5:7A:08:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142863 (0x3cafa08f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:14 2023 Not After : Wed Oct 18 14:31:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:0c:6f:16:be:1e:95:26:61:fb:6b:92:57:79:a4: 37:cb:42:13:92:77:a9:08:ea:49:7c:f1:84:43:fc:49: 57:5a:4f:34:a4:e3:d2:4e:a2:55:d9:8b:c9:68:a1:dc: 76:5f:46:ac:60:b6:1c:5e:7d:a5:b0:fc:d2:c0:53:bc: 28:b3:ab:04:ed:b7:9a:bb:75:47:1b:a3:53:f0:b1:20: 54:8c:c9:be:c5:ac:6d:94:1f:cc:22:1e:82:e5:16:9c: 9d:5e:89:fc:5f:46:2b:9b:5f:b4:22:66:fc:09:56:c2: a4:3e:ed:7a:da:06:b0:8e:e6:9f:93:95:3e:7f:55:5a: 44:a5:17:78:5a:2b:f3:e8:b8:be:66:e3:0f:b2:51:f8: 2a:1c:e4:cd:54:4c:b1:b6:63:2c:86:d2:de:e7:cb:5d: 0e:93:0b:6b:5f:43:4d:74:c0:57:5f:f8:72:87:b6:a6: c7:9b:9e:19:9c:b7:eb:b2:79:59:ba:8f:3a:9e:00:54: ec:65:24:a1:35:f3:e9:f1:8f:c9:52:a5:50:1c:3f:54: e9:98:bb:55:de:6d:ec:20:90:27:6c:23:d2:ab:98:ec: f2:0c:10:fc:c9:f4:83:b3:06:f6:70:c9:e9:7b:71:e6: e5:f2:ad:89:66:6d:a7:24:1d:c4:94:d1:98:27:ff:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:0b:c0:2e:f8:8a:94:6b:50:b3:ce:be:27:56:93:a6: 5c:4e:6c:af:99:1a:cd:f3:ca:37:02:ea:e5:fc:45:5d: 6b:0f:47:ce:5b:9c:5f:8a:ce:a8:57:c3:9d:67:54:f1: 45:89:fb:0e:b1:bb:95:30:e9:b8:de:4b:13:5d:97:de: 27:1f:2e:89:f9:b0:6e:17:0f:a3:3b:f3:d1:2e:d1:ff: f1:36:08:5b:0f:99:db:37:f0:5d:dd:a6:f0:1d:01:ea: 3a:c8:37:32:ef:33:78:ba:31:8e:ea:07:c7:e3:74:5e: 23:39:0d:36:ec:43:2c:0b:02:e5:82:cd:90:44:3e:26: fb:e8:77:be:37:24:d9:a7:66:80:56:cb:db:ba:38:a2: 1a:52:4f:78:19:39:9b:96:a8:aa:8b:96:c2:61:79:89: 00:5c:0f:42:3e:86:4d:b4:e7:91:ce:5a:34:6f:66:85: 67:f5:92:80:e5:8b:af:7b:ec:77:5f:08:e3:0c:b5:d8: 2f:60:ab:c4:37:67:33:3f:19:7f:fa:ff:f6:18:59:a1: 6c:ce:41:0d:8c:c5:52:c3:1a:92:fe:c1:ae:2f:72:4a: dd:bd:0c:9c:55:66:89:ba:c9:b0:0b:8b:24:35:27:ce: 46:1e:a6:df:41:f5:4f:1a:2c:87:07:6e:6f:39:e1:1d Fingerprint (SHA-256): D6:3F:ED:B4:04:93:BF:C3:B0:48:E0:DD:37:1D:73:57:2D:73:01:68:AC:0C:FA:A7:0E:F4:FA:BB:01:18:3A:D5 Fingerprint (SHA1): E2:99:71:7A:7E:6F:94:AF:BB:42:9A:6F:21:45:71:D4:0F:43:EB:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142863 (0x3cafa08f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:14 2023 Not After : Wed Oct 18 14:31:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:0c:6f:16:be:1e:95:26:61:fb:6b:92:57:79:a4: 37:cb:42:13:92:77:a9:08:ea:49:7c:f1:84:43:fc:49: 57:5a:4f:34:a4:e3:d2:4e:a2:55:d9:8b:c9:68:a1:dc: 76:5f:46:ac:60:b6:1c:5e:7d:a5:b0:fc:d2:c0:53:bc: 28:b3:ab:04:ed:b7:9a:bb:75:47:1b:a3:53:f0:b1:20: 54:8c:c9:be:c5:ac:6d:94:1f:cc:22:1e:82:e5:16:9c: 9d:5e:89:fc:5f:46:2b:9b:5f:b4:22:66:fc:09:56:c2: a4:3e:ed:7a:da:06:b0:8e:e6:9f:93:95:3e:7f:55:5a: 44:a5:17:78:5a:2b:f3:e8:b8:be:66:e3:0f:b2:51:f8: 2a:1c:e4:cd:54:4c:b1:b6:63:2c:86:d2:de:e7:cb:5d: 0e:93:0b:6b:5f:43:4d:74:c0:57:5f:f8:72:87:b6:a6: c7:9b:9e:19:9c:b7:eb:b2:79:59:ba:8f:3a:9e:00:54: ec:65:24:a1:35:f3:e9:f1:8f:c9:52:a5:50:1c:3f:54: e9:98:bb:55:de:6d:ec:20:90:27:6c:23:d2:ab:98:ec: f2:0c:10:fc:c9:f4:83:b3:06:f6:70:c9:e9:7b:71:e6: e5:f2:ad:89:66:6d:a7:24:1d:c4:94:d1:98:27:ff:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:0b:c0:2e:f8:8a:94:6b:50:b3:ce:be:27:56:93:a6: 5c:4e:6c:af:99:1a:cd:f3:ca:37:02:ea:e5:fc:45:5d: 6b:0f:47:ce:5b:9c:5f:8a:ce:a8:57:c3:9d:67:54:f1: 45:89:fb:0e:b1:bb:95:30:e9:b8:de:4b:13:5d:97:de: 27:1f:2e:89:f9:b0:6e:17:0f:a3:3b:f3:d1:2e:d1:ff: f1:36:08:5b:0f:99:db:37:f0:5d:dd:a6:f0:1d:01:ea: 3a:c8:37:32:ef:33:78:ba:31:8e:ea:07:c7:e3:74:5e: 23:39:0d:36:ec:43:2c:0b:02:e5:82:cd:90:44:3e:26: fb:e8:77:be:37:24:d9:a7:66:80:56:cb:db:ba:38:a2: 1a:52:4f:78:19:39:9b:96:a8:aa:8b:96:c2:61:79:89: 00:5c:0f:42:3e:86:4d:b4:e7:91:ce:5a:34:6f:66:85: 67:f5:92:80:e5:8b:af:7b:ec:77:5f:08:e3:0c:b5:d8: 2f:60:ab:c4:37:67:33:3f:19:7f:fa:ff:f6:18:59:a1: 6c:ce:41:0d:8c:c5:52:c3:1a:92:fe:c1:ae:2f:72:4a: dd:bd:0c:9c:55:66:89:ba:c9:b0:0b:8b:24:35:27:ce: 46:1e:a6:df:41:f5:4f:1a:2c:87:07:6e:6f:39:e1:1d Fingerprint (SHA-256): D6:3F:ED:B4:04:93:BF:C3:B0:48:E0:DD:37:1D:73:57:2D:73:01:68:AC:0C:FA:A7:0E:F4:FA:BB:01:18:3A:D5 Fingerprint (SHA1): E2:99:71:7A:7E:6F:94:AF:BB:42:9A:6F:21:45:71:D4:0F:43:EB:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142870 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142871 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018142872 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018142873 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018142874 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018142875 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018142876 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018142877 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142878 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018142879 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142870 (0x3cafa096) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:31:24 2023 Not After : Wed Oct 18 14:31:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:ce:55:c6:52:80:dc:34:bf:53:16:5f:f3:48:d7:55: e3:f6:4c:9c:c1:8c:d9:75:a3:a7:43:40:04:69:0d:b9: 01:22:ef:af:1a:37:3a:7a:10:5d:c4:7c:31:22:de:b3: 93:49:ce:cd:30:c4:a5:57:09:74:39:f8:83:ef:fd:f9: de:a1:1e:58:eb:af:22:54:a2:2f:5f:c3:b6:4e:0f:01: ee:60:2f:d0:eb:3c:de:4d:5c:aa:06:e4:b1:ed:c0:99: 29:89:de:55:2b:aa:17:09:86:62:12:08:36:cc:c6:10: 95:a9:af:e2:26:b2:9f:67:08:70:f0:4a:f5:4a:28:6c: c9:e7:76:c8:87:6e:c2:c8:70:d0:64:88:bc:30:07:cc: 3a:6d:8f:3b:d1:b5:ef:1e:27:ef:62:ac:fe:32:c6:54: 78:fa:59:87:5c:0b:f5:c5:60:ab:da:93:b8:ec:95:70: 28:2d:79:86:d3:8b:8d:f9:5c:14:cf:4a:5c:83:44:b0: a5:4d:38:b9:56:d1:ef:e3:17:4b:32:6a:6b:61:0d:e2: 7b:98:70:93:2c:1d:07:d4:cc:8b:01:9b:bb:55:d3:d5: 2c:4f:bd:df:96:b8:e1:80:0d:60:f6:80:19:c9:40:c9: 12:85:11:ab:7b:35:4a:85:ff:2f:e1:dd:3d:a8:e9:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:2d:f6:c6:90:98:8a:a6:ff:46:c9:17:6e:21:8d:74: aa:9d:aa:a1:85:2d:18:f6:9c:5d:4a:25:dd:26:54:f3: 32:e9:29:c6:ac:45:b4:5f:7b:bb:71:a2:c9:31:13:89: 39:75:65:6f:a6:33:29:10:c2:5c:a9:ff:f9:b2:09:8e: 05:1c:6c:81:9c:3b:64:d3:13:a8:53:bb:4e:5a:d8:81: 09:7e:5e:e9:77:7f:50:c0:3b:8d:26:f0:4f:3f:a0:22: 7b:85:3d:3e:cd:34:65:61:58:bb:37:03:b6:86:6c:f6: 42:d5:34:d8:f5:eb:fc:0c:f9:8c:66:93:4d:37:c6:31: ab:58:8a:1b:60:27:a6:21:94:96:b5:e6:e9:cd:bb:93: 0c:42:f7:7e:f5:27:11:d3:23:d1:7d:8a:13:f2:11:53: ce:a3:a7:21:72:3d:e6:6b:be:ab:d8:ba:7b:7f:72:15: d8:fd:cd:ee:40:5d:1d:59:95:de:eb:59:3b:f6:58:0c: 58:02:d6:33:14:ed:7d:a5:c7:55:d4:48:bc:ad:3b:82: a7:bd:0d:06:ce:02:8f:38:a5:4c:09:35:da:0b:d0:9e: 73:26:2c:a8:1c:db:21:f0:54:f7:f6:8e:9e:6c:2b:9d: 07:91:a1:ff:9c:a3:bb:02:21:8b:a3:b8:41:b5:f3:67 Fingerprint (SHA-256): 30:E0:86:33:67:FB:2F:18:09:09:25:BC:65:56:33:08:F9:F4:03:87:13:E9:7E:43:2C:75:55:FC:48:33:78:16 Fingerprint (SHA1): 83:4E:5C:F3:FD:EE:1B:48:86:12:69:36:09:4F:D3:77:CD:79:FC:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142871 (0x3cafa097) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:31:25 2023 Not After : Wed Oct 18 14:31:25 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:6f:00:b9:4d:e5:1b:65:03:54:85:7c:1d:ac:96:6d: ae:a2:a8:29:05:b1:1d:66:46:21:2a:35:56:97:c3:57: c6:d9:ee:63:e3:53:88:08:25:63:b6:fc:38:f3:69:e1: 8a:b3:1e:59:ff:08:54:15:35:d4:5f:57:db:99:bc:14: c0:82:5a:d4:03:c5:16:ff:8b:22:5c:18:f4:84:81:d8: 6f:ad:7d:ea:9f:6f:43:81:8e:a7:a9:31:10:e6:61:a2: 34:61:e2:5b:09:4d:da:e1:79:08:c7:99:14:fa:52:59: eb:2f:49:81:ad:e0:98:8e:93:66:56:59:46:d6:bf:fc: 9b:d9:d7:7e:94:f3:bb:f1:75:ff:e6:0f:ff:d7:5e:1f: f0:12:a5:b4:60:d5:96:97:87:60:78:27:a5:56:70:6a: 92:7a:ec:d3:76:c5:59:e2:9a:7f:95:76:8c:16:34:8d: f9:d6:a4:3d:51:58:c9:f4:e8:0d:69:05:d0:74:2c:1e: 67:dd:bf:fb:04:ed:c0:66:15:34:42:22:50:37:6b:58: e0:0c:6f:7e:9b:32:6e:d3:c3:4c:d6:84:75:9e:f3:b2: 9f:ad:a7:2d:3e:d2:de:6e:ef:d5:72:ed:37:f1:a5:40: c8:de:9e:eb:c0:b3:73:65:c3:9e:94:f4:12:5a:c1:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:98:e8:79:c5:61:30:43:99:36:41:34:20:42:9b:44: 0e:e3:49:d6:e9:0f:cb:8c:46:33:ed:bf:2a:f3:2e:01: be:87:c9:1b:b3:a2:96:0f:9d:e5:a4:8e:01:88:2a:df: d8:60:8f:cc:4f:27:60:af:d2:08:24:97:d8:fd:8f:28: 69:7a:ac:6a:f1:d9:84:7e:22:0e:f1:b3:18:51:ef:37: a7:05:8d:2e:c6:8a:b4:50:53:85:d8:9e:82:e2:2e:3b: b6:ef:05:23:4f:bd:53:b2:8c:1a:90:7a:d7:8d:ce:c8: bc:f8:76:8f:37:97:e0:ff:10:5b:28:df:e8:4c:8b:8f: 61:c2:f3:09:62:75:19:74:a9:c9:cb:61:b2:3a:e2:42: c2:44:b7:36:5d:4b:68:ae:e2:d4:2c:75:9e:95:e3:dd: 1c:ea:72:3c:9f:a0:0e:b5:a5:60:31:9f:9e:06:e5:f8: 63:37:62:ee:49:1f:1b:01:f0:1f:b2:14:ce:9c:a5:a4: 19:2c:d6:13:ff:95:88:3b:23:d5:d7:65:61:6b:4e:17: d0:c6:35:5d:dc:41:a2:21:62:5d:3a:30:63:17:f4:72: 42:63:73:4f:b2:23:33:63:e5:02:32:70:64:b5:ba:ba: c4:72:87:09:fc:15:f4:11:84:7d:b2:db:5a:19:8a:17 Fingerprint (SHA-256): 02:DF:91:6E:F2:D2:05:24:C8:D4:55:A1:84:16:63:19:F5:E7:DA:01:6B:B0:C7:0B:BD:25:B2:9F:62:40:2E:CB Fingerprint (SHA1): 46:59:1B:8E:06:3C:AF:EE:E8:F3:03:94:24:B9:9B:55:DE:94:5D:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142880 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142881 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142882 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018142883 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018142884 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018142885 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018142886 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018142887 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018142888 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142880 (0x3cafa0a0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:39 2023 Not After : Wed Oct 18 14:31:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:ea:cf:7f:26:bd:ab:54:33:83:d5:d0:0c:fc:56:bd: a8:d1:d0:4f:e8:a3:30:38:26:b8:59:44:ff:60:dc:5b: 00:01:9f:46:14:4a:2a:c0:d5:88:74:3c:80:f5:f8:26: cd:d2:8b:f9:2c:20:3e:e4:b7:0a:3e:f6:f5:51:0f:ed: e1:c7:60:0c:1e:ad:fa:78:4c:5b:28:32:82:d6:70:2c: e7:0e:28:7a:7f:f2:fa:2c:fc:c5:2e:d2:da:35:39:e6: 1a:e1:be:a0:1b:62:53:e7:51:51:aa:bf:b1:ad:38:57: c4:96:61:56:6b:fe:1e:f2:98:a4:b9:62:d6:92:b7:fe: d8:95:d1:a1:3b:1e:47:1b:d2:ea:07:e0:20:45:51:a0: 21:b7:93:16:8e:80:7b:e2:bb:a6:e9:76:af:14:a9:be: 12:73:cb:88:d2:46:bd:31:87:69:02:b7:2f:f8:47:65: 7a:ab:82:74:41:3d:ac:c0:8c:b5:be:8f:c3:09:d6:f0: 13:4a:fc:08:8e:ed:1b:a6:96:de:59:53:9b:43:91:f2: 01:f4:2e:a3:50:f4:b8:69:5f:e9:9a:67:ac:26:b8:29: 24:3c:3d:d3:1b:6f:df:cd:ab:9e:bb:68:f5:2d:16:19: 71:26:92:34:f5:ac:a2:7f:32:78:49:85:38:28:22:50 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:03:f2:82:50:4a:4a:cf:65:73:c4:c0:03: 1c:3f:94:61:07:17:8c:55:c1:e0:6f:55:ed:55:65:1d: 02:1d:00:b1:20:82:8a:c7:51:82:39:2b:20:dc:65:c2: 83:20:43:97:84:18:63:e8:05:5b:44:53:1f:98:45 Fingerprint (SHA-256): D2:3D:D2:D5:39:AB:3D:C8:69:12:81:5C:F8:4B:28:F0:2E:3E:DE:AF:BC:DF:27:19:E4:20:AE:49:AD:3F:53:0E Fingerprint (SHA1): EB:34:22:3C:48:B8:9F:24:C3:65:43:BE:82:BA:86:81:D3:34:59:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142880 (0x3cafa0a0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:39 2023 Not After : Wed Oct 18 14:31:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:ea:cf:7f:26:bd:ab:54:33:83:d5:d0:0c:fc:56:bd: a8:d1:d0:4f:e8:a3:30:38:26:b8:59:44:ff:60:dc:5b: 00:01:9f:46:14:4a:2a:c0:d5:88:74:3c:80:f5:f8:26: cd:d2:8b:f9:2c:20:3e:e4:b7:0a:3e:f6:f5:51:0f:ed: e1:c7:60:0c:1e:ad:fa:78:4c:5b:28:32:82:d6:70:2c: e7:0e:28:7a:7f:f2:fa:2c:fc:c5:2e:d2:da:35:39:e6: 1a:e1:be:a0:1b:62:53:e7:51:51:aa:bf:b1:ad:38:57: c4:96:61:56:6b:fe:1e:f2:98:a4:b9:62:d6:92:b7:fe: d8:95:d1:a1:3b:1e:47:1b:d2:ea:07:e0:20:45:51:a0: 21:b7:93:16:8e:80:7b:e2:bb:a6:e9:76:af:14:a9:be: 12:73:cb:88:d2:46:bd:31:87:69:02:b7:2f:f8:47:65: 7a:ab:82:74:41:3d:ac:c0:8c:b5:be:8f:c3:09:d6:f0: 13:4a:fc:08:8e:ed:1b:a6:96:de:59:53:9b:43:91:f2: 01:f4:2e:a3:50:f4:b8:69:5f:e9:9a:67:ac:26:b8:29: 24:3c:3d:d3:1b:6f:df:cd:ab:9e:bb:68:f5:2d:16:19: 71:26:92:34:f5:ac:a2:7f:32:78:49:85:38:28:22:50 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:03:f2:82:50:4a:4a:cf:65:73:c4:c0:03: 1c:3f:94:61:07:17:8c:55:c1:e0:6f:55:ed:55:65:1d: 02:1d:00:b1:20:82:8a:c7:51:82:39:2b:20:dc:65:c2: 83:20:43:97:84:18:63:e8:05:5b:44:53:1f:98:45 Fingerprint (SHA-256): D2:3D:D2:D5:39:AB:3D:C8:69:12:81:5C:F8:4B:28:F0:2E:3E:DE:AF:BC:DF:27:19:E4:20:AE:49:AD:3F:53:0E Fingerprint (SHA1): EB:34:22:3C:48:B8:9F:24:C3:65:43:BE:82:BA:86:81:D3:34:59:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142880 (0x3cafa0a0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:39 2023 Not After : Wed Oct 18 14:31:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:ea:cf:7f:26:bd:ab:54:33:83:d5:d0:0c:fc:56:bd: a8:d1:d0:4f:e8:a3:30:38:26:b8:59:44:ff:60:dc:5b: 00:01:9f:46:14:4a:2a:c0:d5:88:74:3c:80:f5:f8:26: cd:d2:8b:f9:2c:20:3e:e4:b7:0a:3e:f6:f5:51:0f:ed: e1:c7:60:0c:1e:ad:fa:78:4c:5b:28:32:82:d6:70:2c: e7:0e:28:7a:7f:f2:fa:2c:fc:c5:2e:d2:da:35:39:e6: 1a:e1:be:a0:1b:62:53:e7:51:51:aa:bf:b1:ad:38:57: c4:96:61:56:6b:fe:1e:f2:98:a4:b9:62:d6:92:b7:fe: d8:95:d1:a1:3b:1e:47:1b:d2:ea:07:e0:20:45:51:a0: 21:b7:93:16:8e:80:7b:e2:bb:a6:e9:76:af:14:a9:be: 12:73:cb:88:d2:46:bd:31:87:69:02:b7:2f:f8:47:65: 7a:ab:82:74:41:3d:ac:c0:8c:b5:be:8f:c3:09:d6:f0: 13:4a:fc:08:8e:ed:1b:a6:96:de:59:53:9b:43:91:f2: 01:f4:2e:a3:50:f4:b8:69:5f:e9:9a:67:ac:26:b8:29: 24:3c:3d:d3:1b:6f:df:cd:ab:9e:bb:68:f5:2d:16:19: 71:26:92:34:f5:ac:a2:7f:32:78:49:85:38:28:22:50 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:03:f2:82:50:4a:4a:cf:65:73:c4:c0:03: 1c:3f:94:61:07:17:8c:55:c1:e0:6f:55:ed:55:65:1d: 02:1d:00:b1:20:82:8a:c7:51:82:39:2b:20:dc:65:c2: 83:20:43:97:84:18:63:e8:05:5b:44:53:1f:98:45 Fingerprint (SHA-256): D2:3D:D2:D5:39:AB:3D:C8:69:12:81:5C:F8:4B:28:F0:2E:3E:DE:AF:BC:DF:27:19:E4:20:AE:49:AD:3F:53:0E Fingerprint (SHA1): EB:34:22:3C:48:B8:9F:24:C3:65:43:BE:82:BA:86:81:D3:34:59:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142880 (0x3cafa0a0) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:39 2023 Not After : Wed Oct 18 14:31:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:ea:cf:7f:26:bd:ab:54:33:83:d5:d0:0c:fc:56:bd: a8:d1:d0:4f:e8:a3:30:38:26:b8:59:44:ff:60:dc:5b: 00:01:9f:46:14:4a:2a:c0:d5:88:74:3c:80:f5:f8:26: cd:d2:8b:f9:2c:20:3e:e4:b7:0a:3e:f6:f5:51:0f:ed: e1:c7:60:0c:1e:ad:fa:78:4c:5b:28:32:82:d6:70:2c: e7:0e:28:7a:7f:f2:fa:2c:fc:c5:2e:d2:da:35:39:e6: 1a:e1:be:a0:1b:62:53:e7:51:51:aa:bf:b1:ad:38:57: c4:96:61:56:6b:fe:1e:f2:98:a4:b9:62:d6:92:b7:fe: d8:95:d1:a1:3b:1e:47:1b:d2:ea:07:e0:20:45:51:a0: 21:b7:93:16:8e:80:7b:e2:bb:a6:e9:76:af:14:a9:be: 12:73:cb:88:d2:46:bd:31:87:69:02:b7:2f:f8:47:65: 7a:ab:82:74:41:3d:ac:c0:8c:b5:be:8f:c3:09:d6:f0: 13:4a:fc:08:8e:ed:1b:a6:96:de:59:53:9b:43:91:f2: 01:f4:2e:a3:50:f4:b8:69:5f:e9:9a:67:ac:26:b8:29: 24:3c:3d:d3:1b:6f:df:cd:ab:9e:bb:68:f5:2d:16:19: 71:26:92:34:f5:ac:a2:7f:32:78:49:85:38:28:22:50 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:03:f2:82:50:4a:4a:cf:65:73:c4:c0:03: 1c:3f:94:61:07:17:8c:55:c1:e0:6f:55:ed:55:65:1d: 02:1d:00:b1:20:82:8a:c7:51:82:39:2b:20:dc:65:c2: 83:20:43:97:84:18:63:e8:05:5b:44:53:1f:98:45 Fingerprint (SHA-256): D2:3D:D2:D5:39:AB:3D:C8:69:12:81:5C:F8:4B:28:F0:2E:3E:DE:AF:BC:DF:27:19:E4:20:AE:49:AD:3F:53:0E Fingerprint (SHA1): EB:34:22:3C:48:B8:9F:24:C3:65:43:BE:82:BA:86:81:D3:34:59:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018143157Z nextupdate=20241018143157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:31:57 2023 Next Update: Fri Oct 18 14:31:57 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143157Z nextupdate=20241018143157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:31:57 2023 Next Update: Fri Oct 18 14:31:57 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143157Z nextupdate=20241018143157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:31:57 2023 Next Update: Fri Oct 18 14:31:57 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018143157Z nextupdate=20241018143157Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:31:57 2023 Next Update: Fri Oct 18 14:31:57 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143158Z addcert 14 20231018143158Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:31:58 2023 Next Update: Fri Oct 18 14:31:57 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:31:58 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143159Z addcert 15 20231018143159Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:31:59 2023 Next Update: Fri Oct 18 14:31:57 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:31:59 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:48 2023 Not After : Wed Oct 18 14:31:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:7d:4a:7d:60:36:0a:0b:8a:1c:d7:b1:1a:c4:02:40: 46:45:92:94:ff:bb:45:c0:8b:f1:bc:b5:35:9a:3d:e4: d3:6b:34:d8:16:03:9d:43:d2:f3:a9:bd:71:f4:0b:b7: a4:38:1f:ce:33:c1:91:3a:85:ff:d3:71:4e:ed:a1:d8: 7d:ed:3f:d2:86:89:a5:89:88:ca:e0:ee:3a:c9:ea:df: 40:fb:db:e2:68:82:98:f1:0a:0c:7b:b5:28:d8:b7:d7: 03:16:ec:31:70:1e:29:41:23:ba:5d:74:15:2b:c9:03: fe:dd:f0:83:6e:d7:70:65:a9:6a:86:a7:a5:47:ef:d3: 10:75:bd:fd:c0:bd:0a:bf:96:f9:a2:dd:64:81:3c:bd: 94:b3:ed:a0:27:b5:22:93:fc:53:22:8d:bd:ab:fa:23: de:61:0f:a4:09:2f:0a:9a:93:99:c3:43:78:6d:70:ca: d3:1a:36:bb:ae:50:f5:10:fe:28:97:d0:2c:24:bf:13: b8:96:cd:1d:fb:b3:0e:08:84:70:53:bd:38:d3:43:d0: d9:62:40:3d:a1:8b:93:e3:0f:21:82:03:3d:16:43:a8: 44:1e:b2:1b:86:bd:ea:9e:3a:48:87:78:a9:0c:89:8b: ac:33:7b:05:65:a1:c3:0c:2a:40:d6:c1:73:b2:7a:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:f0:03:be:8b:9b:ca:c3:87:ae:60:44:81:f3:f4:0d: e5:01:8c:ce:b3:6f:47:b1:11:ee:67:e0:a8:54:3a:65: c1:32:25:4d:b4:d5:e9:68:38:0c:6a:d5:49:10:32:3e: 09:6d:09:4f:75:df:22:25:38:c7:34:ee:2f:f8:86:84: f1:db:f5:2a:c5:a8:8f:c5:ce:40:8a:45:3c:3b:63:74: 70:c1:2f:58:ed:b6:1e:0f:dc:04:a6:b8:a4:40:e8:5f: 7c:b0:2c:91:dc:d7:bd:40:37:fd:b4:93:c4:38:42:38: 5a:48:7c:cb:72:36:d2:d2:4f:fa:b6:da:9b:fa:49:a0: 1e:44:92:31:39:93:dd:7e:57:59:81:be:c2:ac:6c:af: 64:34:5b:9a:22:c6:3c:3c:85:cb:36:b2:f7:52:a0:c8: 6a:1b:08:3b:34:93:e1:f7:76:e6:b1:c1:ad:00:16:35: 24:63:ee:5f:41:c6:33:a8:c0:32:1a:e7:d1:93:a1:f3: b4:46:4c:79:e5:ef:ad:85:8c:e0:e9:15:ed:47:df:9f: 45:4f:fc:fa:6f:10:06:95:08:7d:a9:31:fd:2b:cf:92: 08:83:35:9a:d6:d7:d5:4a:d5:69:67:4e:90:63:24:2c: 8a:f3:61:35:12:9f:71:d4:11:1d:d4:4e:6c:ea:96:0a Fingerprint (SHA-256): EF:43:14:2C:39:92:1F:76:56:61:E9:78:43:82:C4:19:00:A7:31:01:EC:D8:98:E3:3F:97:1D:90:6B:F9:9F:3D Fingerprint (SHA1): 7D:58:17:26:1B:FE:7B:E0:09:90:29:6A:40:27:04:06:95:1E:9D:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:31:48 2023 Not After : Wed Oct 18 14:31:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:7d:4a:7d:60:36:0a:0b:8a:1c:d7:b1:1a:c4:02:40: 46:45:92:94:ff:bb:45:c0:8b:f1:bc:b5:35:9a:3d:e4: d3:6b:34:d8:16:03:9d:43:d2:f3:a9:bd:71:f4:0b:b7: a4:38:1f:ce:33:c1:91:3a:85:ff:d3:71:4e:ed:a1:d8: 7d:ed:3f:d2:86:89:a5:89:88:ca:e0:ee:3a:c9:ea:df: 40:fb:db:e2:68:82:98:f1:0a:0c:7b:b5:28:d8:b7:d7: 03:16:ec:31:70:1e:29:41:23:ba:5d:74:15:2b:c9:03: fe:dd:f0:83:6e:d7:70:65:a9:6a:86:a7:a5:47:ef:d3: 10:75:bd:fd:c0:bd:0a:bf:96:f9:a2:dd:64:81:3c:bd: 94:b3:ed:a0:27:b5:22:93:fc:53:22:8d:bd:ab:fa:23: de:61:0f:a4:09:2f:0a:9a:93:99:c3:43:78:6d:70:ca: d3:1a:36:bb:ae:50:f5:10:fe:28:97:d0:2c:24:bf:13: b8:96:cd:1d:fb:b3:0e:08:84:70:53:bd:38:d3:43:d0: d9:62:40:3d:a1:8b:93:e3:0f:21:82:03:3d:16:43:a8: 44:1e:b2:1b:86:bd:ea:9e:3a:48:87:78:a9:0c:89:8b: ac:33:7b:05:65:a1:c3:0c:2a:40:d6:c1:73:b2:7a:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:f0:03:be:8b:9b:ca:c3:87:ae:60:44:81:f3:f4:0d: e5:01:8c:ce:b3:6f:47:b1:11:ee:67:e0:a8:54:3a:65: c1:32:25:4d:b4:d5:e9:68:38:0c:6a:d5:49:10:32:3e: 09:6d:09:4f:75:df:22:25:38:c7:34:ee:2f:f8:86:84: f1:db:f5:2a:c5:a8:8f:c5:ce:40:8a:45:3c:3b:63:74: 70:c1:2f:58:ed:b6:1e:0f:dc:04:a6:b8:a4:40:e8:5f: 7c:b0:2c:91:dc:d7:bd:40:37:fd:b4:93:c4:38:42:38: 5a:48:7c:cb:72:36:d2:d2:4f:fa:b6:da:9b:fa:49:a0: 1e:44:92:31:39:93:dd:7e:57:59:81:be:c2:ac:6c:af: 64:34:5b:9a:22:c6:3c:3c:85:cb:36:b2:f7:52:a0:c8: 6a:1b:08:3b:34:93:e1:f7:76:e6:b1:c1:ad:00:16:35: 24:63:ee:5f:41:c6:33:a8:c0:32:1a:e7:d1:93:a1:f3: b4:46:4c:79:e5:ef:ad:85:8c:e0:e9:15:ed:47:df:9f: 45:4f:fc:fa:6f:10:06:95:08:7d:a9:31:fd:2b:cf:92: 08:83:35:9a:d6:d7:d5:4a:d5:69:67:4e:90:63:24:2c: 8a:f3:61:35:12:9f:71:d4:11:1d:d4:4e:6c:ea:96:0a Fingerprint (SHA-256): EF:43:14:2C:39:92:1F:76:56:61:E9:78:43:82:C4:19:00:A7:31:01:EC:D8:98:E3:3F:97:1D:90:6B:F9:9F:3D Fingerprint (SHA1): 7D:58:17:26:1B:FE:7B:E0:09:90:29:6A:40:27:04:06:95:1E:9D:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142889 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018142890 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142765.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142749.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142765.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018142891 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142765.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142750.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018142892 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142765.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142751.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142765.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142752.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018143211Z nextupdate=20241018143211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:32:11 2023 Next Update: Fri Oct 18 14:32:11 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143211Z nextupdate=20241018143211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:32:11 2023 Next Update: Fri Oct 18 14:32:11 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143211Z nextupdate=20241018143211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:32:11 2023 Next Update: Fri Oct 18 14:32:11 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018143211Z nextupdate=20241018143211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:32:11 2023 Next Update: Fri Oct 18 14:32:11 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143212Z addcert 20 20231018143212Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:32:12 2023 Next Update: Fri Oct 18 14:32:11 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:32:12 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143213Z addcert 40 20231018143213Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:32:13 2023 Next Update: Fri Oct 18 14:32:11 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:32:12 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:32:13 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142889 (0x3cafa0a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:32:02 2023 Not After : Wed Oct 18 14:32:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c6:1a:74:f5:3d:f5:1c:40:38:42:53:ab:6d:dc:f0: 0f:e6:42:d9:57:b8:13:9d:bb:2d:73:52:34:e0:1b:3a: 66:a1:35:e5:a0:49:99:a9:3a:b4:6e:99:cb:16:94:32: a6:7b:6a:9b:b7:02:2a:f3:3b:14:d8:59:9a:62:98:7f: 35:0b:9b:27:e0:a1:e1:98:13:15:ae:3f:66:3d:31:b9: f5:23:91:32:f8:2c:ae:56:d5:24:1c:3d:a7:1f:0b:3d: 1f:ce:bf:7c:cd:47:ec:d1:e6:bb:a2:63:6d:fc:2e:86: e3:63:d1:31:35:09:c7:24:07:d2:41:d6:e1:b2:56:20: 47:5b:c8:58:a2:a8:76:bc:f0:da:98:7a:e7:77:b4:18: 18:f6:7c:0f:72:50:27:c2:83:77:ea:b4:e2:b2:e1:fd: 6f:0f:f3:9a:d8:93:b1:ac:ae:51:56:11:e1:e1:20:e6: 54:83:2c:29:8a:f0:ec:dc:c2:97:ac:53:c0:09:d6:82: 1a:2c:1f:a2:6d:8f:c3:c1:4e:9e:73:f6:92:2a:f0:35: 10:9d:8e:62:b6:a5:ee:b5:31:0e:b4:ef:25:e6:48:58: 7c:ba:34:f6:b5:56:17:ff:6e:ec:01:6f:62:25:1c:72: fa:74:62:8b:c3:4e:9e:44:b4:42:51:7a:a3:03:55:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:d1:64:8a:2f:c4:ce:f6:80:a2:a2:2b:0f:fc:4b:5f: ba:37:b7:1e:cb:a1:8b:69:9c:11:e3:a1:c2:a0:a5:66: e2:92:de:38:50:0f:71:a6:d6:98:d7:7a:59:64:41:ca: 0e:fe:a7:bc:72:ac:c5:fd:cc:27:8e:b6:7c:d2:a9:29: 4a:7f:bf:45:75:ba:a9:23:22:77:98:64:a9:59:a2:3f: 49:29:26:bd:87:5f:51:58:a8:cd:b8:e9:61:40:f7:56: fb:48:9e:4b:0f:f3:9b:e9:4b:63:07:36:22:77:77:d5: f0:a5:31:d5:d6:e9:cf:19:c4:7d:39:cc:92:b0:55:98: d0:ce:ce:b9:25:68:43:ef:01:83:4a:b3:c5:a3:0e:2e: b2:31:18:56:c3:05:0c:cb:92:85:b1:f8:90:d3:78:96: 20:3f:c4:fa:4c:86:6d:03:59:60:4f:72:07:be:95:69: aa:45:ee:6b:4c:e0:3e:dc:8d:3f:f0:d2:1b:2e:b3:66: 70:63:94:e8:bf:7a:31:77:1e:46:0f:e9:c6:2e:1c:d2: e5:06:37:7d:41:3d:c7:6a:76:d3:d1:05:62:47:5b:85: 3b:c2:00:61:44:92:45:cb:84:34:50:9f:b9:8e:44:00: cb:fa:11:61:73:3c:88:fa:3b:2e:5f:23:d4:ed:35:14 Fingerprint (SHA-256): 45:F4:2C:62:5D:0F:9A:56:D2:95:A6:00:FE:EE:24:DA:42:31:3D:5B:9F:DD:23:33:2B:FE:D4:C3:0C:63:A8:98 Fingerprint (SHA1): 9B:53:2D:27:ED:78:16:FB:7F:FA:E3:A3:24:45:A5:CB:AF:EA:05:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142889 (0x3cafa0a9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:32:02 2023 Not After : Wed Oct 18 14:32:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c6:1a:74:f5:3d:f5:1c:40:38:42:53:ab:6d:dc:f0: 0f:e6:42:d9:57:b8:13:9d:bb:2d:73:52:34:e0:1b:3a: 66:a1:35:e5:a0:49:99:a9:3a:b4:6e:99:cb:16:94:32: a6:7b:6a:9b:b7:02:2a:f3:3b:14:d8:59:9a:62:98:7f: 35:0b:9b:27:e0:a1:e1:98:13:15:ae:3f:66:3d:31:b9: f5:23:91:32:f8:2c:ae:56:d5:24:1c:3d:a7:1f:0b:3d: 1f:ce:bf:7c:cd:47:ec:d1:e6:bb:a2:63:6d:fc:2e:86: e3:63:d1:31:35:09:c7:24:07:d2:41:d6:e1:b2:56:20: 47:5b:c8:58:a2:a8:76:bc:f0:da:98:7a:e7:77:b4:18: 18:f6:7c:0f:72:50:27:c2:83:77:ea:b4:e2:b2:e1:fd: 6f:0f:f3:9a:d8:93:b1:ac:ae:51:56:11:e1:e1:20:e6: 54:83:2c:29:8a:f0:ec:dc:c2:97:ac:53:c0:09:d6:82: 1a:2c:1f:a2:6d:8f:c3:c1:4e:9e:73:f6:92:2a:f0:35: 10:9d:8e:62:b6:a5:ee:b5:31:0e:b4:ef:25:e6:48:58: 7c:ba:34:f6:b5:56:17:ff:6e:ec:01:6f:62:25:1c:72: fa:74:62:8b:c3:4e:9e:44:b4:42:51:7a:a3:03:55:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:d1:64:8a:2f:c4:ce:f6:80:a2:a2:2b:0f:fc:4b:5f: ba:37:b7:1e:cb:a1:8b:69:9c:11:e3:a1:c2:a0:a5:66: e2:92:de:38:50:0f:71:a6:d6:98:d7:7a:59:64:41:ca: 0e:fe:a7:bc:72:ac:c5:fd:cc:27:8e:b6:7c:d2:a9:29: 4a:7f:bf:45:75:ba:a9:23:22:77:98:64:a9:59:a2:3f: 49:29:26:bd:87:5f:51:58:a8:cd:b8:e9:61:40:f7:56: fb:48:9e:4b:0f:f3:9b:e9:4b:63:07:36:22:77:77:d5: f0:a5:31:d5:d6:e9:cf:19:c4:7d:39:cc:92:b0:55:98: d0:ce:ce:b9:25:68:43:ef:01:83:4a:b3:c5:a3:0e:2e: b2:31:18:56:c3:05:0c:cb:92:85:b1:f8:90:d3:78:96: 20:3f:c4:fa:4c:86:6d:03:59:60:4f:72:07:be:95:69: aa:45:ee:6b:4c:e0:3e:dc:8d:3f:f0:d2:1b:2e:b3:66: 70:63:94:e8:bf:7a:31:77:1e:46:0f:e9:c6:2e:1c:d2: e5:06:37:7d:41:3d:c7:6a:76:d3:d1:05:62:47:5b:85: 3b:c2:00:61:44:92:45:cb:84:34:50:9f:b9:8e:44:00: cb:fa:11:61:73:3c:88:fa:3b:2e:5f:23:d4:ed:35:14 Fingerprint (SHA-256): 45:F4:2C:62:5D:0F:9A:56:D2:95:A6:00:FE:EE:24:DA:42:31:3D:5B:9F:DD:23:33:2B:FE:D4:C3:0C:63:A8:98 Fingerprint (SHA1): 9B:53:2D:27:ED:78:16:FB:7F:FA:E3:A3:24:45:A5:CB:AF:EA:05:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142893 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018142894 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142895 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018142896 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142897 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018142898 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018142899 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142893 (0x3cafa0ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:32:15 2023 Not After : Wed Oct 18 14:32:15 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:87:55:87:fa:90:a4:a7:5a:34:5a:aa:64:5d:b0:29: bd:c1:85:2c:d4:8e:37:3c:bb:d9:e8:f0:84:dd:75:7d: fc:7b:c0:77:eb:c1:9b:fe:df:df:20:94:e5:7f:ed:b0: 81:80:11:f7:43:f8:a6:8f:83:63:70:58:c7:e7:ab:3c: a0:a6:37:94:30:93:a2:50:92:3c:58:67:18:0a:ff:5a: b3:5b:c5:19:20:99:23:d4:ed:61:d3:62:96:e6:e7:e1: a9:6f:d4:4f:cc:6d:14:8d:cd:c5:15:45:f6:c4:8b:6c: d3:f6:e2:48:8e:65:8a:83:b7:fd:d1:19:db:5e:e2:ac: 59:3a:7c:79:a2:82:bc:f4:c7:cd:c1:dc:c2:db:a6:8a: da:c9:a9:71:17:c0:a7:b3:b8:8d:40:46:c6:d4:f6:f2: fd:ae:88:08:1f:22:21:01:4a:d4:6f:d1:c4:36:2f:ec: 43:8d:91:2a:d9:7f:6e:61:93:d3:27:1c:7a:54:b6:97: 76:80:56:83:8e:8a:98:14:f0:27:ad:c0:02:2e:9f:f7: 9d:68:cf:fa:fb:6b:b5:83:80:9a:2a:9a:4a:35:1d:cd: 0c:2a:65:3f:de:6e:bb:53:27:00:b0:74:af:8a:7a:aa: 90:b6:ef:6e:6f:b5:d8:90:93:46:4b:79:9a:24:79:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:41:97:94:92:58:87:8f:43:f2:55:f4:fe:c7:9a:54: e9:58:87:1a:2a:0f:1c:f8:5c:1f:9f:24:ab:e6:7d:d0: 27:33:48:8a:86:00:bc:8a:a3:ea:b8:ba:d0:62:5c:b6: 54:32:5b:6f:46:38:18:e0:05:a5:1a:e3:69:a7:9a:f2: 4b:04:c9:e2:9b:64:f1:c3:24:8c:83:0b:26:1a:a5:b3: 83:0b:79:a9:b3:39:e8:34:cd:d0:55:dd:69:6c:55:b4: 39:5d:67:3e:7c:30:de:bc:12:90:c5:35:81:e0:cd:94: bc:a2:a2:ac:77:53:5b:16:5e:80:8e:09:d8:c6:f7:44: 8a:e5:22:a8:7a:c2:53:c0:81:89:f0:3b:72:8a:52:9c: e8:ed:3e:d1:4d:1a:26:03:ef:c0:dc:3c:2a:51:e6:11: 42:51:91:d7:ab:5d:26:6a:71:3a:f6:3d:be:dc:9b:1e: fe:3b:94:7a:c6:a5:40:af:da:be:99:3c:5b:2d:d6:78: 06:9a:13:9a:a1:4a:fc:a8:ae:2f:66:3f:43:0a:59:41: 5a:33:dd:75:41:ac:7b:7c:b3:fe:21:4c:cf:0e:c1:03: ff:93:1d:8d:20:6d:3f:a0:7b:dc:bd:4e:ca:8b:e3:91: 1f:b9:46:ba:5e:4f:6e:ba:1b:01:56:ad:16:98:66:bd Fingerprint (SHA-256): B8:9C:A1:87:95:36:59:94:91:39:BE:D7:6E:4F:64:B8:CD:A6:17:43:79:33:A6:F9:11:E8:0C:AE:55:3F:F7:79 Fingerprint (SHA1): 58:84:54:03:05:BC:69:D6:F0:60:FF:43:6B:A9:02:B8:32:1D:03:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142895 (0x3cafa0af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:32:18 2023 Not After : Wed Oct 18 14:32:18 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:57:ce:41:53:6e:52:a1:4f:94:c5:d7:26:b8:80:8a: 5a:26:07:3a:03:04:e2:d7:4d:8d:af:4c:56:1d:48:1c: 69:96:b8:c1:c1:bb:5d:67:46:75:e6:c8:70:f1:ed:2a: 01:42:3a:c0:4e:fc:e4:16:da:d8:40:c8:12:db:e5:1f: dd:d3:1c:22:ee:2d:1d:3a:0e:60:be:ea:f5:be:7f:99: 3f:82:db:4e:41:df:4e:08:ae:24:10:71:e6:e5:0a:f8: cf:d6:dd:56:4a:b6:5a:ae:c4:81:e8:3f:9b:c8:be:f4: 16:27:2c:47:4e:82:32:6a:e8:17:a9:fb:2a:4d:10:e8: 5a:95:b8:b6:d1:53:02:dd:13:c6:0f:78:5d:88:d2:53: e1:9c:94:b3:bc:da:27:d0:cf:ef:6b:ee:02:80:f5:8f: ce:77:7a:88:d1:da:99:ef:f3:9d:20:d1:91:cf:ba:b4: 29:9c:5b:8d:70:46:90:bd:7b:7a:a6:e5:bf:18:e5:c2: 1c:e4:ef:fc:5b:bb:d7:3a:85:b8:9d:6e:a3:d3:de:26: ab:46:9d:6b:56:11:5c:d9:1e:44:3b:07:f6:6f:20:93: b4:f9:8d:30:2d:53:62:99:39:38:97:1d:32:79:b6:6f: 66:2b:37:e9:6f:26:40:0a:de:67:9f:ef:4f:3b:8f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:10:8e:eb:a3:71:4e:44:22:64:82:5e:8b:a3:22:72: 33:80:2c:53:80:2d:1c:63:3a:3b:d4:93:c7:1a:df:a9: 01:c0:c2:f5:9e:d4:5d:37:38:50:12:1e:f4:95:d1:ac: 56:cb:8c:13:b7:4c:d0:9d:e9:f0:c6:af:97:71:6c:80: 9c:ba:02:d9:32:67:67:e2:49:00:c5:a8:0a:f2:3b:6b: 15:1f:a7:c4:20:d0:0b:a1:0d:50:da:af:3b:39:a7:8e: f8:f7:05:9a:cb:1d:18:35:40:bd:f4:c1:67:56:be:a2: f2:be:56:c6:52:24:df:b7:10:02:c4:67:25:22:bc:3f: e3:c5:7a:b9:26:71:c8:b7:92:e2:91:51:49:44:bd:53: b8:d8:e6:e1:51:91:30:0d:c6:1b:7b:21:2b:ea:05:65: c8:56:5c:bc:d5:d7:d7:6f:d4:2f:e5:fd:7a:94:8f:17: 25:ca:1b:63:fe:f0:7a:d5:b0:40:c5:62:c2:73:7f:4f: fe:08:ef:f7:7a:89:f0:81:a3:72:e8:c0:b3:79:80:a2: 51:ec:20:b4:17:0e:0e:e8:4d:fd:f1:36:50:7c:86:69: 07:71:4a:0f:14:3a:6e:ff:02:73:49:11:42:4c:9d:35: e6:65:d1:dd:82:63:e6:f5:3c:64:83:85:95:00:8e:88 Fingerprint (SHA-256): F7:E4:85:78:C9:3E:D9:44:7F:42:05:4A:56:E2:A8:27:D1:85:B2:7F:37:A4:E3:F7:53:C4:A3:68:62:AF:A6:2B Fingerprint (SHA1): C0:9F:06:CF:24:63:B2:CF:1D:5A:32:78:D3:E9:E2:6B:70:EB:F6:83 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142893 (0x3cafa0ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:32:15 2023 Not After : Wed Oct 18 14:32:15 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:87:55:87:fa:90:a4:a7:5a:34:5a:aa:64:5d:b0:29: bd:c1:85:2c:d4:8e:37:3c:bb:d9:e8:f0:84:dd:75:7d: fc:7b:c0:77:eb:c1:9b:fe:df:df:20:94:e5:7f:ed:b0: 81:80:11:f7:43:f8:a6:8f:83:63:70:58:c7:e7:ab:3c: a0:a6:37:94:30:93:a2:50:92:3c:58:67:18:0a:ff:5a: b3:5b:c5:19:20:99:23:d4:ed:61:d3:62:96:e6:e7:e1: a9:6f:d4:4f:cc:6d:14:8d:cd:c5:15:45:f6:c4:8b:6c: d3:f6:e2:48:8e:65:8a:83:b7:fd:d1:19:db:5e:e2:ac: 59:3a:7c:79:a2:82:bc:f4:c7:cd:c1:dc:c2:db:a6:8a: da:c9:a9:71:17:c0:a7:b3:b8:8d:40:46:c6:d4:f6:f2: fd:ae:88:08:1f:22:21:01:4a:d4:6f:d1:c4:36:2f:ec: 43:8d:91:2a:d9:7f:6e:61:93:d3:27:1c:7a:54:b6:97: 76:80:56:83:8e:8a:98:14:f0:27:ad:c0:02:2e:9f:f7: 9d:68:cf:fa:fb:6b:b5:83:80:9a:2a:9a:4a:35:1d:cd: 0c:2a:65:3f:de:6e:bb:53:27:00:b0:74:af:8a:7a:aa: 90:b6:ef:6e:6f:b5:d8:90:93:46:4b:79:9a:24:79:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:41:97:94:92:58:87:8f:43:f2:55:f4:fe:c7:9a:54: e9:58:87:1a:2a:0f:1c:f8:5c:1f:9f:24:ab:e6:7d:d0: 27:33:48:8a:86:00:bc:8a:a3:ea:b8:ba:d0:62:5c:b6: 54:32:5b:6f:46:38:18:e0:05:a5:1a:e3:69:a7:9a:f2: 4b:04:c9:e2:9b:64:f1:c3:24:8c:83:0b:26:1a:a5:b3: 83:0b:79:a9:b3:39:e8:34:cd:d0:55:dd:69:6c:55:b4: 39:5d:67:3e:7c:30:de:bc:12:90:c5:35:81:e0:cd:94: bc:a2:a2:ac:77:53:5b:16:5e:80:8e:09:d8:c6:f7:44: 8a:e5:22:a8:7a:c2:53:c0:81:89:f0:3b:72:8a:52:9c: e8:ed:3e:d1:4d:1a:26:03:ef:c0:dc:3c:2a:51:e6:11: 42:51:91:d7:ab:5d:26:6a:71:3a:f6:3d:be:dc:9b:1e: fe:3b:94:7a:c6:a5:40:af:da:be:99:3c:5b:2d:d6:78: 06:9a:13:9a:a1:4a:fc:a8:ae:2f:66:3f:43:0a:59:41: 5a:33:dd:75:41:ac:7b:7c:b3:fe:21:4c:cf:0e:c1:03: ff:93:1d:8d:20:6d:3f:a0:7b:dc:bd:4e:ca:8b:e3:91: 1f:b9:46:ba:5e:4f:6e:ba:1b:01:56:ad:16:98:66:bd Fingerprint (SHA-256): B8:9C:A1:87:95:36:59:94:91:39:BE:D7:6E:4F:64:B8:CD:A6:17:43:79:33:A6:F9:11:E8:0C:AE:55:3F:F7:79 Fingerprint (SHA1): 58:84:54:03:05:BC:69:D6:F0:60:FF:43:6B:A9:02:B8:32:1D:03:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142893 (0x3cafa0ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:32:15 2023 Not After : Wed Oct 18 14:32:15 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:87:55:87:fa:90:a4:a7:5a:34:5a:aa:64:5d:b0:29: bd:c1:85:2c:d4:8e:37:3c:bb:d9:e8:f0:84:dd:75:7d: fc:7b:c0:77:eb:c1:9b:fe:df:df:20:94:e5:7f:ed:b0: 81:80:11:f7:43:f8:a6:8f:83:63:70:58:c7:e7:ab:3c: a0:a6:37:94:30:93:a2:50:92:3c:58:67:18:0a:ff:5a: b3:5b:c5:19:20:99:23:d4:ed:61:d3:62:96:e6:e7:e1: a9:6f:d4:4f:cc:6d:14:8d:cd:c5:15:45:f6:c4:8b:6c: d3:f6:e2:48:8e:65:8a:83:b7:fd:d1:19:db:5e:e2:ac: 59:3a:7c:79:a2:82:bc:f4:c7:cd:c1:dc:c2:db:a6:8a: da:c9:a9:71:17:c0:a7:b3:b8:8d:40:46:c6:d4:f6:f2: fd:ae:88:08:1f:22:21:01:4a:d4:6f:d1:c4:36:2f:ec: 43:8d:91:2a:d9:7f:6e:61:93:d3:27:1c:7a:54:b6:97: 76:80:56:83:8e:8a:98:14:f0:27:ad:c0:02:2e:9f:f7: 9d:68:cf:fa:fb:6b:b5:83:80:9a:2a:9a:4a:35:1d:cd: 0c:2a:65:3f:de:6e:bb:53:27:00:b0:74:af:8a:7a:aa: 90:b6:ef:6e:6f:b5:d8:90:93:46:4b:79:9a:24:79:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:41:97:94:92:58:87:8f:43:f2:55:f4:fe:c7:9a:54: e9:58:87:1a:2a:0f:1c:f8:5c:1f:9f:24:ab:e6:7d:d0: 27:33:48:8a:86:00:bc:8a:a3:ea:b8:ba:d0:62:5c:b6: 54:32:5b:6f:46:38:18:e0:05:a5:1a:e3:69:a7:9a:f2: 4b:04:c9:e2:9b:64:f1:c3:24:8c:83:0b:26:1a:a5:b3: 83:0b:79:a9:b3:39:e8:34:cd:d0:55:dd:69:6c:55:b4: 39:5d:67:3e:7c:30:de:bc:12:90:c5:35:81:e0:cd:94: bc:a2:a2:ac:77:53:5b:16:5e:80:8e:09:d8:c6:f7:44: 8a:e5:22:a8:7a:c2:53:c0:81:89:f0:3b:72:8a:52:9c: e8:ed:3e:d1:4d:1a:26:03:ef:c0:dc:3c:2a:51:e6:11: 42:51:91:d7:ab:5d:26:6a:71:3a:f6:3d:be:dc:9b:1e: fe:3b:94:7a:c6:a5:40:af:da:be:99:3c:5b:2d:d6:78: 06:9a:13:9a:a1:4a:fc:a8:ae:2f:66:3f:43:0a:59:41: 5a:33:dd:75:41:ac:7b:7c:b3:fe:21:4c:cf:0e:c1:03: ff:93:1d:8d:20:6d:3f:a0:7b:dc:bd:4e:ca:8b:e3:91: 1f:b9:46:ba:5e:4f:6e:ba:1b:01:56:ad:16:98:66:bd Fingerprint (SHA-256): B8:9C:A1:87:95:36:59:94:91:39:BE:D7:6E:4F:64:B8:CD:A6:17:43:79:33:A6:F9:11:E8:0C:AE:55:3F:F7:79 Fingerprint (SHA1): 58:84:54:03:05:BC:69:D6:F0:60:FF:43:6B:A9:02:B8:32:1D:03:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142895 (0x3cafa0af) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:32:18 2023 Not After : Wed Oct 18 14:32:18 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:57:ce:41:53:6e:52:a1:4f:94:c5:d7:26:b8:80:8a: 5a:26:07:3a:03:04:e2:d7:4d:8d:af:4c:56:1d:48:1c: 69:96:b8:c1:c1:bb:5d:67:46:75:e6:c8:70:f1:ed:2a: 01:42:3a:c0:4e:fc:e4:16:da:d8:40:c8:12:db:e5:1f: dd:d3:1c:22:ee:2d:1d:3a:0e:60:be:ea:f5:be:7f:99: 3f:82:db:4e:41:df:4e:08:ae:24:10:71:e6:e5:0a:f8: cf:d6:dd:56:4a:b6:5a:ae:c4:81:e8:3f:9b:c8:be:f4: 16:27:2c:47:4e:82:32:6a:e8:17:a9:fb:2a:4d:10:e8: 5a:95:b8:b6:d1:53:02:dd:13:c6:0f:78:5d:88:d2:53: e1:9c:94:b3:bc:da:27:d0:cf:ef:6b:ee:02:80:f5:8f: ce:77:7a:88:d1:da:99:ef:f3:9d:20:d1:91:cf:ba:b4: 29:9c:5b:8d:70:46:90:bd:7b:7a:a6:e5:bf:18:e5:c2: 1c:e4:ef:fc:5b:bb:d7:3a:85:b8:9d:6e:a3:d3:de:26: ab:46:9d:6b:56:11:5c:d9:1e:44:3b:07:f6:6f:20:93: b4:f9:8d:30:2d:53:62:99:39:38:97:1d:32:79:b6:6f: 66:2b:37:e9:6f:26:40:0a:de:67:9f:ef:4f:3b:8f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:10:8e:eb:a3:71:4e:44:22:64:82:5e:8b:a3:22:72: 33:80:2c:53:80:2d:1c:63:3a:3b:d4:93:c7:1a:df:a9: 01:c0:c2:f5:9e:d4:5d:37:38:50:12:1e:f4:95:d1:ac: 56:cb:8c:13:b7:4c:d0:9d:e9:f0:c6:af:97:71:6c:80: 9c:ba:02:d9:32:67:67:e2:49:00:c5:a8:0a:f2:3b:6b: 15:1f:a7:c4:20:d0:0b:a1:0d:50:da:af:3b:39:a7:8e: f8:f7:05:9a:cb:1d:18:35:40:bd:f4:c1:67:56:be:a2: f2:be:56:c6:52:24:df:b7:10:02:c4:67:25:22:bc:3f: e3:c5:7a:b9:26:71:c8:b7:92:e2:91:51:49:44:bd:53: b8:d8:e6:e1:51:91:30:0d:c6:1b:7b:21:2b:ea:05:65: c8:56:5c:bc:d5:d7:d7:6f:d4:2f:e5:fd:7a:94:8f:17: 25:ca:1b:63:fe:f0:7a:d5:b0:40:c5:62:c2:73:7f:4f: fe:08:ef:f7:7a:89:f0:81:a3:72:e8:c0:b3:79:80:a2: 51:ec:20:b4:17:0e:0e:e8:4d:fd:f1:36:50:7c:86:69: 07:71:4a:0f:14:3a:6e:ff:02:73:49:11:42:4c:9d:35: e6:65:d1:dd:82:63:e6:f5:3c:64:83:85:95:00:8e:88 Fingerprint (SHA-256): F7:E4:85:78:C9:3E:D9:44:7F:42:05:4A:56:E2:A8:27:D1:85:B2:7F:37:A4:E3:F7:53:C4:A3:68:62:AF:A6:2B Fingerprint (SHA1): C0:9F:06:CF:24:63:B2:CF:1D:5A:32:78:D3:E9:E2:6B:70:EB:F6:83 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142893 (0x3cafa0ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:32:15 2023 Not After : Wed Oct 18 14:32:15 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:87:55:87:fa:90:a4:a7:5a:34:5a:aa:64:5d:b0:29: bd:c1:85:2c:d4:8e:37:3c:bb:d9:e8:f0:84:dd:75:7d: fc:7b:c0:77:eb:c1:9b:fe:df:df:20:94:e5:7f:ed:b0: 81:80:11:f7:43:f8:a6:8f:83:63:70:58:c7:e7:ab:3c: a0:a6:37:94:30:93:a2:50:92:3c:58:67:18:0a:ff:5a: b3:5b:c5:19:20:99:23:d4:ed:61:d3:62:96:e6:e7:e1: a9:6f:d4:4f:cc:6d:14:8d:cd:c5:15:45:f6:c4:8b:6c: d3:f6:e2:48:8e:65:8a:83:b7:fd:d1:19:db:5e:e2:ac: 59:3a:7c:79:a2:82:bc:f4:c7:cd:c1:dc:c2:db:a6:8a: da:c9:a9:71:17:c0:a7:b3:b8:8d:40:46:c6:d4:f6:f2: fd:ae:88:08:1f:22:21:01:4a:d4:6f:d1:c4:36:2f:ec: 43:8d:91:2a:d9:7f:6e:61:93:d3:27:1c:7a:54:b6:97: 76:80:56:83:8e:8a:98:14:f0:27:ad:c0:02:2e:9f:f7: 9d:68:cf:fa:fb:6b:b5:83:80:9a:2a:9a:4a:35:1d:cd: 0c:2a:65:3f:de:6e:bb:53:27:00:b0:74:af:8a:7a:aa: 90:b6:ef:6e:6f:b5:d8:90:93:46:4b:79:9a:24:79:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:41:97:94:92:58:87:8f:43:f2:55:f4:fe:c7:9a:54: e9:58:87:1a:2a:0f:1c:f8:5c:1f:9f:24:ab:e6:7d:d0: 27:33:48:8a:86:00:bc:8a:a3:ea:b8:ba:d0:62:5c:b6: 54:32:5b:6f:46:38:18:e0:05:a5:1a:e3:69:a7:9a:f2: 4b:04:c9:e2:9b:64:f1:c3:24:8c:83:0b:26:1a:a5:b3: 83:0b:79:a9:b3:39:e8:34:cd:d0:55:dd:69:6c:55:b4: 39:5d:67:3e:7c:30:de:bc:12:90:c5:35:81:e0:cd:94: bc:a2:a2:ac:77:53:5b:16:5e:80:8e:09:d8:c6:f7:44: 8a:e5:22:a8:7a:c2:53:c0:81:89:f0:3b:72:8a:52:9c: e8:ed:3e:d1:4d:1a:26:03:ef:c0:dc:3c:2a:51:e6:11: 42:51:91:d7:ab:5d:26:6a:71:3a:f6:3d:be:dc:9b:1e: fe:3b:94:7a:c6:a5:40:af:da:be:99:3c:5b:2d:d6:78: 06:9a:13:9a:a1:4a:fc:a8:ae:2f:66:3f:43:0a:59:41: 5a:33:dd:75:41:ac:7b:7c:b3:fe:21:4c:cf:0e:c1:03: ff:93:1d:8d:20:6d:3f:a0:7b:dc:bd:4e:ca:8b:e3:91: 1f:b9:46:ba:5e:4f:6e:ba:1b:01:56:ad:16:98:66:bd Fingerprint (SHA-256): B8:9C:A1:87:95:36:59:94:91:39:BE:D7:6E:4F:64:B8:CD:A6:17:43:79:33:A6:F9:11:E8:0C:AE:55:3F:F7:79 Fingerprint (SHA1): 58:84:54:03:05:BC:69:D6:F0:60:FF:43:6B:A9:02:B8:32:1D:03:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142897 (0x3cafa0b1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:32:21 2023 Not After : Wed Oct 18 14:32:21 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:e7:36:e5:fa:60:93:89:06:77:10:cf:13:ac:b3:bc: 49:fd:3e:a4:77:de:8d:af:fe:e9:01:b1:58:2c:a2:b0: 60:8a:3a:b3:13:24:0c:78:d1:45:a9:fa:60:7a:d2:f0: 10:e3:10:fc:de:b3:f8:bf:48:c8:6a:df:a6:f7:44:7d: c4:b5:27:b3:1e:f0:3b:3d:f0:c9:a0:06:e9:19:e5:b4: ea:f4:6d:1d:b6:ec:f1:20:2d:ca:2d:c5:bd:96:33:a0: b3:51:f4:5a:d7:2b:bd:69:0f:a2:a7:26:63:fd:77:c3: 77:41:9f:92:4e:e6:8d:bc:85:42:f4:3b:9c:64:ac:99: 1d:9c:8a:49:f4:f1:8f:1a:00:c6:a6:ed:d3:a4:f8:ad: 6b:8d:0a:03:67:b5:8f:5f:92:9f:54:c3:51:72:b8:66: 98:d0:70:cd:3a:26:f4:64:e4:fd:0a:ba:13:3c:ea:ab: bb:73:a2:25:79:68:b0:8b:29:cb:9a:86:46:14:d9:a8: ce:be:9a:a1:ff:ee:56:f8:fa:88:02:59:56:ba:c9:52: 0a:39:19:d9:a8:4c:32:f0:82:5f:a8:d3:b3:68:b6:41: 87:b0:04:6d:90:75:20:ab:89:d0:c1:6e:1a:30:2f:54: b4:78:f2:61:c4:33:5b:b2:3a:1d:48:a6:c0:88:33:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:da:dc:7a:b2:c7:c6:7a:48:ac:71:e2:81:d6:18:2f: 85:f4:6c:5a:d6:55:73:a8:fe:52:f7:53:78:f6:e9:ff: fe:c2:24:cc:33:6e:c7:24:76:6f:ac:89:a1:96:a9:ba: 65:e4:5e:60:d3:1c:35:f9:9e:7c:ba:8a:5b:6c:a0:89: 2e:36:1b:e2:7b:2f:29:77:bb:fe:c7:e0:ba:5e:fb:43: c7:60:ee:2c:06:2a:e8:df:c7:2d:44:db:4d:b0:4f:db: 53:af:e7:2e:10:0c:17:0d:e1:0e:b2:b1:05:3f:e8:49: c9:f0:72:81:88:75:d5:a9:ec:48:6a:49:cc:bc:eb:d3: 7a:10:7b:3c:33:10:8e:d1:16:52:10:72:fe:89:a1:dd: c7:ee:8c:34:fc:29:f4:ff:07:eb:34:8c:74:50:77:6f: 72:64:5b:98:00:e5:a3:d8:95:86:02:9e:c8:3f:aa:7c: 17:d7:88:d6:d6:e3:f7:86:2f:d0:40:bd:de:9e:db:e3: b9:42:5f:7c:04:da:bb:61:12:b4:60:7c:62:5e:cc:9d: a4:bd:6b:2a:c9:28:7e:a1:0a:31:57:48:8b:ac:8f:52: f7:23:4c:60:f4:fe:03:60:d9:b6:bf:db:eb:2c:e9:a7: 62:25:bc:db:28:6b:5b:ba:ea:5a:f2:b0:2e:21:db:af Fingerprint (SHA-256): 2E:5C:5B:85:E4:D5:7F:59:07:4F:44:F3:8F:B5:39:35:7D:2A:0F:0B:44:12:E2:34:AE:55:76:D6:D0:50:22:DE Fingerprint (SHA1): F8:E4:9D:77:E7:D7:5E:BF:DE:80:2E:7B:B1:55:40:DC:C8:A3:C5:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142893 (0x3cafa0ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:32:15 2023 Not After : Wed Oct 18 14:32:15 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:87:55:87:fa:90:a4:a7:5a:34:5a:aa:64:5d:b0:29: bd:c1:85:2c:d4:8e:37:3c:bb:d9:e8:f0:84:dd:75:7d: fc:7b:c0:77:eb:c1:9b:fe:df:df:20:94:e5:7f:ed:b0: 81:80:11:f7:43:f8:a6:8f:83:63:70:58:c7:e7:ab:3c: a0:a6:37:94:30:93:a2:50:92:3c:58:67:18:0a:ff:5a: b3:5b:c5:19:20:99:23:d4:ed:61:d3:62:96:e6:e7:e1: a9:6f:d4:4f:cc:6d:14:8d:cd:c5:15:45:f6:c4:8b:6c: d3:f6:e2:48:8e:65:8a:83:b7:fd:d1:19:db:5e:e2:ac: 59:3a:7c:79:a2:82:bc:f4:c7:cd:c1:dc:c2:db:a6:8a: da:c9:a9:71:17:c0:a7:b3:b8:8d:40:46:c6:d4:f6:f2: fd:ae:88:08:1f:22:21:01:4a:d4:6f:d1:c4:36:2f:ec: 43:8d:91:2a:d9:7f:6e:61:93:d3:27:1c:7a:54:b6:97: 76:80:56:83:8e:8a:98:14:f0:27:ad:c0:02:2e:9f:f7: 9d:68:cf:fa:fb:6b:b5:83:80:9a:2a:9a:4a:35:1d:cd: 0c:2a:65:3f:de:6e:bb:53:27:00:b0:74:af:8a:7a:aa: 90:b6:ef:6e:6f:b5:d8:90:93:46:4b:79:9a:24:79:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:41:97:94:92:58:87:8f:43:f2:55:f4:fe:c7:9a:54: e9:58:87:1a:2a:0f:1c:f8:5c:1f:9f:24:ab:e6:7d:d0: 27:33:48:8a:86:00:bc:8a:a3:ea:b8:ba:d0:62:5c:b6: 54:32:5b:6f:46:38:18:e0:05:a5:1a:e3:69:a7:9a:f2: 4b:04:c9:e2:9b:64:f1:c3:24:8c:83:0b:26:1a:a5:b3: 83:0b:79:a9:b3:39:e8:34:cd:d0:55:dd:69:6c:55:b4: 39:5d:67:3e:7c:30:de:bc:12:90:c5:35:81:e0:cd:94: bc:a2:a2:ac:77:53:5b:16:5e:80:8e:09:d8:c6:f7:44: 8a:e5:22:a8:7a:c2:53:c0:81:89:f0:3b:72:8a:52:9c: e8:ed:3e:d1:4d:1a:26:03:ef:c0:dc:3c:2a:51:e6:11: 42:51:91:d7:ab:5d:26:6a:71:3a:f6:3d:be:dc:9b:1e: fe:3b:94:7a:c6:a5:40:af:da:be:99:3c:5b:2d:d6:78: 06:9a:13:9a:a1:4a:fc:a8:ae:2f:66:3f:43:0a:59:41: 5a:33:dd:75:41:ac:7b:7c:b3:fe:21:4c:cf:0e:c1:03: ff:93:1d:8d:20:6d:3f:a0:7b:dc:bd:4e:ca:8b:e3:91: 1f:b9:46:ba:5e:4f:6e:ba:1b:01:56:ad:16:98:66:bd Fingerprint (SHA-256): B8:9C:A1:87:95:36:59:94:91:39:BE:D7:6E:4F:64:B8:CD:A6:17:43:79:33:A6:F9:11:E8:0C:AE:55:3F:F7:79 Fingerprint (SHA1): 58:84:54:03:05:BC:69:D6:F0:60:FF:43:6B:A9:02:B8:32:1D:03:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142898 (0x3cafa0b2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:32:23 2023 Not After : Wed Oct 18 14:32:23 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:41:6e:bc:bd:c5:ab:8e:38:1a:9b:7e:be:e4:99:d9: 35:12:e5:97:93:16:3a:98:2f:b4:ff:d8:56:06:29:49: a4:ae:95:7c:63:7a:6a:fc:1b:b7:60:12:4d:9a:d6:69: ce:eb:c6:d3:01:28:5f:33:d0:ee:f5:fd:4e:48:77:2b: 7b:fa:e2:23:65:1e:be:d1:55:03:60:49:01:86:5e:c2: 4e:01:b0:2d:db:a3:f1:aa:8e:fe:ca:eb:25:86:eb:12: 10:56:08:fb:e3:2c:db:6c:54:69:a2:be:52:9e:d3:6f: 81:69:c6:80:1c:00:2f:e2:08:9a:13:85:28:fe:02:bc: 01:97:b8:65:b3:26:34:16:ad:27:56:0f:59:97:74:3e: 8b:c9:8a:08:d4:5f:af:ce:cb:8b:2f:28:e4:dd:4d:79: e2:d2:77:42:76:af:b7:28:2f:92:a6:54:c7:be:4e:09: b3:8f:27:7b:25:4e:a3:13:09:cd:2a:06:98:67:b1:99: fb:b5:be:63:b6:26:38:b0:03:2b:b6:b4:44:35:26:d1: 2f:5c:41:12:3e:21:15:c9:a1:19:82:18:6b:ac:bf:0a: 14:68:e1:f0:da:6a:e5:7f:19:48:79:ca:c9:7e:1a:f8: c9:6b:ea:7d:c4:3e:28:03:5e:91:f6:1c:4b:2a:97:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:14:8b:c5:98:b8:4a:9b:59:26:bb:e1:d8:c2:f7:28: 8d:81:f3:72:7a:c8:04:74:52:1f:98:38:6b:28:6e:3c: 4f:d0:31:85:b6:53:c8:e6:ae:b0:19:d0:ad:21:ef:93: e7:7a:70:6e:b3:cd:e2:ac:65:89:7f:c3:a7:c7:c7:23: 96:72:7f:42:2f:44:d8:43:cf:c1:ef:da:28:c7:fd:15: 28:53:70:00:40:3b:f4:2d:21:06:2e:d4:2b:ac:67:3e: 7a:15:b1:59:fe:ce:66:16:07:27:98:9e:3f:a4:10:d1: fb:c2:bf:f9:65:33:6f:9d:ef:ed:e4:08:a1:95:5e:47: 65:c3:27:42:81:ac:e4:1e:32:64:55:26:76:52:ba:b8: 2f:da:40:19:68:94:a2:c7:b7:cd:53:79:89:b2:ab:09: 0f:06:67:e9:bf:1d:9c:f5:eb:4a:3d:32:d6:2c:1c:5a: b8:c3:26:17:78:9b:ce:b5:be:89:f6:95:b5:ea:42:89: a7:6e:a4:a9:5e:4d:64:ce:23:04:b7:92:e1:b1:7a:5f: 8f:23:bc:1a:a9:54:1e:cd:f0:ec:39:3e:67:b9:81:43: f9:78:bf:07:c5:1c:b3:1b:43:ac:0b:47:f7:96:ec:8c: dc:5d:79:40:81:16:c1:3f:7c:8e:22:4d:5a:45:a4:2a Fingerprint (SHA-256): 03:28:D1:9D:F8:F2:8E:86:34:4B:B0:6A:0C:2E:2F:19:52:16:39:72:70:D9:3B:1A:C4:4C:FF:2A:E1:37:EA:F4 Fingerprint (SHA1): 65:B1:C6:41:CC:77:E1:53:20:E7:60:46:C5:70:58:4C:A2:7B:4C:DC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 6937 at Wed Oct 18 14:32:32 UTC 2023 kill -USR1 6937 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 6937 killed at Wed Oct 18 14:32:32 UTC 2023 httpserv starting at Wed Oct 18 14:32:32 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 14:32:32 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 19273 >/dev/null 2>/dev/null httpserv with PID 19273 found at Wed Oct 18 14:32:32 UTC 2023 httpserv with PID 19273 started at Wed Oct 18 14:32:32 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142900 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142901 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018142902 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018142903 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018142904 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142901 (0x3cafa0b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:32:34 2023 Not After : Wed Oct 18 14:32:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d1:f7:59:aa:f1:7c:e0:79:a5:34:52:07:40:f3:27: e4:6b:ad:1e:93:de:8c:e7:02:68:44:b5:a6:55:74:6a: a5:38:7e:f2:a5:79:7b:5e:27:63:a3:89:8a:19:d6:73: 2c:bf:4e:3d:61:45:bf:f6:12:d9:73:9e:d7:de:f6:e7: fc:1b:15:0f:d5:e2:fa:30:aa:6f:f0:79:74:83:4f:b0: c3:e5:3f:31:89:59:3e:6e:c7:3b:f9:55:c7:e3:b3:f8: ee:47:71:22:59:bf:07:1b:b9:75:c6:f8:fe:5a:9c:4b: a2:67:be:92:2b:7b:d1:39:c7:7e:a4:c8:fe:39:c0:90: 83:cd:06:a8:0a:c6:99:0e:75:65:57:eb:24:d6:c4:2d: 50:ff:57:3f:f4:17:e2:5c:f7:fd:8c:57:22:94:9b:5a: eb:61:d6:75:a3:29:ec:ef:6e:44:c4:e5:65:71:f8:37: 4c:b7:1d:2e:40:1e:5d:bd:60:d5:de:72:f0:c5:55:00: 4d:25:bc:e4:1b:37:f8:61:3c:93:ac:22:65:30:f5:51: 32:20:bf:54:49:ba:41:56:a9:95:43:ae:a5:49:59:48: 35:9e:ba:86:f6:20:23:43:96:98:bb:61:64:6c:85:b1: 08:46:28:bc:b5:f6:5a:4c:80:9f:b1:b7:d1:88:94:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:73:d2:5f:87:8d:77:1d:41:4b:de:b4:73:a0:5d:ff: 16:b7:0d:c8:75:a4:eb:5a:b3:7d:54:df:53:63:0c:3a: 89:4f:e7:49:6a:ce:0a:4a:f9:29:2d:33:4f:2c:e9:37: 3b:1c:fb:f5:57:80:7f:2c:ae:6a:4d:73:96:b8:be:aa: 51:1f:42:c5:19:b7:95:bc:74:9a:bb:99:8b:a9:40:f3: b9:68:a8:e9:4b:f9:e9:05:82:a9:a8:54:97:f5:24:42: d4:0c:e0:c9:ee:d4:80:50:d2:f2:d1:35:22:8c:d0:33: 43:70:ff:fe:44:e0:2b:e5:10:ff:bc:96:07:03:7c:0d: bb:cd:c3:e2:04:bc:c6:c2:e1:10:11:5b:ec:5c:8e:3f: f6:ce:6b:74:67:81:40:26:32:a6:1e:17:b0:70:ed:aa: 0c:76:82:1d:36:04:d4:85:59:67:75:6b:44:12:3f:06: 48:a8:ea:0d:50:ad:ff:4e:3c:9b:2f:b4:cd:65:56:f7: 0c:ac:99:f5:c7:bd:1f:18:35:bb:b5:14:03:3d:50:84: 65:59:d4:85:9d:84:2f:2c:b9:b3:27:63:b6:90:90:04: 4f:0a:23:52:95:8d:4f:5c:59:12:19:72:bc:41:f5:f5: 79:26:f6:83:fa:0b:80:70:a5:0c:61:67:7a:cf:6e:ec Fingerprint (SHA-256): 85:37:12:10:D1:25:98:97:A8:94:1F:C0:F6:A2:A5:C0:3E:85:A3:AB:93:67:75:92:BB:9E:48:C5:C3:66:BA:61 Fingerprint (SHA1): 75:9F:22:59:B4:A3:E5:45:C3:D6:62:3F:5D:6C:32:07:6D:B9:88:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142900 (0x3cafa0b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:32:33 2023 Not After : Wed Oct 18 14:32:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:83:84:dc:f6:56:4f:5f:e2:cc:a4:62:c5:a7:72:e9: 49:a7:3d:4e:e7:f6:33:30:b4:00:b4:0c:31:de:81:b7: ad:e0:04:35:2f:ae:cc:90:c2:69:77:ae:b6:ac:3d:90: 7f:06:dc:9e:6a:92:6b:33:f5:bf:34:f1:02:8e:de:1d: 97:42:9c:70:ef:29:95:f9:37:5e:f7:d0:6f:f6:7e:51: a1:4e:5d:fb:55:ba:8c:48:73:f3:95:fc:5b:5e:7c:0d: aa:c5:55:4f:61:ef:9c:6b:9a:f2:99:e1:57:dc:be:c7: a1:f7:21:7f:a1:6d:36:d8:51:fe:5b:74:24:e3:fb:2e: b9:7a:58:eb:41:5b:09:85:21:5e:e0:87:d5:0a:f2:c4: 8c:f1:0a:1b:6d:14:45:37:e8:12:cd:5c:fc:13:e8:7a: 83:e4:e6:70:a3:38:72:5e:a0:0e:3b:44:48:f5:b1:65: a8:4b:1b:2a:08:7e:10:60:7b:ec:2f:f3:60:ae:fa:12: c6:13:f5:de:85:b0:91:8f:fa:4e:c0:27:5a:d2:8c:1e: b2:36:eb:f6:c0:43:ee:7c:bc:9d:ce:af:d1:d7:f5:89: de:15:71:dc:0f:e2:88:34:4b:29:6e:ad:0e:a0:7a:60: 18:58:5f:34:d5:9b:db:8a:4a:f8:a4:2b:7c:46:23:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:1a:34:e0:22:1e:48:f1:d0:7b:d4:fb:5c:56:ae:02: dc:27:fa:cc:4f:d6:72:e7:35:c0:eb:a6:2d:b5:fa:bf: 68:fa:6e:dc:87:19:35:24:02:a6:15:a1:ea:e2:28:11: ea:d1:1f:1d:2d:db:df:91:2d:ee:32:8a:0d:b1:84:d4: ef:32:1d:8b:1e:32:d7:45:3b:e0:71:32:fe:6e:8f:d5: 37:23:e9:52:a0:2e:7e:19:43:0b:26:dd:6d:72:5a:66: 20:8f:5a:b9:8c:95:5a:b1:e0:66:78:95:7c:08:35:a8: ab:25:f2:56:d8:62:3b:9e:9b:9e:68:61:22:2d:4b:80: a2:40:58:53:44:8a:d9:bb:3c:3a:13:6f:a4:8a:dc:83: 61:82:06:ce:ff:b2:c0:eb:a9:1b:c3:0b:36:b0:aa:9a: ce:3d:83:de:06:e2:05:fa:81:f5:85:97:09:3c:21:3f: 15:6a:d6:87:c7:ba:5a:56:87:b3:b5:d0:d2:bc:cf:f9: 4a:5e:85:bb:1f:52:b1:2f:03:b8:5a:13:10:79:21:b1: f5:9b:06:ad:4b:51:3d:3c:69:1b:f6:30:f7:cf:68:66: 5f:78:b2:28:2a:0f:6c:92:a2:a3:8e:0b:9b:8b:0d:57: 95:67:c0:26:99:98:be:f1:b1:48:f1:ca:dc:f0:e8:9a Fingerprint (SHA-256): 55:68:34:47:A1:E4:12:3E:F5:B9:1F:ED:52:65:AB:4F:BB:A9:DA:47:2E:C2:67:3A:83:95:71:B3:3D:71:1D:37 Fingerprint (SHA1): 08:41:D5:FD:57:2C:59:9F:61:ED:0B:84:14:DA:3E:F4:40:5E:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142900 (0x3cafa0b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:32:33 2023 Not After : Wed Oct 18 14:32:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:83:84:dc:f6:56:4f:5f:e2:cc:a4:62:c5:a7:72:e9: 49:a7:3d:4e:e7:f6:33:30:b4:00:b4:0c:31:de:81:b7: ad:e0:04:35:2f:ae:cc:90:c2:69:77:ae:b6:ac:3d:90: 7f:06:dc:9e:6a:92:6b:33:f5:bf:34:f1:02:8e:de:1d: 97:42:9c:70:ef:29:95:f9:37:5e:f7:d0:6f:f6:7e:51: a1:4e:5d:fb:55:ba:8c:48:73:f3:95:fc:5b:5e:7c:0d: aa:c5:55:4f:61:ef:9c:6b:9a:f2:99:e1:57:dc:be:c7: a1:f7:21:7f:a1:6d:36:d8:51:fe:5b:74:24:e3:fb:2e: b9:7a:58:eb:41:5b:09:85:21:5e:e0:87:d5:0a:f2:c4: 8c:f1:0a:1b:6d:14:45:37:e8:12:cd:5c:fc:13:e8:7a: 83:e4:e6:70:a3:38:72:5e:a0:0e:3b:44:48:f5:b1:65: a8:4b:1b:2a:08:7e:10:60:7b:ec:2f:f3:60:ae:fa:12: c6:13:f5:de:85:b0:91:8f:fa:4e:c0:27:5a:d2:8c:1e: b2:36:eb:f6:c0:43:ee:7c:bc:9d:ce:af:d1:d7:f5:89: de:15:71:dc:0f:e2:88:34:4b:29:6e:ad:0e:a0:7a:60: 18:58:5f:34:d5:9b:db:8a:4a:f8:a4:2b:7c:46:23:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:1a:34:e0:22:1e:48:f1:d0:7b:d4:fb:5c:56:ae:02: dc:27:fa:cc:4f:d6:72:e7:35:c0:eb:a6:2d:b5:fa:bf: 68:fa:6e:dc:87:19:35:24:02:a6:15:a1:ea:e2:28:11: ea:d1:1f:1d:2d:db:df:91:2d:ee:32:8a:0d:b1:84:d4: ef:32:1d:8b:1e:32:d7:45:3b:e0:71:32:fe:6e:8f:d5: 37:23:e9:52:a0:2e:7e:19:43:0b:26:dd:6d:72:5a:66: 20:8f:5a:b9:8c:95:5a:b1:e0:66:78:95:7c:08:35:a8: ab:25:f2:56:d8:62:3b:9e:9b:9e:68:61:22:2d:4b:80: a2:40:58:53:44:8a:d9:bb:3c:3a:13:6f:a4:8a:dc:83: 61:82:06:ce:ff:b2:c0:eb:a9:1b:c3:0b:36:b0:aa:9a: ce:3d:83:de:06:e2:05:fa:81:f5:85:97:09:3c:21:3f: 15:6a:d6:87:c7:ba:5a:56:87:b3:b5:d0:d2:bc:cf:f9: 4a:5e:85:bb:1f:52:b1:2f:03:b8:5a:13:10:79:21:b1: f5:9b:06:ad:4b:51:3d:3c:69:1b:f6:30:f7:cf:68:66: 5f:78:b2:28:2a:0f:6c:92:a2:a3:8e:0b:9b:8b:0d:57: 95:67:c0:26:99:98:be:f1:b1:48:f1:ca:dc:f0:e8:9a Fingerprint (SHA-256): 55:68:34:47:A1:E4:12:3E:F5:B9:1F:ED:52:65:AB:4F:BB:A9:DA:47:2E:C2:67:3A:83:95:71:B3:3D:71:1D:37 Fingerprint (SHA1): 08:41:D5:FD:57:2C:59:9F:61:ED:0B:84:14:DA:3E:F4:40:5E:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142901 (0x3cafa0b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:32:34 2023 Not After : Wed Oct 18 14:32:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d1:f7:59:aa:f1:7c:e0:79:a5:34:52:07:40:f3:27: e4:6b:ad:1e:93:de:8c:e7:02:68:44:b5:a6:55:74:6a: a5:38:7e:f2:a5:79:7b:5e:27:63:a3:89:8a:19:d6:73: 2c:bf:4e:3d:61:45:bf:f6:12:d9:73:9e:d7:de:f6:e7: fc:1b:15:0f:d5:e2:fa:30:aa:6f:f0:79:74:83:4f:b0: c3:e5:3f:31:89:59:3e:6e:c7:3b:f9:55:c7:e3:b3:f8: ee:47:71:22:59:bf:07:1b:b9:75:c6:f8:fe:5a:9c:4b: a2:67:be:92:2b:7b:d1:39:c7:7e:a4:c8:fe:39:c0:90: 83:cd:06:a8:0a:c6:99:0e:75:65:57:eb:24:d6:c4:2d: 50:ff:57:3f:f4:17:e2:5c:f7:fd:8c:57:22:94:9b:5a: eb:61:d6:75:a3:29:ec:ef:6e:44:c4:e5:65:71:f8:37: 4c:b7:1d:2e:40:1e:5d:bd:60:d5:de:72:f0:c5:55:00: 4d:25:bc:e4:1b:37:f8:61:3c:93:ac:22:65:30:f5:51: 32:20:bf:54:49:ba:41:56:a9:95:43:ae:a5:49:59:48: 35:9e:ba:86:f6:20:23:43:96:98:bb:61:64:6c:85:b1: 08:46:28:bc:b5:f6:5a:4c:80:9f:b1:b7:d1:88:94:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:73:d2:5f:87:8d:77:1d:41:4b:de:b4:73:a0:5d:ff: 16:b7:0d:c8:75:a4:eb:5a:b3:7d:54:df:53:63:0c:3a: 89:4f:e7:49:6a:ce:0a:4a:f9:29:2d:33:4f:2c:e9:37: 3b:1c:fb:f5:57:80:7f:2c:ae:6a:4d:73:96:b8:be:aa: 51:1f:42:c5:19:b7:95:bc:74:9a:bb:99:8b:a9:40:f3: b9:68:a8:e9:4b:f9:e9:05:82:a9:a8:54:97:f5:24:42: d4:0c:e0:c9:ee:d4:80:50:d2:f2:d1:35:22:8c:d0:33: 43:70:ff:fe:44:e0:2b:e5:10:ff:bc:96:07:03:7c:0d: bb:cd:c3:e2:04:bc:c6:c2:e1:10:11:5b:ec:5c:8e:3f: f6:ce:6b:74:67:81:40:26:32:a6:1e:17:b0:70:ed:aa: 0c:76:82:1d:36:04:d4:85:59:67:75:6b:44:12:3f:06: 48:a8:ea:0d:50:ad:ff:4e:3c:9b:2f:b4:cd:65:56:f7: 0c:ac:99:f5:c7:bd:1f:18:35:bb:b5:14:03:3d:50:84: 65:59:d4:85:9d:84:2f:2c:b9:b3:27:63:b6:90:90:04: 4f:0a:23:52:95:8d:4f:5c:59:12:19:72:bc:41:f5:f5: 79:26:f6:83:fa:0b:80:70:a5:0c:61:67:7a:cf:6e:ec Fingerprint (SHA-256): 85:37:12:10:D1:25:98:97:A8:94:1F:C0:F6:A2:A5:C0:3E:85:A3:AB:93:67:75:92:BB:9E:48:C5:C3:66:BA:61 Fingerprint (SHA1): 75:9F:22:59:B4:A3:E5:45:C3:D6:62:3F:5D:6C:32:07:6D:B9:88:80 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142901 (0x3cafa0b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:32:34 2023 Not After : Wed Oct 18 14:32:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d1:f7:59:aa:f1:7c:e0:79:a5:34:52:07:40:f3:27: e4:6b:ad:1e:93:de:8c:e7:02:68:44:b5:a6:55:74:6a: a5:38:7e:f2:a5:79:7b:5e:27:63:a3:89:8a:19:d6:73: 2c:bf:4e:3d:61:45:bf:f6:12:d9:73:9e:d7:de:f6:e7: fc:1b:15:0f:d5:e2:fa:30:aa:6f:f0:79:74:83:4f:b0: c3:e5:3f:31:89:59:3e:6e:c7:3b:f9:55:c7:e3:b3:f8: ee:47:71:22:59:bf:07:1b:b9:75:c6:f8:fe:5a:9c:4b: a2:67:be:92:2b:7b:d1:39:c7:7e:a4:c8:fe:39:c0:90: 83:cd:06:a8:0a:c6:99:0e:75:65:57:eb:24:d6:c4:2d: 50:ff:57:3f:f4:17:e2:5c:f7:fd:8c:57:22:94:9b:5a: eb:61:d6:75:a3:29:ec:ef:6e:44:c4:e5:65:71:f8:37: 4c:b7:1d:2e:40:1e:5d:bd:60:d5:de:72:f0:c5:55:00: 4d:25:bc:e4:1b:37:f8:61:3c:93:ac:22:65:30:f5:51: 32:20:bf:54:49:ba:41:56:a9:95:43:ae:a5:49:59:48: 35:9e:ba:86:f6:20:23:43:96:98:bb:61:64:6c:85:b1: 08:46:28:bc:b5:f6:5a:4c:80:9f:b1:b7:d1:88:94:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:73:d2:5f:87:8d:77:1d:41:4b:de:b4:73:a0:5d:ff: 16:b7:0d:c8:75:a4:eb:5a:b3:7d:54:df:53:63:0c:3a: 89:4f:e7:49:6a:ce:0a:4a:f9:29:2d:33:4f:2c:e9:37: 3b:1c:fb:f5:57:80:7f:2c:ae:6a:4d:73:96:b8:be:aa: 51:1f:42:c5:19:b7:95:bc:74:9a:bb:99:8b:a9:40:f3: b9:68:a8:e9:4b:f9:e9:05:82:a9:a8:54:97:f5:24:42: d4:0c:e0:c9:ee:d4:80:50:d2:f2:d1:35:22:8c:d0:33: 43:70:ff:fe:44:e0:2b:e5:10:ff:bc:96:07:03:7c:0d: bb:cd:c3:e2:04:bc:c6:c2:e1:10:11:5b:ec:5c:8e:3f: f6:ce:6b:74:67:81:40:26:32:a6:1e:17:b0:70:ed:aa: 0c:76:82:1d:36:04:d4:85:59:67:75:6b:44:12:3f:06: 48:a8:ea:0d:50:ad:ff:4e:3c:9b:2f:b4:cd:65:56:f7: 0c:ac:99:f5:c7:bd:1f:18:35:bb:b5:14:03:3d:50:84: 65:59:d4:85:9d:84:2f:2c:b9:b3:27:63:b6:90:90:04: 4f:0a:23:52:95:8d:4f:5c:59:12:19:72:bc:41:f5:f5: 79:26:f6:83:fa:0b:80:70:a5:0c:61:67:7a:cf:6e:ec Fingerprint (SHA-256): 85:37:12:10:D1:25:98:97:A8:94:1F:C0:F6:A2:A5:C0:3E:85:A3:AB:93:67:75:92:BB:9E:48:C5:C3:66:BA:61 Fingerprint (SHA1): 75:9F:22:59:B4:A3:E5:45:C3:D6:62:3F:5D:6C:32:07:6D:B9:88:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142901 (0x3cafa0b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:32:34 2023 Not After : Wed Oct 18 14:32:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d1:f7:59:aa:f1:7c:e0:79:a5:34:52:07:40:f3:27: e4:6b:ad:1e:93:de:8c:e7:02:68:44:b5:a6:55:74:6a: a5:38:7e:f2:a5:79:7b:5e:27:63:a3:89:8a:19:d6:73: 2c:bf:4e:3d:61:45:bf:f6:12:d9:73:9e:d7:de:f6:e7: fc:1b:15:0f:d5:e2:fa:30:aa:6f:f0:79:74:83:4f:b0: c3:e5:3f:31:89:59:3e:6e:c7:3b:f9:55:c7:e3:b3:f8: ee:47:71:22:59:bf:07:1b:b9:75:c6:f8:fe:5a:9c:4b: a2:67:be:92:2b:7b:d1:39:c7:7e:a4:c8:fe:39:c0:90: 83:cd:06:a8:0a:c6:99:0e:75:65:57:eb:24:d6:c4:2d: 50:ff:57:3f:f4:17:e2:5c:f7:fd:8c:57:22:94:9b:5a: eb:61:d6:75:a3:29:ec:ef:6e:44:c4:e5:65:71:f8:37: 4c:b7:1d:2e:40:1e:5d:bd:60:d5:de:72:f0:c5:55:00: 4d:25:bc:e4:1b:37:f8:61:3c:93:ac:22:65:30:f5:51: 32:20:bf:54:49:ba:41:56:a9:95:43:ae:a5:49:59:48: 35:9e:ba:86:f6:20:23:43:96:98:bb:61:64:6c:85:b1: 08:46:28:bc:b5:f6:5a:4c:80:9f:b1:b7:d1:88:94:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:73:d2:5f:87:8d:77:1d:41:4b:de:b4:73:a0:5d:ff: 16:b7:0d:c8:75:a4:eb:5a:b3:7d:54:df:53:63:0c:3a: 89:4f:e7:49:6a:ce:0a:4a:f9:29:2d:33:4f:2c:e9:37: 3b:1c:fb:f5:57:80:7f:2c:ae:6a:4d:73:96:b8:be:aa: 51:1f:42:c5:19:b7:95:bc:74:9a:bb:99:8b:a9:40:f3: b9:68:a8:e9:4b:f9:e9:05:82:a9:a8:54:97:f5:24:42: d4:0c:e0:c9:ee:d4:80:50:d2:f2:d1:35:22:8c:d0:33: 43:70:ff:fe:44:e0:2b:e5:10:ff:bc:96:07:03:7c:0d: bb:cd:c3:e2:04:bc:c6:c2:e1:10:11:5b:ec:5c:8e:3f: f6:ce:6b:74:67:81:40:26:32:a6:1e:17:b0:70:ed:aa: 0c:76:82:1d:36:04:d4:85:59:67:75:6b:44:12:3f:06: 48:a8:ea:0d:50:ad:ff:4e:3c:9b:2f:b4:cd:65:56:f7: 0c:ac:99:f5:c7:bd:1f:18:35:bb:b5:14:03:3d:50:84: 65:59:d4:85:9d:84:2f:2c:b9:b3:27:63:b6:90:90:04: 4f:0a:23:52:95:8d:4f:5c:59:12:19:72:bc:41:f5:f5: 79:26:f6:83:fa:0b:80:70:a5:0c:61:67:7a:cf:6e:ec Fingerprint (SHA-256): 85:37:12:10:D1:25:98:97:A8:94:1F:C0:F6:A2:A5:C0:3E:85:A3:AB:93:67:75:92:BB:9E:48:C5:C3:66:BA:61 Fingerprint (SHA1): 75:9F:22:59:B4:A3:E5:45:C3:D6:62:3F:5D:6C:32:07:6D:B9:88:80 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142900 (0x3cafa0b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:32:33 2023 Not After : Wed Oct 18 14:32:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:83:84:dc:f6:56:4f:5f:e2:cc:a4:62:c5:a7:72:e9: 49:a7:3d:4e:e7:f6:33:30:b4:00:b4:0c:31:de:81:b7: ad:e0:04:35:2f:ae:cc:90:c2:69:77:ae:b6:ac:3d:90: 7f:06:dc:9e:6a:92:6b:33:f5:bf:34:f1:02:8e:de:1d: 97:42:9c:70:ef:29:95:f9:37:5e:f7:d0:6f:f6:7e:51: a1:4e:5d:fb:55:ba:8c:48:73:f3:95:fc:5b:5e:7c:0d: aa:c5:55:4f:61:ef:9c:6b:9a:f2:99:e1:57:dc:be:c7: a1:f7:21:7f:a1:6d:36:d8:51:fe:5b:74:24:e3:fb:2e: b9:7a:58:eb:41:5b:09:85:21:5e:e0:87:d5:0a:f2:c4: 8c:f1:0a:1b:6d:14:45:37:e8:12:cd:5c:fc:13:e8:7a: 83:e4:e6:70:a3:38:72:5e:a0:0e:3b:44:48:f5:b1:65: a8:4b:1b:2a:08:7e:10:60:7b:ec:2f:f3:60:ae:fa:12: c6:13:f5:de:85:b0:91:8f:fa:4e:c0:27:5a:d2:8c:1e: b2:36:eb:f6:c0:43:ee:7c:bc:9d:ce:af:d1:d7:f5:89: de:15:71:dc:0f:e2:88:34:4b:29:6e:ad:0e:a0:7a:60: 18:58:5f:34:d5:9b:db:8a:4a:f8:a4:2b:7c:46:23:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:1a:34:e0:22:1e:48:f1:d0:7b:d4:fb:5c:56:ae:02: dc:27:fa:cc:4f:d6:72:e7:35:c0:eb:a6:2d:b5:fa:bf: 68:fa:6e:dc:87:19:35:24:02:a6:15:a1:ea:e2:28:11: ea:d1:1f:1d:2d:db:df:91:2d:ee:32:8a:0d:b1:84:d4: ef:32:1d:8b:1e:32:d7:45:3b:e0:71:32:fe:6e:8f:d5: 37:23:e9:52:a0:2e:7e:19:43:0b:26:dd:6d:72:5a:66: 20:8f:5a:b9:8c:95:5a:b1:e0:66:78:95:7c:08:35:a8: ab:25:f2:56:d8:62:3b:9e:9b:9e:68:61:22:2d:4b:80: a2:40:58:53:44:8a:d9:bb:3c:3a:13:6f:a4:8a:dc:83: 61:82:06:ce:ff:b2:c0:eb:a9:1b:c3:0b:36:b0:aa:9a: ce:3d:83:de:06:e2:05:fa:81:f5:85:97:09:3c:21:3f: 15:6a:d6:87:c7:ba:5a:56:87:b3:b5:d0:d2:bc:cf:f9: 4a:5e:85:bb:1f:52:b1:2f:03:b8:5a:13:10:79:21:b1: f5:9b:06:ad:4b:51:3d:3c:69:1b:f6:30:f7:cf:68:66: 5f:78:b2:28:2a:0f:6c:92:a2:a3:8e:0b:9b:8b:0d:57: 95:67:c0:26:99:98:be:f1:b1:48:f1:ca:dc:f0:e8:9a Fingerprint (SHA-256): 55:68:34:47:A1:E4:12:3E:F5:B9:1F:ED:52:65:AB:4F:BB:A9:DA:47:2E:C2:67:3A:83:95:71:B3:3D:71:1D:37 Fingerprint (SHA1): 08:41:D5:FD:57:2C:59:9F:61:ED:0B:84:14:DA:3E:F4:40:5E:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142900 (0x3cafa0b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:32:33 2023 Not After : Wed Oct 18 14:32:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:83:84:dc:f6:56:4f:5f:e2:cc:a4:62:c5:a7:72:e9: 49:a7:3d:4e:e7:f6:33:30:b4:00:b4:0c:31:de:81:b7: ad:e0:04:35:2f:ae:cc:90:c2:69:77:ae:b6:ac:3d:90: 7f:06:dc:9e:6a:92:6b:33:f5:bf:34:f1:02:8e:de:1d: 97:42:9c:70:ef:29:95:f9:37:5e:f7:d0:6f:f6:7e:51: a1:4e:5d:fb:55:ba:8c:48:73:f3:95:fc:5b:5e:7c:0d: aa:c5:55:4f:61:ef:9c:6b:9a:f2:99:e1:57:dc:be:c7: a1:f7:21:7f:a1:6d:36:d8:51:fe:5b:74:24:e3:fb:2e: b9:7a:58:eb:41:5b:09:85:21:5e:e0:87:d5:0a:f2:c4: 8c:f1:0a:1b:6d:14:45:37:e8:12:cd:5c:fc:13:e8:7a: 83:e4:e6:70:a3:38:72:5e:a0:0e:3b:44:48:f5:b1:65: a8:4b:1b:2a:08:7e:10:60:7b:ec:2f:f3:60:ae:fa:12: c6:13:f5:de:85:b0:91:8f:fa:4e:c0:27:5a:d2:8c:1e: b2:36:eb:f6:c0:43:ee:7c:bc:9d:ce:af:d1:d7:f5:89: de:15:71:dc:0f:e2:88:34:4b:29:6e:ad:0e:a0:7a:60: 18:58:5f:34:d5:9b:db:8a:4a:f8:a4:2b:7c:46:23:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:1a:34:e0:22:1e:48:f1:d0:7b:d4:fb:5c:56:ae:02: dc:27:fa:cc:4f:d6:72:e7:35:c0:eb:a6:2d:b5:fa:bf: 68:fa:6e:dc:87:19:35:24:02:a6:15:a1:ea:e2:28:11: ea:d1:1f:1d:2d:db:df:91:2d:ee:32:8a:0d:b1:84:d4: ef:32:1d:8b:1e:32:d7:45:3b:e0:71:32:fe:6e:8f:d5: 37:23:e9:52:a0:2e:7e:19:43:0b:26:dd:6d:72:5a:66: 20:8f:5a:b9:8c:95:5a:b1:e0:66:78:95:7c:08:35:a8: ab:25:f2:56:d8:62:3b:9e:9b:9e:68:61:22:2d:4b:80: a2:40:58:53:44:8a:d9:bb:3c:3a:13:6f:a4:8a:dc:83: 61:82:06:ce:ff:b2:c0:eb:a9:1b:c3:0b:36:b0:aa:9a: ce:3d:83:de:06:e2:05:fa:81:f5:85:97:09:3c:21:3f: 15:6a:d6:87:c7:ba:5a:56:87:b3:b5:d0:d2:bc:cf:f9: 4a:5e:85:bb:1f:52:b1:2f:03:b8:5a:13:10:79:21:b1: f5:9b:06:ad:4b:51:3d:3c:69:1b:f6:30:f7:cf:68:66: 5f:78:b2:28:2a:0f:6c:92:a2:a3:8e:0b:9b:8b:0d:57: 95:67:c0:26:99:98:be:f1:b1:48:f1:ca:dc:f0:e8:9a Fingerprint (SHA-256): 55:68:34:47:A1:E4:12:3E:F5:B9:1F:ED:52:65:AB:4F:BB:A9:DA:47:2E:C2:67:3A:83:95:71:B3:3D:71:1D:37 Fingerprint (SHA1): 08:41:D5:FD:57:2C:59:9F:61:ED:0B:84:14:DA:3E:F4:40:5E:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142905 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142906 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142907 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142908 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142909 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142910 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142911 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142912 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142913 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018142914 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018142915 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018142916 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018142917 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018142918 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018142919 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018142920 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018142921 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018142922 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018142923 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018142924 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018142925 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018142926 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142927 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142905 (0x3cafa0b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:32:42 2023 Not After : Wed Oct 18 14:32:42 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:ce:f3:cc:2d:73:6f:bc:28:37:2a:f4:5a:67:40:b4: 53:7e:40:9a:67:4e:a8:6c:d2:19:c2:26:09:66:00:3f: 72:ec:6e:fd:be:59:8b:39:79:8e:6b:3e:84:99:e2:fa: 81:cf:e8:c9:a8:05:58:fb:ff:21:aa:09:bc:0e:63:b7: 8d:80:5e:81:de:61:d3:4a:d8:d3:5f:3e:cd:48:53:f1: 39:3e:5e:00:51:11:85:8b:42:4d:b9:2a:8a:3c:63:b4: 61:49:60:b8:23:a6:e8:a3:27:c6:37:87:91:cc:75:42: 8a:6f:e0:9c:bb:98:34:84:da:05:c7:dd:d2:ca:8d:99: 49:5f:73:d9:d6:52:f8:79:3f:a8:74:86:c8:73:6d:ac: 3b:31:2a:c7:29:7a:19:44:85:58:c7:ee:66:d0:ba:aa: c2:f5:92:be:9b:96:2f:05:09:5e:1c:4d:d0:e3:fe:6f: 30:cd:f5:67:ec:54:8d:54:3a:8b:ad:ff:d2:f8:5d:62: 12:c4:f0:60:ec:bf:6b:d3:4f:4a:5c:f2:03:82:34:e0: 74:25:2a:14:77:83:5d:17:84:96:78:d9:59:1b:51:e6: 18:9f:86:e6:cc:ac:3b:aa:f2:c6:a5:6b:bc:7d:4c:53: d4:c0:c8:96:a9:fc:59:5e:b8:23:d0:ea:11:ff:36:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:e8:5c:cc:97:80:35:2a:7d:eb:8c:4a:cc:77:6d:04: 1f:4f:8a:3e:26:da:34:5b:d9:1e:29:31:18:d3:d1:4a: 46:a2:62:05:09:f0:3d:e3:15:4e:4d:0a:c6:cc:36:1c: 95:28:db:f6:cd:c0:35:34:25:52:fe:56:c9:3b:d9:86: 7c:c1:e1:0d:5d:71:91:18:89:95:2f:72:ac:21:a2:ee: 8b:1f:1e:6d:82:d0:ad:fe:19:79:05:33:26:51:42:38: f8:73:bc:25:3c:96:94:22:fb:5a:1f:2d:95:42:c5:6f: 42:13:24:d8:28:4c:20:15:c4:d6:c8:71:a1:f6:1c:ac: 79:d9:e0:b8:f9:b9:65:b7:61:b3:38:f2:f8:0d:45:d3: 23:16:77:a0:27:b5:1c:f4:2c:5c:94:a3:9a:17:8c:f8: 38:f7:cf:44:59:bc:ce:a7:f9:4c:b6:cf:57:98:de:e6: e2:47:3f:14:8b:0b:f7:22:bf:2b:66:f6:d3:01:2b:27: 0d:ce:aa:35:7c:d6:39:f6:c5:14:2d:2f:1e:2a:03:9a: f9:f4:43:41:c1:a6:38:a4:a7:76:1a:38:c0:0f:f3:f9: c6:b6:9c:61:3d:af:18:46:b6:37:a0:83:3b:7f:f1:8e: d1:ed:6d:32:bf:c9:a5:26:58:78:90:d6:cf:9d:ea:42 Fingerprint (SHA-256): D4:28:8B:9D:79:05:15:B4:9B:B9:C4:28:75:83:92:C1:F8:B8:7F:53:54:0E:96:31:B9:82:D3:51:86:1C:37:3F Fingerprint (SHA1): 70:13:01:FC:90:3E:82:CA:81:7B:1E:2C:DB:57:72:5B:6F:A9:DE:58 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142906 (0x3cafa0ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:32:43 2023 Not After : Wed Oct 18 14:32:43 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:f2:94:28:ba:00:3b:c1:17:e9:ba:b5:05:c7:bd:37: b0:1f:fe:14:c8:72:0b:8a:36:c5:53:41:e6:37:d1:56: 11:a9:3a:9a:00:10:db:07:4b:d8:19:23:b6:66:37:d8: e1:39:41:43:fd:ad:02:ca:76:cd:86:ae:af:aa:95:85: ce:62:fa:6f:d9:65:f7:fd:be:51:c2:26:a7:44:26:0b: 65:69:fb:d0:e9:58:93:42:8a:30:b1:22:3c:68:59:46: 00:bf:cd:5d:56:f4:ff:49:25:bd:66:7d:71:79:20:b8: 71:77:81:42:9f:17:e4:44:ff:d1:f8:f8:cd:9c:2c:e7: 43:7f:89:d6:3f:71:57:94:e1:e6:9e:b1:70:e6:be:a2: 9e:ae:9a:0a:cb:1d:3b:0e:29:28:f9:52:5e:0a:43:2c: fa:f8:fc:d6:10:ad:77:d9:ff:cb:52:67:54:44:3b:4f: b4:59:68:ac:da:57:8a:fb:78:b5:6f:c5:b5:e5:00:74: 0c:85:a9:3a:92:05:da:d2:f8:06:59:31:71:4c:29:8b: 33:e2:36:16:31:d7:bc:da:25:f0:d1:0e:a6:51:1d:b2: 18:20:19:83:f9:0b:fd:4e:50:ed:74:66:5f:d5:ce:78: 78:15:10:e2:ee:39:75:26:40:c8:d1:5c:d6:a8:37:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:cc:c4:57:c7:07:63:b1:7b:a2:d3:34:cb:77:d3:3d: 04:5c:7b:de:f0:46:a0:38:6c:4d:b3:f1:cd:57:30:2a: d6:9f:cd:d6:71:d3:22:07:3e:ea:be:c1:96:68:00:0c: 9e:3d:a1:aa:27:0f:99:e1:a0:c7:e9:a5:61:08:85:a1: 33:d0:22:2a:d9:6c:4c:29:e7:77:f2:3b:de:aa:bf:75: e3:21:d3:25:ed:da:bc:2e:86:ef:9e:83:32:6a:38:ec: 10:59:98:d6:15:22:ac:5c:eb:d4:69:99:5d:f3:5d:17: bd:67:fe:50:b2:88:bf:a3:51:9e:ca:e3:f0:8c:2c:d0: f6:6d:7d:49:d5:16:2a:e9:a0:ad:4e:3b:a5:d3:14:9c: b8:f7:73:16:4f:4f:91:ec:68:9b:d7:1d:f2:80:a1:e3: 3d:dd:ac:b6:cb:38:23:e5:eb:32:65:19:b7:10:eb:d5: 82:76:2b:ed:bf:3e:d9:e0:43:86:77:a2:e6:22:fe:23: ea:37:e5:92:5c:42:bc:30:a6:c8:3c:6c:be:68:4b:88: 6b:ef:ca:07:22:95:59:50:50:cc:6a:79:79:79:f3:ea: 2e:a7:e3:ed:d6:88:ab:bd:18:83:d2:5a:b7:73:f2:ed: 67:a5:d4:92:aa:71:06:0a:0d:0f:59:c2:c5:0b:4f:ac Fingerprint (SHA-256): D6:4A:54:28:77:17:05:2F:C6:D8:D9:16:54:4B:8D:9A:48:43:CB:57:84:23:C8:C0:EB:E1:0F:F5:95:BD:5B:15 Fingerprint (SHA1): 59:DA:6D:5F:17:11:A4:B1:93:22:7B:86:FC:7C:34:01:D8:4F:B1:C5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142907 (0x3cafa0bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:32:44 2023 Not After : Wed Oct 18 14:32:44 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:3d:97:ab:98:4f:37:ac:d0:ae:db:93:8f:3f:7a:3e: 0b:f3:96:8c:c8:7a:ff:69:5c:22:72:5f:6d:ce:e8:ce: fe:5d:51:de:48:01:d1:50:6e:f4:ab:3e:c3:86:c4:f0: c2:b0:9a:14:a3:ad:d7:9a:7a:bb:2c:84:80:29:64:37: 6f:77:ab:0b:ca:77:fe:1f:04:af:cd:fe:83:24:54:75: 3b:49:83:bf:f5:b0:c3:c9:6b:ce:cc:38:2c:3e:6c:87: 6d:02:cd:96:64:cd:d3:00:3b:a5:5c:12:0d:f3:55:35: 7e:07:ef:49:e1:b1:cb:12:0e:99:13:05:70:f0:35:75: 71:57:a8:6b:c2:ec:73:0a:14:e2:39:72:c9:d3:24:7d: 9e:35:ed:c7:57:6d:0e:18:c7:e5:b5:c0:9e:6b:d8:43: a7:eb:8f:3b:14:0c:b4:77:06:7a:eb:8e:6a:0a:1c:d1: 87:9d:8e:a8:8e:f2:94:fe:6f:50:f7:70:6d:c0:72:e4: 4e:bd:72:89:ed:e1:79:27:f8:d9:be:8e:73:75:33:3a: 8a:5c:bc:3a:e3:86:18:fb:98:91:52:97:b5:cb:7a:df: c1:61:cc:08:b4:28:a1:1e:07:32:4c:e2:6a:17:60:ec: b0:a4:1c:32:ce:81:13:0b:ea:f6:75:27:37:2e:1e:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:6f:e6:2a:e8:5c:23:62:45:8a:61:68:d4:0d:81:5b: 00:14:8e:5e:f2:6c:d2:b5:b1:70:61:f8:ea:2f:c6:19: d5:e4:b6:10:f1:31:d2:64:0a:ff:d2:46:84:4b:9d:9a: 4e:10:38:eb:e4:a6:b2:af:4d:29:93:8e:76:35:4f:5b: c6:c9:1a:47:25:bb:7d:b3:25:03:71:ec:e0:6f:2c:9e: 95:94:d8:c0:f0:7f:af:de:4b:ae:fa:83:b2:95:34:78: 3b:f3:e5:c8:40:de:4b:e6:8b:b3:0d:6e:40:d9:1e:df: 78:79:b5:49:b9:87:2f:42:45:77:14:40:cf:7d:86:0e: 1a:0a:8b:c9:a9:3a:f5:e5:5c:a0:26:6e:87:8b:a7:55: 2c:d0:ed:2e:d4:72:0e:2c:90:69:c2:05:32:9e:e0:fb: 63:9b:e7:b9:51:09:1b:16:2f:b1:e0:26:e3:64:95:fb: 3a:e0:ed:14:76:64:0f:ec:aa:b5:67:b4:f5:ba:5a:62: 8e:a2:78:ab:08:de:d0:b0:c4:b1:76:32:3d:e2:f9:c7: 8e:da:9e:69:3d:b4:f4:80:ed:29:87:4e:87:64:86:8a: 4d:c8:02:ab:73:bc:c5:0e:bf:59:e2:ce:67:8f:54:aa: 61:bc:6c:37:c9:36:93:64:d6:23:bf:4f:1e:bc:e5:7b Fingerprint (SHA-256): 66:72:DE:64:DA:67:E8:FB:4C:0E:DD:3E:E4:47:74:0D:D4:92:D5:7E:05:87:4E:FB:B7:FA:C8:5E:12:E7:0C:94 Fingerprint (SHA1): 99:9C:6D:70:D6:E5:06:05:C6:04:7A:16:6A:01:31:C0:0D:CC:DF:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142908 (0x3cafa0bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:32:45 2023 Not After : Wed Oct 18 14:32:45 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:99:0d:d7:66:11:2d:8c:02:b0:5c:df:70:2b:30:04: 9c:43:12:17:73:66:b8:39:91:c9:33:13:23:34:86:3f: 2f:1b:73:c8:51:78:af:b6:ff:34:8f:fe:c2:ab:9d:01: 3d:fc:08:72:6a:be:f4:6c:b3:22:99:b3:b0:a3:a3:dd: 7f:4b:0f:a8:39:ac:8e:12:e0:ff:b7:0a:65:89:6e:b9: bd:31:d9:13:7e:b0:65:de:61:4c:ec:8f:60:3c:6c:cb: 90:3d:20:04:ce:6f:7f:3a:8a:ce:61:91:ba:df:f0:58: f5:c3:69:30:a8:7d:dc:74:5b:86:2d:f9:08:e6:ee:c9: 43:3f:16:0e:74:2b:2c:fd:f0:99:7f:5f:3b:80:d4:48: 87:96:ab:66:48:48:24:41:11:c9:a2:f7:c6:f1:b3:cd: c8:35:df:e5:7d:01:9b:bc:d3:27:bb:41:7f:8a:fc:d8: 21:21:b4:4a:28:a2:78:9a:79:aa:bd:93:d0:8c:97:5a: 45:39:3b:e8:dc:09:6e:10:62:3a:1c:cd:39:eb:42:c9: f4:0a:aa:75:22:5d:61:72:fb:fd:2c:9e:43:18:6a:f0: 49:8d:72:8f:35:a4:47:56:52:65:bf:0e:d3:87:41:2b: 63:da:0a:d6:ec:ec:24:9e:4b:40:80:89:cf:0d:58:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:6b:35:26:fb:a8:65:12:14:18:1e:fa:53:5c:b7:35: d1:8c:77:b0:b3:c3:d3:fe:8e:04:9a:29:c5:18:2e:bd: df:e1:17:9e:a8:ff:1e:a3:2d:cf:2c:e7:ea:43:d7:2d: 81:e2:43:4c:7b:1b:9c:8f:9b:00:e8:87:64:34:de:0b: 3e:68:be:37:ec:0a:f7:bc:07:2f:b7:57:4c:21:e8:5c: a4:c5:1d:d2:26:5d:73:9d:14:e3:90:91:d1:c7:37:f3: fc:25:17:a5:fe:2b:dd:df:4d:72:6e:01:2b:e2:9a:3a: 28:48:21:f3:8c:5b:ff:7c:ac:15:a9:95:e6:a4:53:45: 71:be:33:be:e0:e0:2d:3a:44:f6:f8:c7:ea:0e:a3:e7: 0e:98:18:48:0a:c2:3e:b1:c1:f2:b6:22:51:98:d8:43: c5:c9:c0:a4:fe:e5:b6:f2:45:2d:4f:af:9d:5b:55:b2: 0f:25:7f:78:38:e9:56:b4:4d:b3:25:7b:f7:bf:a3:f7: 30:00:cc:0c:78:16:eb:6d:fc:70:47:f9:50:b6:27:48: f3:43:5b:24:85:55:55:8e:de:5c:28:2b:a9:f8:1a:6f: 57:cb:2b:10:80:94:06:84:b1:15:6a:4c:47:1d:4a:d7: 46:74:20:9c:d2:62:7c:44:c3:74:27:7b:4f:f3:57:4c Fingerprint (SHA-256): A6:57:CC:AD:86:0F:83:06:A1:F5:AB:2A:E7:2B:AE:ED:21:23:F4:F7:88:96:7A:93:E4:1C:F3:D5:59:8E:37:A2 Fingerprint (SHA1): 3A:C5:81:6A:1D:F7:D9:94:D8:C7:99:37:48:C5:FB:19:EE:95:83:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142909 (0x3cafa0bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:32:46 2023 Not After : Wed Oct 18 14:32:46 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:fb:d9:31:bb:5b:88:eb:eb:45:ad:2d:1c:70:4a:52: 53:67:6f:cd:e3:07:14:cb:77:8c:c3:07:f6:d9:b1:b1: 73:99:0f:ec:44:f5:58:b3:86:75:64:7d:29:99:ed:c5: a9:6c:b1:cb:90:a5:56:db:4d:75:73:33:2b:8c:bf:30: 37:fc:8f:50:41:4a:32:4e:11:79:f9:27:85:42:d3:a7: 79:a5:cf:ab:1c:71:64:3a:93:4a:aa:21:78:69:e7:0a: e6:b2:72:8c:9e:22:e9:95:77:0f:7c:d7:88:8b:7d:05: 79:c2:51:6e:c0:23:85:0e:5d:c3:6b:6d:bc:9d:27:9f: 7a:22:34:24:82:d4:a2:26:90:91:3a:dc:66:b4:96:6c: 75:62:6e:a3:d4:69:60:e4:04:36:1a:de:a5:aa:98:20: dd:49:c2:9c:81:f7:38:6d:57:73:26:a4:42:27:8d:7d: 54:7f:17:fa:98:de:8f:ff:ed:88:f3:3d:53:6c:d9:a5: 5e:e5:05:dd:57:bf:3d:81:ee:c5:a2:d4:b6:a4:7f:bd: dc:53:a2:98:ce:71:07:d8:b4:27:4b:62:d8:22:ec:3c: fd:b4:d4:3b:5a:b5:c4:7c:ff:3e:ab:86:27:b6:47:7b: 68:f6:d5:d3:56:0a:c7:50:c0:29:6e:c0:a6:ca:0b:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:ed:bb:7b:15:29:a4:b2:df:51:55:e6:74:ea:a3:f7: a8:cd:85:52:1b:15:b4:12:d4:4b:62:08:42:20:83:cb: d8:f7:6c:15:49:b7:5c:fe:b5:ec:80:79:b0:74:a2:8b: 44:91:a2:8f:42:4b:d8:7f:dd:b1:76:e6:a1:cd:15:5f: 79:b9:e3:fd:c6:49:0f:9f:b6:1a:0f:08:c9:27:43:62: e4:86:e3:54:31:28:04:e6:9e:88:16:ef:00:64:25:df: 63:b4:19:71:36:64:5d:6a:c2:e4:e7:c8:fb:b7:07:4c: b5:16:a7:e1:52:74:d2:cd:e2:c2:df:ce:34:61:bd:8d: 8f:ff:28:2f:b8:55:c5:0f:d1:24:c3:ed:93:6a:6f:e7: 75:3e:b8:0e:b4:2e:3b:1e:e1:b4:57:8d:3d:08:18:08: c8:26:82:d9:22:b0:09:f4:db:c8:d8:4b:8e:98:1f:89: a0:1f:cc:2f:1b:6b:bc:29:76:3b:ed:0e:d7:61:f2:6f: b3:d8:f1:73:49:34:cb:ee:8e:97:2c:4c:05:b5:7c:12: 86:01:44:b4:76:92:ce:c9:3b:eb:e4:00:0a:dc:0d:a5: d0:78:ff:0f:0f:23:1b:46:2b:1d:d1:1b:b0:19:96:6b: 32:42:01:d3:0a:31:b3:2a:6f:7c:8f:5b:b5:4b:c1:e4 Fingerprint (SHA-256): 16:1C:41:D8:52:32:DF:0D:2F:48:BE:FB:59:84:75:C8:A5:AD:9C:9C:CE:58:F7:BE:16:BE:A8:E3:30:AC:8B:49 Fingerprint (SHA1): 1E:AA:27:17:E9:63:E6:60:79:FF:8A:47:C2:EC:C5:8E:7F:DF:6D:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142910 (0x3cafa0be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:32:48 2023 Not After : Wed Oct 18 14:32:48 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:33:fa:2d:1a:4a:5a:fc:ce:d9:76:f8:60:01:d8:8f: 39:b2:d9:cb:0d:97:b4:af:fd:21:03:c3:1e:60:9d:1d: c5:d0:13:d6:76:26:44:e0:0d:1b:73:3c:fc:55:91:c2: 55:b1:b2:a3:53:62:e8:06:27:d8:22:b2:68:13:9c:4b: 5c:31:38:ff:0d:dd:36:95:fe:99:cc:f9:18:eb:c3:10: d7:6c:f8:cc:fc:28:b3:ca:a1:1d:96:33:3c:87:2f:f9: 9d:53:fa:86:9b:48:71:51:ae:0a:0c:5e:75:19:11:ff: 0a:f1:82:81:a2:52:02:a4:bc:a1:76:72:7d:8e:b5:a1: 81:40:fe:2a:00:9c:8e:ce:d1:11:e6:80:42:df:cf:c2: 49:ac:58:b0:c5:2f:63:7b:bc:a3:e8:db:fe:e7:1c:29: 91:13:98:7c:22:81:e6:bf:74:08:db:98:6b:9a:5a:f9: 5e:3d:c4:95:ee:64:c0:e5:83:a4:e3:ee:ff:47:9f:ba: b1:e0:a6:f1:c4:dd:e2:97:32:7e:12:d2:90:cc:f9:70: 39:7a:31:48:eb:d0:7a:1a:f9:42:9d:c1:b8:a7:5b:05: 0c:39:31:5d:eb:24:66:a0:f4:87:8b:26:68:e2:e5:ac: 88:6e:33:5c:aa:c1:e4:42:d3:3f:6d:29:7b:9f:65:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:8a:82:04:55:d9:b4:13:a1:aa:5f:e5:53:2a:28:b0: 9b:81:cc:2d:e5:e2:e4:43:d2:dc:70:83:0e:5a:9c:a5: bd:e0:74:c4:3f:d7:97:82:11:d6:18:3c:c3:69:3b:f3: 34:80:d9:05:e3:62:cd:f4:be:2a:86:1e:1d:c4:cf:17: f8:85:d9:27:74:01:17:51:02:3c:60:49:4d:a1:6f:af: bc:30:32:96:e6:f1:d7:90:d5:06:d0:c2:18:8d:e7:9a: 29:72:3a:97:5e:b3:28:86:67:fa:24:a6:fd:fa:94:1a: a9:d4:b9:15:17:1e:8f:4b:2c:0e:be:36:a7:98:6d:29: 0d:18:db:79:f9:2e:65:c7:1a:dd:c0:91:1c:43:ed:24: 81:86:cd:6d:65:d5:8f:8c:18:eb:c3:c6:80:a4:70:12: 22:75:3d:e1:7a:98:60:2d:92:a5:35:dc:55:bd:18:4a: ac:91:3a:0c:ad:13:65:fa:e6:6b:ab:4c:7d:1d:c0:8b: 04:e9:69:66:92:64:dc:85:d2:4f:bf:d6:97:75:62:9f: 2f:c7:ed:dc:8b:d5:b7:9a:07:6e:e2:3b:0d:86:78:8a: b7:ec:a3:0c:7b:b7:a0:dc:54:55:19:31:f5:1c:b4:c7: 24:b1:92:e5:01:c1:98:a7:e9:43:36:e4:af:4b:82:f9 Fingerprint (SHA-256): 5C:A4:C0:61:9D:B1:0C:29:F9:62:FC:FD:6C:AF:F1:3B:6C:97:08:BE:8D:29:A1:4B:79:F2:1E:C3:64:87:81:1B Fingerprint (SHA1): 18:8D:25:89:A8:17:C2:BC:6C:6A:37:E3:3D:DE:7B:C6:E6:04:D6:DC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142911 (0x3cafa0bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:32:48 2023 Not After : Wed Oct 18 14:32:48 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:17:cf:50:12:c9:16:f3:24:06:6f:c1:96:0f:a5:21: 6e:18:10:fd:72:72:70:4e:c2:d8:02:5a:28:0f:63:24: 44:c4:05:e0:77:43:41:52:08:e7:aa:d5:04:49:ee:91: ea:fd:ab:6e:05:4a:83:82:0e:84:ec:21:ef:00:10:bc: 33:1f:d6:3d:20:48:0f:e6:7c:3b:8b:38:11:24:d5:64: fd:75:ab:23:72:5c:f1:42:9d:aa:2e:e7:66:09:9d:00: ff:f9:29:c0:84:e9:9c:95:b6:9f:5c:65:ad:77:15:82: a5:5e:c3:d1:c2:9b:90:3a:43:62:92:82:67:cb:20:f2: 61:5d:a8:fa:f5:38:24:3f:87:03:99:ee:a5:3e:28:86: 19:09:42:c9:6a:88:03:a4:a2:f2:f8:fa:3e:c5:3d:72: f2:13:97:c9:d4:67:f5:72:d2:de:a8:2c:69:fc:bd:3b: 3d:07:91:d3:21:7a:b2:05:09:b6:c6:c5:a6:62:2c:83: 61:a7:39:09:1b:c4:72:2b:e9:90:a1:78:ee:68:97:e7: 2e:4a:b9:b6:df:05:e0:ff:5c:de:3c:6f:c4:79:41:79: 7a:0f:23:bb:b8:62:1b:17:f8:78:30:a4:fe:df:5d:4b: c4:54:a2:9e:c8:04:df:df:1c:aa:43:56:bd:c8:37:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:a0:c9:ce:38:48:a6:49:76:d3:31:17:15:d4:d6:92: fc:ed:d8:d0:b5:72:f5:3d:eb:90:06:7a:1f:6a:3b:6b: 5f:53:6a:37:20:0f:b1:50:62:d3:29:af:3d:c7:34:b3: 73:7e:50:4d:9c:02:de:ac:09:fd:02:8b:50:64:d9:a9: 28:16:9b:13:5a:d5:3d:10:42:b1:9f:c4:4a:3f:2c:fe: 13:22:38:4b:6c:b0:a5:d0:54:08:ae:66:ca:4c:99:a1: 27:c6:11:1b:ce:65:c8:b6:79:92:c8:4e:99:2d:bd:2e: ad:c6:62:ce:34:67:0e:3c:91:85:a8:e7:eb:e4:81:08: 1e:03:8b:3f:60:de:2e:74:b2:94:34:4f:30:dc:fd:e0: d9:0e:0c:7a:3d:4c:54:80:a6:c5:9a:94:9e:0c:98:ae: 65:81:5d:43:53:c5:31:c3:8d:9d:29:33:6f:a9:45:f0: 80:15:ea:5f:53:19:21:a4:74:0f:67:ad:5b:bf:74:11: 1e:78:1a:95:51:56:66:40:c7:c9:8e:9a:d2:ce:44:ed: 9e:20:51:9f:35:c3:68:42:63:a1:a9:ae:45:11:5c:05: 05:08:4a:65:5d:31:80:fe:c3:a2:ef:91:6e:c1:36:ed: c0:d2:50:71:88:e6:4b:a0:87:8a:23:68:6d:90:6b:10 Fingerprint (SHA-256): 98:AE:FC:B3:02:1B:B8:6F:E0:B5:6F:C1:A8:90:BA:3A:38:3B:BA:0A:17:E9:BD:17:2F:42:96:E2:2F:E2:24:FF Fingerprint (SHA1): A4:CC:B9:ED:ED:28:06:FB:0E:E6:7F:54:60:68:56:52:92:60:45:20 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142912 (0x3cafa0c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:32:49 2023 Not After : Wed Oct 18 14:32:49 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:65:f5:57:f3:6f:b9:bf:ab:73:01:e9:17:a3:06:8f: e6:a0:f6:d0:99:53:1f:1c:92:82:cd:be:03:ff:e7:9c: d7:9c:f5:fc:35:53:98:53:25:eb:0c:9d:35:52:8c:87: 2c:ac:e6:f1:3f:05:e6:bc:02:82:4f:2b:f7:9e:50:31: 8b:60:d1:d2:cd:97:78:96:8a:1f:a4:e9:c8:34:c5:7d: 93:9c:18:37:0b:8e:1a:2e:84:5e:a0:7b:35:d3:77:0d: 08:a1:1b:f8:16:1f:90:d2:aa:c6:95:76:ac:d7:dd:aa: e8:47:b6:51:10:15:bd:98:53:80:86:79:b6:e3:49:08: 52:fa:ef:1c:12:3c:5b:4a:f8:b2:f1:50:73:b5:67:36: 82:5d:83:f6:01:94:35:42:b1:35:ac:ef:0f:f9:5a:34: 04:06:02:8e:70:e2:1f:a1:85:9b:fa:1b:f4:ba:ac:ad: d9:be:e3:00:dd:d0:8b:ad:e9:db:22:b8:7f:41:91:e2: 0c:9c:39:35:be:2b:71:f1:38:ee:4f:98:57:ce:00:74: ff:c7:05:a7:41:77:0b:8d:78:c0:70:1a:53:b6:7e:3d: 55:cf:02:e1:00:d8:5c:45:b9:06:cf:b9:2b:b2:1c:3c: 91:cd:59:aa:ca:5b:50:34:55:3b:fa:94:fd:0b:a4:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:ff:e8:15:58:72:a2:3b:1d:cb:50:67:74:f3:b9:43: ac:a0:29:52:f6:33:d6:33:a0:1e:da:97:aa:95:84:26: 33:a5:33:aa:d2:cf:af:d9:33:41:26:00:4f:45:85:eb: 99:29:9c:7b:09:89:06:bc:cb:ae:d3:c7:00:ec:7b:38: c2:b9:3a:a3:f3:8a:e2:d8:c6:63:3c:86:2e:4a:41:e7: e0:64:59:3f:42:28:ba:cb:db:06:52:7f:7a:c9:4c:7f: e8:99:ca:ee:10:17:63:8f:d2:fe:ae:ac:f6:2c:12:f3: 0f:1b:87:0b:14:c9:b1:bc:d3:5d:84:d3:28:4d:d8:0e: 54:11:3f:0e:3b:f9:b8:b1:6f:9d:0b:04:05:5e:0a:ff: d1:55:da:27:f9:57:97:ce:29:37:b1:3d:d2:21:cd:27: 81:9f:fa:52:fb:c3:94:cf:b0:a2:2c:e3:36:89:6c:7b: 10:50:3c:db:18:38:e4:b9:a8:ec:38:89:b9:b5:81:c4: 25:36:9a:39:43:e4:e3:b2:97:8c:ad:41:ba:f5:fc:31: 45:10:71:53:81:d3:3e:1c:53:70:d0:b6:2a:0d:67:d0: a5:44:a7:eb:be:6d:b1:5a:da:ef:54:ae:d4:84:39:35: 1c:52:c3:da:e9:1c:c1:18:e8:53:75:57:c0:59:4f:5f Fingerprint (SHA-256): 01:AA:82:D7:AE:67:0E:37:71:8D:F5:9C:E2:BC:CB:11:FB:A7:39:A2:31:74:D8:64:18:4E:24:E4:48:86:49:44 Fingerprint (SHA1): BD:24:45:FA:E8:2B:A1:EC:72:8D:64:37:13:68:3C:36:86:86:FE:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142913 (0x3cafa0c1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:32:50 2023 Not After : Wed Oct 18 14:32:50 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:b0:b4:98:8b:6f:2a:cf:8b:fb:89:3f:eb:97:f2:45: b5:78:dc:3a:fe:bb:cf:73:db:39:65:85:83:d4:c8:a9: 9f:3e:ae:06:db:85:26:70:56:32:83:f5:ba:9a:6f:a5: 6b:0a:c5:38:95:2d:60:0a:d1:b0:e0:0b:8c:52:1a:3a: 6f:7f:8d:f1:ab:cf:e9:65:49:7c:91:07:a7:20:e1:f4: 37:10:9a:f3:65:cd:61:4d:a6:ae:4c:48:dd:59:2f:b9: 54:b9:4d:4e:e4:37:3b:9f:91:1a:f8:5b:52:fc:36:95: 71:36:5c:95:00:7e:49:9c:76:2a:d9:35:b0:1e:21:a4: 7c:58:fb:bb:ed:df:d8:49:31:ec:89:97:19:dd:10:66: 80:71:a3:e4:55:e3:99:0e:90:c5:c4:c5:28:75:24:3d: e7:42:13:77:be:cd:2c:9c:30:d8:55:e8:d6:38:48:c3: 7d:80:d5:71:50:79:c3:5d:6e:6c:7b:d3:6e:fc:ca:96: 0b:97:fd:44:b6:f2:67:a6:13:8f:36:ec:e1:0f:5a:21: 43:05:26:e6:37:68:50:c4:95:55:76:0c:6f:da:d1:07: 2a:d2:4c:f6:b1:9e:d2:43:73:d5:9e:77:a7:32:84:f1: 4a:01:25:1f:dd:cb:51:43:49:23:ae:4a:61:db:27:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:65:d6:2e:d5:5a:db:7e:29:1e:5b:ca:9a:93:04:7d: 26:c1:22:68:cc:3e:0b:24:cf:f1:07:38:bb:df:e0:0f: 85:43:a4:75:2f:5b:5f:bf:02:08:45:65:5b:4a:65:af: f1:99:15:14:41:f7:7d:8b:34:70:f5:8f:bb:70:e1:9d: 83:2d:f6:f0:7f:a9:96:53:ca:6e:aa:77:a8:6e:24:59: a2:76:0a:cd:69:d6:20:33:0d:1f:3f:64:10:d7:50:b4: b9:2b:78:8d:25:55:be:f1:f3:36:ed:4e:36:dd:13:2a: ee:19:78:39:3e:87:1a:11:5f:92:3a:4f:c1:72:27:03: 3e:51:8b:90:70:a3:9c:79:1a:fe:74:bb:1d:7c:d1:4c: 1b:0d:3b:06:b0:60:49:77:49:cb:d3:60:a0:15:a4:ff: 5a:91:79:50:30:84:63:bf:82:4f:d5:98:f7:bb:f6:45: 4e:61:91:85:12:c9:aa:62:c7:b7:f6:d0:b8:9e:e3:61: 5f:4f:af:c9:74:f6:3c:39:4f:8b:43:d5:a4:16:de:76: 36:56:28:16:b0:19:87:a7:7e:dd:f0:15:41:33:47:28: f4:3c:34:5d:6b:67:88:e5:6a:88:46:c2:4b:e6:db:1f: cd:b4:dc:1e:ab:89:73:42:c2:1c:9e:43:0c:15:0b:83 Fingerprint (SHA-256): 58:4E:F2:3C:1A:F9:0C:0E:99:FA:26:3B:12:83:52:8C:A4:88:6C:A9:72:F1:0F:88:C0:69:FB:08:95:3B:4E:6A Fingerprint (SHA1): FE:CB:38:84:17:6B:75:2A:AE:F5:A8:A7:95:B8:AB:47:47:C4:08:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142928 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142929 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142930 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142931 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142928 (0x3cafa0d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:03 2023 Not After : Wed Oct 18 14:33:03 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ba:89:1b:fd:52:e9:5d:62:86:ae:42:4a:ef:09:95: a9:e8:b3:7a:0b:ef:8f:89:41:30:9d:59:32:c9:90:dc: 82:b2:09:65:83:82:32:1b:b8:53:db:c7:76:e5:ae:6b: ec:e1:53:d4:4c:c0:19:1f:c9:40:60:8a:73:18:ba:7d: dd:e6:11:39:90:86:bf:f5:10:82:71:e5:86:b0:57:44: ee:3c:de:07:03:13:15:70:87:b3:f5:3f:ff:26:75:c1: 94:8c:76:a3:ee:e6:2a:eb:89:91:38:53:b4:79:cd:33: 24:62:c6:d8:a6:d9:83:55:7f:cc:3c:00:01:77:14:44: cc:9d:82:2a:18:ee:55:a9:17:c4:ad:89:be:8a:83:12: 90:2a:4c:db:6e:fd:38:2f:c5:83:a5:30:c9:09:45:0c: 47:4d:b1:69:4d:24:aa:ed:ec:54:60:c7:e5:30:70:ac: 35:5e:a2:79:b8:03:fa:4f:58:ff:40:ce:ba:ed:41:d4: 35:19:02:ae:83:35:a2:b9:6c:0c:ee:37:37:0b:a5:5b: 07:fe:76:a3:15:19:a9:8a:3a:c6:45:fa:ab:3e:a2:4b: d0:d4:1e:bf:80:91:fe:28:95:bb:06:0c:af:dc:de:71: 13:d5:ea:0a:b2:5b:13:99:a8:58:aa:24:51:40:9e:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:a3:3c:66:81:6f:92:0c:03:b4:c7:81:6a:a9:36:e9: cb:a6:48:b6:6a:3b:b3:6a:e7:b6:7b:fd:98:8c:8f:bb: e0:42:f4:25:67:00:49:f9:f4:77:fa:8d:a2:f5:c6:0e: 41:b2:e6:f0:30:9e:b0:26:ed:77:a0:26:ed:54:92:88: 46:f8:56:c3:fa:d5:ba:54:07:92:d5:62:90:75:54:b4: e1:62:5c:a5:db:6c:d5:be:df:de:20:0e:82:1b:2d:cc: ee:a8:0c:af:39:35:48:8b:75:16:86:de:8d:c9:a9:1f: 8c:44:a2:8d:7b:9d:75:65:de:e7:a5:0b:2d:95:3d:0c: f5:70:de:93:a1:f9:ab:8b:60:95:56:da:1a:8d:e0:b5: 28:cd:f3:0b:96:43:3f:a8:80:1f:83:90:ee:fb:48:72: 16:57:e8:8e:a1:09:7d:af:f3:ab:47:f9:a5:6d:6e:7c: 0b:f0:c2:c1:43:3b:f5:e8:4f:eb:97:dd:5d:70:26:d5: 58:41:55:3b:10:c1:c3:40:82:65:43:13:0b:7b:58:90: 33:84:e9:8f:a4:82:f3:cc:92:aa:f6:22:05:e4:f5:1c: 31:48:4e:16:8c:7e:79:97:47:6c:85:0e:5a:84:50:64: 85:56:a6:61:70:2f:b8:e2:74:dc:d5:d3:e7:0d:fc:1f Fingerprint (SHA-256): 6F:0B:52:DF:96:56:3D:FA:5E:4E:E9:30:14:C1:DD:7B:AB:69:D0:8F:44:E2:40:08:98:2B:D4:A2:5B:52:43:68 Fingerprint (SHA1): F7:13:0E:C2:5C:7D:6F:CB:67:6A:9F:07:23:D2:A6:D5:7E:0F:98:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142929 (0x3cafa0d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:04 2023 Not After : Wed Oct 18 14:33:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:06:8f:68:93:c3:05:5c:db:b1:96:2e:cd:c3:0e:13: 44:35:ff:95:25:aa:67:e0:4c:32:57:b3:e8:63:2e:a3: fa:18:03:69:ec:13:50:60:48:7b:9c:10:44:0c:a7:d4: 93:23:fb:73:f5:95:2d:55:ac:27:6e:fc:13:ca:32:eb: 73:7b:6f:ce:83:9f:c5:fb:d1:a8:3b:62:85:a9:52:42: 92:14:09:16:c3:12:c4:23:74:c3:df:4a:b1:72:4a:07: cd:4f:6c:80:7c:02:09:ff:46:1c:65:09:13:8a:e3:7b: 4e:17:d6:29:4d:ee:e0:c0:ed:6d:a0:21:3d:23:5e:54: e2:2e:ca:22:fa:e5:14:f0:d6:73:e3:64:27:0d:1b:f9: c7:74:6e:c2:35:1a:26:8a:46:4f:4e:9f:8d:8f:a7:35: ef:34:16:45:84:da:08:16:e3:ce:79:5b:ef:2e:64:27: be:44:0a:cd:82:3b:a2:b0:cb:52:45:f3:ff:9b:29:ca: e9:5f:50:86:95:ae:ea:fa:d6:4c:81:ca:9f:5d:d9:ff: d2:ac:47:e0:4a:ec:ce:91:18:ea:f0:26:59:53:9a:67: 53:2c:c3:29:89:cc:2f:1e:d8:9b:2b:e8:05:e4:96:dc: d7:c1:5c:c2:16:74:96:32:3b:72:2c:dd:67:84:98:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:6a:ce:45:f8:31:79:96:b8:00:49:fc:27:d5:80:14: 2f:f7:19:94:94:5a:17:0b:e3:9f:25:bf:19:97:f2:39: 1b:01:5b:d4:71:b1:88:f2:b9:66:7a:f0:8b:c8:a7:e7: 89:94:53:89:ca:58:c5:32:10:88:75:ad:ae:98:3b:cf: 46:f4:0e:0e:b2:51:ec:12:3b:74:01:03:b0:d4:ca:34: e9:35:7a:e6:80:ee:b8:45:80:59:8d:12:45:df:5a:ed: 7e:2f:fb:61:40:2c:ef:e3:1a:b8:7b:5f:72:32:3f:97: 13:46:3e:f4:3c:5e:9f:52:b3:82:59:20:9f:f2:06:aa: 49:7f:7b:04:3c:8e:ec:20:3f:04:a7:b5:f4:44:be:29: 49:c8:d6:d5:58:a4:cb:a3:d4:db:2e:5e:15:bf:02:43: 99:08:1f:bd:01:47:60:a9:8e:9c:a0:bc:e7:14:07:69: 89:d2:82:7c:d0:ad:90:a3:47:4f:af:42:37:a1:74:28: 61:c4:2d:fa:12:26:27:2e:85:b6:db:c9:e9:67:e6:f4: 0c:06:5e:c6:b3:e7:6b:ad:2f:17:fb:d7:64:d4:2c:e3: 20:54:ce:0f:a5:fb:bc:b7:aa:87:8d:92:31:57:54:f5: e7:92:51:de:87:2d:15:09:98:97:cf:ad:e1:48:55:9c Fingerprint (SHA-256): B9:2F:4B:60:3C:C6:60:FB:D8:4D:74:2D:0A:4E:94:D8:D7:1C:48:07:19:0C:E3:1D:F4:5D:06:66:D9:07:70:54 Fingerprint (SHA1): 3A:65:54:2A:E9:6A:5F:95:9E:72:0E:7C:F7:8E:2E:0A:5A:1C:96:B3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142930 (0x3cafa0d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:06 2023 Not After : Wed Oct 18 14:33:06 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:9a:2e:c2:7f:0b:40:09:d6:51:25:66:e6:df:a1:a9: 62:f0:8a:0a:2b:d9:46:07:7c:d6:ff:4d:2b:30:8f:df: 54:a4:df:f4:46:0d:3f:c2:d4:cf:e1:c2:2a:01:af:b1: ff:fc:b4:b4:de:8c:f7:96:f3:b0:16:6b:74:d5:4a:25: 51:fa:f0:00:0b:a1:13:9f:ed:68:89:4f:cb:a4:cf:97: 9f:b1:a2:c1:a2:a5:05:a1:cb:c6:b6:4b:c8:29:4b:36: 9f:f3:59:6d:92:0f:c7:7d:f6:68:71:7f:30:91:de:fe: a2:42:37:fc:32:20:57:24:5e:3b:2e:20:d7:85:27:51: b2:08:e5:39:67:d0:30:f4:43:1a:4f:f1:e2:ff:85:b9: b6:69:97:7c:51:1a:c3:34:ee:7e:67:9b:d9:d0:c6:38: 56:b4:04:18:53:7d:3e:0e:1c:3a:fc:ac:44:39:5d:f1: 30:2e:20:7f:ec:5d:9a:37:01:88:43:42:c4:dd:bb:34: 53:5e:2a:a7:a5:54:58:62:27:99:2f:d2:b8:68:53:f2: 26:95:1b:48:f2:ee:60:6e:d1:46:06:dd:d6:f3:f1:54: 8b:a2:32:75:4c:0b:25:b0:d0:14:7e:ab:31:0d:a2:6d: 15:84:be:2e:aa:cc:86:17:8e:66:19:7a:e6:58:2b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:f2:83:37:dc:55:e8:6c:49:3b:1d:33:58:6e:01:7e: 70:9b:5a:00:cc:95:79:cb:03:0e:4b:f7:30:7f:37:22: a6:36:7f:30:1f:cf:0c:ae:2f:f4:b4:bc:3a:95:f8:bd: b7:01:e7:b6:04:94:c4:09:a5:73:94:3c:43:11:a2:30: 76:a2:32:0d:1d:96:0e:33:a8:6f:be:e9:37:66:c2:ae: 21:e0:f1:7b:64:1b:6e:f4:d8:b2:65:54:f1:2e:11:4d: 36:fd:52:cf:e5:3f:49:c3:45:c3:44:93:a8:e0:3c:b5: 9c:02:1e:6f:b0:dc:4b:68:a3:b3:14:01:9f:8e:dc:c1: 88:e3:50:8b:90:ac:b1:8a:94:54:54:0f:9e:b2:6d:18: a6:55:17:c6:c9:b4:3f:c4:04:60:9a:31:a4:fb:ed:54: 00:6a:0e:ac:cf:46:9a:8b:e5:6d:4f:19:da:c6:2b:39: 3e:68:0b:ad:08:69:6e:ab:fe:7e:23:bf:7c:94:8e:fa: ab:46:65:9f:3a:75:35:d0:d2:46:61:ba:db:d5:50:55: 23:fb:1c:68:c1:bd:43:15:d3:31:05:27:c2:22:17:35: 46:28:42:2f:98:aa:78:78:f6:98:8b:2f:30:f7:bb:8a: 86:22:2d:ed:50:96:77:8f:b5:99:c9:cf:ab:37:5a:8a Fingerprint (SHA-256): F3:32:E4:16:A0:B9:0B:B9:42:ED:EA:D4:1D:96:9D:E4:97:E0:D2:B3:7C:20:A9:B6:FB:3C:22:B9:CD:32:9E:B1 Fingerprint (SHA1): BC:E1:C1:3B:F6:36:93:15:91:F6:2B:7D:EB:DC:41:BA:1B:DD:38:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142928 (0x3cafa0d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:03 2023 Not After : Wed Oct 18 14:33:03 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ba:89:1b:fd:52:e9:5d:62:86:ae:42:4a:ef:09:95: a9:e8:b3:7a:0b:ef:8f:89:41:30:9d:59:32:c9:90:dc: 82:b2:09:65:83:82:32:1b:b8:53:db:c7:76:e5:ae:6b: ec:e1:53:d4:4c:c0:19:1f:c9:40:60:8a:73:18:ba:7d: dd:e6:11:39:90:86:bf:f5:10:82:71:e5:86:b0:57:44: ee:3c:de:07:03:13:15:70:87:b3:f5:3f:ff:26:75:c1: 94:8c:76:a3:ee:e6:2a:eb:89:91:38:53:b4:79:cd:33: 24:62:c6:d8:a6:d9:83:55:7f:cc:3c:00:01:77:14:44: cc:9d:82:2a:18:ee:55:a9:17:c4:ad:89:be:8a:83:12: 90:2a:4c:db:6e:fd:38:2f:c5:83:a5:30:c9:09:45:0c: 47:4d:b1:69:4d:24:aa:ed:ec:54:60:c7:e5:30:70:ac: 35:5e:a2:79:b8:03:fa:4f:58:ff:40:ce:ba:ed:41:d4: 35:19:02:ae:83:35:a2:b9:6c:0c:ee:37:37:0b:a5:5b: 07:fe:76:a3:15:19:a9:8a:3a:c6:45:fa:ab:3e:a2:4b: d0:d4:1e:bf:80:91:fe:28:95:bb:06:0c:af:dc:de:71: 13:d5:ea:0a:b2:5b:13:99:a8:58:aa:24:51:40:9e:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:a3:3c:66:81:6f:92:0c:03:b4:c7:81:6a:a9:36:e9: cb:a6:48:b6:6a:3b:b3:6a:e7:b6:7b:fd:98:8c:8f:bb: e0:42:f4:25:67:00:49:f9:f4:77:fa:8d:a2:f5:c6:0e: 41:b2:e6:f0:30:9e:b0:26:ed:77:a0:26:ed:54:92:88: 46:f8:56:c3:fa:d5:ba:54:07:92:d5:62:90:75:54:b4: e1:62:5c:a5:db:6c:d5:be:df:de:20:0e:82:1b:2d:cc: ee:a8:0c:af:39:35:48:8b:75:16:86:de:8d:c9:a9:1f: 8c:44:a2:8d:7b:9d:75:65:de:e7:a5:0b:2d:95:3d:0c: f5:70:de:93:a1:f9:ab:8b:60:95:56:da:1a:8d:e0:b5: 28:cd:f3:0b:96:43:3f:a8:80:1f:83:90:ee:fb:48:72: 16:57:e8:8e:a1:09:7d:af:f3:ab:47:f9:a5:6d:6e:7c: 0b:f0:c2:c1:43:3b:f5:e8:4f:eb:97:dd:5d:70:26:d5: 58:41:55:3b:10:c1:c3:40:82:65:43:13:0b:7b:58:90: 33:84:e9:8f:a4:82:f3:cc:92:aa:f6:22:05:e4:f5:1c: 31:48:4e:16:8c:7e:79:97:47:6c:85:0e:5a:84:50:64: 85:56:a6:61:70:2f:b8:e2:74:dc:d5:d3:e7:0d:fc:1f Fingerprint (SHA-256): 6F:0B:52:DF:96:56:3D:FA:5E:4E:E9:30:14:C1:DD:7B:AB:69:D0:8F:44:E2:40:08:98:2B:D4:A2:5B:52:43:68 Fingerprint (SHA1): F7:13:0E:C2:5C:7D:6F:CB:67:6A:9F:07:23:D2:A6:D5:7E:0F:98:0F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142929 (0x3cafa0d1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:04 2023 Not After : Wed Oct 18 14:33:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:06:8f:68:93:c3:05:5c:db:b1:96:2e:cd:c3:0e:13: 44:35:ff:95:25:aa:67:e0:4c:32:57:b3:e8:63:2e:a3: fa:18:03:69:ec:13:50:60:48:7b:9c:10:44:0c:a7:d4: 93:23:fb:73:f5:95:2d:55:ac:27:6e:fc:13:ca:32:eb: 73:7b:6f:ce:83:9f:c5:fb:d1:a8:3b:62:85:a9:52:42: 92:14:09:16:c3:12:c4:23:74:c3:df:4a:b1:72:4a:07: cd:4f:6c:80:7c:02:09:ff:46:1c:65:09:13:8a:e3:7b: 4e:17:d6:29:4d:ee:e0:c0:ed:6d:a0:21:3d:23:5e:54: e2:2e:ca:22:fa:e5:14:f0:d6:73:e3:64:27:0d:1b:f9: c7:74:6e:c2:35:1a:26:8a:46:4f:4e:9f:8d:8f:a7:35: ef:34:16:45:84:da:08:16:e3:ce:79:5b:ef:2e:64:27: be:44:0a:cd:82:3b:a2:b0:cb:52:45:f3:ff:9b:29:ca: e9:5f:50:86:95:ae:ea:fa:d6:4c:81:ca:9f:5d:d9:ff: d2:ac:47:e0:4a:ec:ce:91:18:ea:f0:26:59:53:9a:67: 53:2c:c3:29:89:cc:2f:1e:d8:9b:2b:e8:05:e4:96:dc: d7:c1:5c:c2:16:74:96:32:3b:72:2c:dd:67:84:98:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:6a:ce:45:f8:31:79:96:b8:00:49:fc:27:d5:80:14: 2f:f7:19:94:94:5a:17:0b:e3:9f:25:bf:19:97:f2:39: 1b:01:5b:d4:71:b1:88:f2:b9:66:7a:f0:8b:c8:a7:e7: 89:94:53:89:ca:58:c5:32:10:88:75:ad:ae:98:3b:cf: 46:f4:0e:0e:b2:51:ec:12:3b:74:01:03:b0:d4:ca:34: e9:35:7a:e6:80:ee:b8:45:80:59:8d:12:45:df:5a:ed: 7e:2f:fb:61:40:2c:ef:e3:1a:b8:7b:5f:72:32:3f:97: 13:46:3e:f4:3c:5e:9f:52:b3:82:59:20:9f:f2:06:aa: 49:7f:7b:04:3c:8e:ec:20:3f:04:a7:b5:f4:44:be:29: 49:c8:d6:d5:58:a4:cb:a3:d4:db:2e:5e:15:bf:02:43: 99:08:1f:bd:01:47:60:a9:8e:9c:a0:bc:e7:14:07:69: 89:d2:82:7c:d0:ad:90:a3:47:4f:af:42:37:a1:74:28: 61:c4:2d:fa:12:26:27:2e:85:b6:db:c9:e9:67:e6:f4: 0c:06:5e:c6:b3:e7:6b:ad:2f:17:fb:d7:64:d4:2c:e3: 20:54:ce:0f:a5:fb:bc:b7:aa:87:8d:92:31:57:54:f5: e7:92:51:de:87:2d:15:09:98:97:cf:ad:e1:48:55:9c Fingerprint (SHA-256): B9:2F:4B:60:3C:C6:60:FB:D8:4D:74:2D:0A:4E:94:D8:D7:1C:48:07:19:0C:E3:1D:F4:5D:06:66:D9:07:70:54 Fingerprint (SHA1): 3A:65:54:2A:E9:6A:5F:95:9E:72:0E:7C:F7:8E:2E:0A:5A:1C:96:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142930 (0x3cafa0d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:06 2023 Not After : Wed Oct 18 14:33:06 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:9a:2e:c2:7f:0b:40:09:d6:51:25:66:e6:df:a1:a9: 62:f0:8a:0a:2b:d9:46:07:7c:d6:ff:4d:2b:30:8f:df: 54:a4:df:f4:46:0d:3f:c2:d4:cf:e1:c2:2a:01:af:b1: ff:fc:b4:b4:de:8c:f7:96:f3:b0:16:6b:74:d5:4a:25: 51:fa:f0:00:0b:a1:13:9f:ed:68:89:4f:cb:a4:cf:97: 9f:b1:a2:c1:a2:a5:05:a1:cb:c6:b6:4b:c8:29:4b:36: 9f:f3:59:6d:92:0f:c7:7d:f6:68:71:7f:30:91:de:fe: a2:42:37:fc:32:20:57:24:5e:3b:2e:20:d7:85:27:51: b2:08:e5:39:67:d0:30:f4:43:1a:4f:f1:e2:ff:85:b9: b6:69:97:7c:51:1a:c3:34:ee:7e:67:9b:d9:d0:c6:38: 56:b4:04:18:53:7d:3e:0e:1c:3a:fc:ac:44:39:5d:f1: 30:2e:20:7f:ec:5d:9a:37:01:88:43:42:c4:dd:bb:34: 53:5e:2a:a7:a5:54:58:62:27:99:2f:d2:b8:68:53:f2: 26:95:1b:48:f2:ee:60:6e:d1:46:06:dd:d6:f3:f1:54: 8b:a2:32:75:4c:0b:25:b0:d0:14:7e:ab:31:0d:a2:6d: 15:84:be:2e:aa:cc:86:17:8e:66:19:7a:e6:58:2b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:f2:83:37:dc:55:e8:6c:49:3b:1d:33:58:6e:01:7e: 70:9b:5a:00:cc:95:79:cb:03:0e:4b:f7:30:7f:37:22: a6:36:7f:30:1f:cf:0c:ae:2f:f4:b4:bc:3a:95:f8:bd: b7:01:e7:b6:04:94:c4:09:a5:73:94:3c:43:11:a2:30: 76:a2:32:0d:1d:96:0e:33:a8:6f:be:e9:37:66:c2:ae: 21:e0:f1:7b:64:1b:6e:f4:d8:b2:65:54:f1:2e:11:4d: 36:fd:52:cf:e5:3f:49:c3:45:c3:44:93:a8:e0:3c:b5: 9c:02:1e:6f:b0:dc:4b:68:a3:b3:14:01:9f:8e:dc:c1: 88:e3:50:8b:90:ac:b1:8a:94:54:54:0f:9e:b2:6d:18: a6:55:17:c6:c9:b4:3f:c4:04:60:9a:31:a4:fb:ed:54: 00:6a:0e:ac:cf:46:9a:8b:e5:6d:4f:19:da:c6:2b:39: 3e:68:0b:ad:08:69:6e:ab:fe:7e:23:bf:7c:94:8e:fa: ab:46:65:9f:3a:75:35:d0:d2:46:61:ba:db:d5:50:55: 23:fb:1c:68:c1:bd:43:15:d3:31:05:27:c2:22:17:35: 46:28:42:2f:98:aa:78:78:f6:98:8b:2f:30:f7:bb:8a: 86:22:2d:ed:50:96:77:8f:b5:99:c9:cf:ab:37:5a:8a Fingerprint (SHA-256): F3:32:E4:16:A0:B9:0B:B9:42:ED:EA:D4:1D:96:9D:E4:97:E0:D2:B3:7C:20:A9:B6:FB:3C:22:B9:CD:32:9E:B1 Fingerprint (SHA1): BC:E1:C1:3B:F6:36:93:15:91:F6:2B:7D:EB:DC:41:BA:1B:DD:38:1A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142932 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142933 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142934 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018142935 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018142936 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142932 (0x3cafa0d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:11 2023 Not After : Wed Oct 18 14:33:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:bc:f2:b3:ff:10:22:b4:43:01:45:30:8a:ec:76:a2: 98:3c:2d:26:26:eb:98:b9:96:2f:e9:e6:e2:df:a6:68: 2d:ca:09:12:87:74:41:bc:cf:51:f9:45:af:7f:ba:42: 2d:33:cb:b4:c1:2c:b0:8e:38:b0:93:31:34:15:ee:12: 2d:35:dc:db:10:d8:ee:ac:1e:fc:ab:8c:f1:e5:de:99: 8f:d3:0f:61:88:0d:0c:2e:90:cd:85:f4:b2:8f:f1:4f: 5f:a1:21:f7:95:fa:7a:d2:0e:b8:49:35:b7:bb:24:12: 38:97:0c:ec:0e:6b:ef:15:0a:16:39:f3:e9:6a:2a:d3: fd:92:8d:8f:c8:d3:20:5a:5a:c0:e0:2f:ca:9d:79:86: 44:05:1f:5b:43:82:9b:03:b7:51:2e:57:05:76:c3:2b: 52:1d:32:41:df:23:59:52:67:fa:28:68:c0:f2:1a:fc: ca:9d:18:6c:33:dc:14:f2:67:9d:47:46:e5:02:b4:e2: 72:af:cf:f2:e4:71:57:4e:81:4c:46:55:1c:64:1e:80: 97:0e:98:90:ee:55:56:73:d1:c8:e0:b0:8b:3e:59:ac: 15:ff:39:eb:4d:17:0c:af:51:35:d9:3c:8c:de:fb:92: 10:28:db:bd:60:b4:b4:66:76:2e:a5:67:9a:1c:37:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ee:98:a3:20:61:50:ad:47:5b:b8:bd:bf:72:aa:83: cf:86:60:d6:26:8b:d3:5f:33:96:3e:b7:99:83:f7:c6: 8d:84:29:d5:b9:d6:d7:af:1d:27:c2:57:7e:1c:9c:ef: a1:58:83:0c:5a:d2:cd:0e:db:d3:09:8d:9d:b8:e4:0a: 3c:c9:59:c0:17:70:8e:dc:f4:bc:a2:7b:56:e4:ec:d3: e8:46:d8:25:cf:be:83:80:ba:b3:f9:76:78:b4:58:5b: ff:4b:9d:34:97:be:e5:2d:23:f4:a7:b6:00:ae:8c:f8: 5c:92:86:dd:c9:09:40:e7:8c:aa:85:ae:a1:68:22:6f: 6a:1a:19:7f:f4:87:8e:b8:35:53:2d:8e:79:a0:cb:c9: 5f:97:66:75:52:12:68:6d:1b:9c:c4:0f:0e:65:bf:7b: e1:a4:82:eb:82:e7:7d:ef:0b:49:d5:9c:72:7a:19:4a: f2:59:37:98:bd:11:84:cc:4d:39:18:09:c1:14:7b:0f: 74:95:76:a2:d5:82:16:57:87:a3:68:8e:1a:ba:ce:ea: f9:bb:d3:fa:15:65:dc:8a:84:55:db:a2:01:2f:85:73: d0:00:d8:ef:e2:e3:40:91:e8:61:09:eb:a5:d1:01:05: 6a:0b:4f:fc:d4:23:56:d4:cf:64:11:ab:28:15:af:e0 Fingerprint (SHA-256): DC:A8:44:78:BE:E7:3C:FC:90:F7:E5:E4:EF:67:66:1E:86:4C:30:B4:30:B5:AF:5E:95:A4:1E:AA:FC:07:73:09 Fingerprint (SHA1): E6:89:5C:59:A7:8E:D4:2B:90:D0:DD:40:D0:21:FB:DA:04:94:FE:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142933 (0x3cafa0d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:12 2023 Not After : Wed Oct 18 14:33:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:5a:88:32:d6:42:ed:09:af:5e:46:fc:53:ba:e5:25: 11:cf:44:6c:af:84:e8:b3:14:88:bb:1b:6c:7a:f6:cb: eb:42:2d:86:72:f4:b7:fc:03:ae:da:8a:be:69:9b:ee: 4e:c2:6a:93:16:d0:c2:c9:31:c2:aa:34:89:bd:a6:d6: 03:8d:9a:50:5b:8c:ef:04:2e:9e:a8:31:aa:ae:54:cd: e0:01:7c:e6:14:a8:b9:f3:0e:b5:e1:75:7c:31:fb:ca: ce:de:73:fa:04:c3:fc:8e:2e:4b:65:6e:1f:ea:fc:09: e1:cf:eb:55:6a:5a:06:49:b1:03:15:7e:e8:b5:88:fa: 12:ad:9e:26:79:c4:b6:7f:ba:f1:c0:27:af:c5:aa:6f: fe:58:2d:99:90:26:30:50:da:a8:60:2f:66:fe:c3:ee: b8:fc:cb:9c:74:9f:a1:8a:91:a5:c2:29:c2:a7:40:d6: d3:d3:53:7c:6b:89:9c:3b:16:cf:bb:0f:a5:e8:77:a8: 9f:3e:9a:55:1e:c8:c8:61:d0:f8:ca:c4:be:aa:82:f9: 5f:2e:be:e0:89:f2:29:e4:77:3f:32:8a:71:ee:20:0b: df:30:8b:3b:85:ea:f0:a8:8b:ae:c6:34:71:2d:c4:96: 68:08:f3:ed:43:ca:80:57:77:28:08:6e:8c:8e:50:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:53:67:7e:f7:a9:b8:44:54:c1:d0:47:6b:df:47:ee: a6:39:65:6c:11:0d:6b:c3:09:7c:fb:a0:f8:61:30:8e: 84:df:41:b0:d4:0d:a4:86:a8:69:d3:9f:f9:35:3b:a2: cf:33:64:29:46:5f:31:7f:ab:46:ba:57:b3:36:40:e5: 84:10:cd:d7:c8:16:ea:43:c2:2e:3b:5e:89:a1:d4:b0: db:5c:bd:64:c4:dd:f2:91:76:aa:93:72:77:96:2f:64: 76:b3:49:62:64:fc:d0:fc:fb:eb:1b:f1:65:0e:7e:76: c3:b6:8b:71:4f:66:6d:50:4f:76:77:33:e2:6c:c8:8e: ca:fd:d7:b2:35:58:f1:13:4f:68:35:71:e4:b3:69:3d: 0e:9c:a0:19:b9:38:ec:15:90:80:70:b7:f2:8c:3c:c8: f1:16:51:5f:24:f3:b6:bc:b5:eb:63:ba:d1:c9:46:43: 9b:46:93:49:25:0a:3d:e8:d6:88:63:64:2e:c6:1f:ac: 21:57:bc:ab:5f:91:99:05:61:ea:38:29:5f:dc:15:a2: 06:0e:6b:01:03:22:32:48:a5:4f:41:9d:1c:fb:2a:d9: bd:da:b0:de:cc:e4:6c:9d:47:d2:3e:9a:08:de:be:5f: a8:a2:ee:23:9b:01:1c:9b:65:14:80:c7:c6:7f:b2:d6 Fingerprint (SHA-256): 5D:C4:29:1F:0B:B0:00:C0:2E:E1:43:43:82:A1:04:74:54:EA:91:87:E5:0F:8D:AA:6B:46:C0:19:A3:4D:DA:62 Fingerprint (SHA1): 0D:B1:28:0C:BD:DC:0B:79:0E:66:E2:6A:13:4C:4A:DB:BB:5D:18:87 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142934 (0x3cafa0d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:13 2023 Not After : Wed Oct 18 14:33:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:e2:74:de:ba:3f:46:d0:08:21:ec:8d:ee:19:69:7b: 59:64:3f:32:b9:50:30:0a:92:c1:33:46:c8:a5:9d:91: 15:9e:54:e5:d4:49:98:4f:3f:46:c7:83:2c:6f:05:f8: fb:b0:54:68:b4:cc:87:00:68:c6:60:3b:64:74:0e:bf: f1:a7:ac:a6:33:94:e5:3a:3b:19:28:e1:8d:43:de:e5: c3:a8:3f:3f:7e:13:cc:eb:ce:78:b5:e2:6f:7c:79:d3: b3:a6:fd:f3:aa:3d:43:24:fd:01:a4:de:71:16:2a:89: f0:7d:b9:30:49:50:32:72:01:f8:61:37:ad:2d:b7:7d: 7c:0e:7d:e2:c0:84:2a:8d:75:b8:3c:20:f3:ec:ed:7a: 98:fa:c5:40:9a:80:a7:86:5b:59:8f:45:0f:2c:cf:b5: 42:da:a5:86:49:88:c9:cd:80:ef:b7:67:e1:7e:aa:e6: b4:a7:26:97:a9:a5:39:4f:08:2f:64:88:00:49:18:6a: cc:c6:c5:2f:16:f4:5d:3b:48:bc:dc:e8:16:fe:90:d2: cf:4f:92:19:2b:75:9e:5b:0e:21:7a:17:f2:e7:9e:6f: b8:c1:41:61:94:a9:6a:b7:24:a5:66:58:5d:cf:bd:cd: b9:c0:b3:9e:1c:e1:31:92:91:bc:f0:24:dc:1c:b6:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:bf:26:3a:a8:53:9c:3a:9d:77:ab:5e:5f:d1:72:11: 1c:b9:e7:33:44:93:3e:d6:e4:89:ad:11:0e:b4:9d:91: 29:39:0c:56:96:88:16:a8:f9:8d:c7:c4:f0:f1:42:7e: c9:8f:8a:db:a2:3e:a7:54:60:5a:ea:3a:af:37:97:e2: 2e:23:23:00:e5:e6:f9:fc:93:97:e3:43:4f:50:a5:ea: a5:4a:56:55:52:b5:42:0a:bf:3f:e9:76:bc:0f:c8:04: e5:5b:e0:25:5c:7f:a9:bc:cd:5f:05:d5:e1:df:de:28: 4a:6d:86:2b:c2:d6:4f:db:15:a9:9f:04:12:12:87:6c: 7f:0a:b9:41:f4:9d:96:53:24:af:52:4b:f1:bd:aa:47: fd:36:ea:15:3b:86:f8:e5:2e:40:ec:61:c5:3e:1e:10: 02:dd:71:f2:00:50:53:ed:27:55:97:4d:70:f2:51:ee: 13:54:7b:f6:87:d2:cb:50:0d:ee:5f:a1:03:82:e2:37: ca:98:99:e6:a6:5d:ce:f0:d9:42:15:5e:31:a3:f4:34: 87:c9:96:8a:7a:8c:12:4f:16:58:af:80:dd:91:ee:cf: 93:2c:08:13:89:1a:d8:0e:5c:2a:75:97:a8:14:f8:11: d2:e3:4e:dc:0d:c4:4e:d5:bd:7e:7b:b6:0c:31:86:86 Fingerprint (SHA-256): ED:9F:EF:08:53:F9:40:24:71:22:D4:A3:BB:ED:15:85:04:F8:4F:44:AB:4C:85:0B:73:1B:C5:C9:8B:28:88:5A Fingerprint (SHA1): DB:7A:BF:67:62:78:B3:B7:1E:04:AE:08:B5:A5:16:29:FA:B0:28:89 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142932 (0x3cafa0d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:11 2023 Not After : Wed Oct 18 14:33:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:bc:f2:b3:ff:10:22:b4:43:01:45:30:8a:ec:76:a2: 98:3c:2d:26:26:eb:98:b9:96:2f:e9:e6:e2:df:a6:68: 2d:ca:09:12:87:74:41:bc:cf:51:f9:45:af:7f:ba:42: 2d:33:cb:b4:c1:2c:b0:8e:38:b0:93:31:34:15:ee:12: 2d:35:dc:db:10:d8:ee:ac:1e:fc:ab:8c:f1:e5:de:99: 8f:d3:0f:61:88:0d:0c:2e:90:cd:85:f4:b2:8f:f1:4f: 5f:a1:21:f7:95:fa:7a:d2:0e:b8:49:35:b7:bb:24:12: 38:97:0c:ec:0e:6b:ef:15:0a:16:39:f3:e9:6a:2a:d3: fd:92:8d:8f:c8:d3:20:5a:5a:c0:e0:2f:ca:9d:79:86: 44:05:1f:5b:43:82:9b:03:b7:51:2e:57:05:76:c3:2b: 52:1d:32:41:df:23:59:52:67:fa:28:68:c0:f2:1a:fc: ca:9d:18:6c:33:dc:14:f2:67:9d:47:46:e5:02:b4:e2: 72:af:cf:f2:e4:71:57:4e:81:4c:46:55:1c:64:1e:80: 97:0e:98:90:ee:55:56:73:d1:c8:e0:b0:8b:3e:59:ac: 15:ff:39:eb:4d:17:0c:af:51:35:d9:3c:8c:de:fb:92: 10:28:db:bd:60:b4:b4:66:76:2e:a5:67:9a:1c:37:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ee:98:a3:20:61:50:ad:47:5b:b8:bd:bf:72:aa:83: cf:86:60:d6:26:8b:d3:5f:33:96:3e:b7:99:83:f7:c6: 8d:84:29:d5:b9:d6:d7:af:1d:27:c2:57:7e:1c:9c:ef: a1:58:83:0c:5a:d2:cd:0e:db:d3:09:8d:9d:b8:e4:0a: 3c:c9:59:c0:17:70:8e:dc:f4:bc:a2:7b:56:e4:ec:d3: e8:46:d8:25:cf:be:83:80:ba:b3:f9:76:78:b4:58:5b: ff:4b:9d:34:97:be:e5:2d:23:f4:a7:b6:00:ae:8c:f8: 5c:92:86:dd:c9:09:40:e7:8c:aa:85:ae:a1:68:22:6f: 6a:1a:19:7f:f4:87:8e:b8:35:53:2d:8e:79:a0:cb:c9: 5f:97:66:75:52:12:68:6d:1b:9c:c4:0f:0e:65:bf:7b: e1:a4:82:eb:82:e7:7d:ef:0b:49:d5:9c:72:7a:19:4a: f2:59:37:98:bd:11:84:cc:4d:39:18:09:c1:14:7b:0f: 74:95:76:a2:d5:82:16:57:87:a3:68:8e:1a:ba:ce:ea: f9:bb:d3:fa:15:65:dc:8a:84:55:db:a2:01:2f:85:73: d0:00:d8:ef:e2:e3:40:91:e8:61:09:eb:a5:d1:01:05: 6a:0b:4f:fc:d4:23:56:d4:cf:64:11:ab:28:15:af:e0 Fingerprint (SHA-256): DC:A8:44:78:BE:E7:3C:FC:90:F7:E5:E4:EF:67:66:1E:86:4C:30:B4:30:B5:AF:5E:95:A4:1E:AA:FC:07:73:09 Fingerprint (SHA1): E6:89:5C:59:A7:8E:D4:2B:90:D0:DD:40:D0:21:FB:DA:04:94:FE:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142933 (0x3cafa0d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:12 2023 Not After : Wed Oct 18 14:33:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:5a:88:32:d6:42:ed:09:af:5e:46:fc:53:ba:e5:25: 11:cf:44:6c:af:84:e8:b3:14:88:bb:1b:6c:7a:f6:cb: eb:42:2d:86:72:f4:b7:fc:03:ae:da:8a:be:69:9b:ee: 4e:c2:6a:93:16:d0:c2:c9:31:c2:aa:34:89:bd:a6:d6: 03:8d:9a:50:5b:8c:ef:04:2e:9e:a8:31:aa:ae:54:cd: e0:01:7c:e6:14:a8:b9:f3:0e:b5:e1:75:7c:31:fb:ca: ce:de:73:fa:04:c3:fc:8e:2e:4b:65:6e:1f:ea:fc:09: e1:cf:eb:55:6a:5a:06:49:b1:03:15:7e:e8:b5:88:fa: 12:ad:9e:26:79:c4:b6:7f:ba:f1:c0:27:af:c5:aa:6f: fe:58:2d:99:90:26:30:50:da:a8:60:2f:66:fe:c3:ee: b8:fc:cb:9c:74:9f:a1:8a:91:a5:c2:29:c2:a7:40:d6: d3:d3:53:7c:6b:89:9c:3b:16:cf:bb:0f:a5:e8:77:a8: 9f:3e:9a:55:1e:c8:c8:61:d0:f8:ca:c4:be:aa:82:f9: 5f:2e:be:e0:89:f2:29:e4:77:3f:32:8a:71:ee:20:0b: df:30:8b:3b:85:ea:f0:a8:8b:ae:c6:34:71:2d:c4:96: 68:08:f3:ed:43:ca:80:57:77:28:08:6e:8c:8e:50:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:53:67:7e:f7:a9:b8:44:54:c1:d0:47:6b:df:47:ee: a6:39:65:6c:11:0d:6b:c3:09:7c:fb:a0:f8:61:30:8e: 84:df:41:b0:d4:0d:a4:86:a8:69:d3:9f:f9:35:3b:a2: cf:33:64:29:46:5f:31:7f:ab:46:ba:57:b3:36:40:e5: 84:10:cd:d7:c8:16:ea:43:c2:2e:3b:5e:89:a1:d4:b0: db:5c:bd:64:c4:dd:f2:91:76:aa:93:72:77:96:2f:64: 76:b3:49:62:64:fc:d0:fc:fb:eb:1b:f1:65:0e:7e:76: c3:b6:8b:71:4f:66:6d:50:4f:76:77:33:e2:6c:c8:8e: ca:fd:d7:b2:35:58:f1:13:4f:68:35:71:e4:b3:69:3d: 0e:9c:a0:19:b9:38:ec:15:90:80:70:b7:f2:8c:3c:c8: f1:16:51:5f:24:f3:b6:bc:b5:eb:63:ba:d1:c9:46:43: 9b:46:93:49:25:0a:3d:e8:d6:88:63:64:2e:c6:1f:ac: 21:57:bc:ab:5f:91:99:05:61:ea:38:29:5f:dc:15:a2: 06:0e:6b:01:03:22:32:48:a5:4f:41:9d:1c:fb:2a:d9: bd:da:b0:de:cc:e4:6c:9d:47:d2:3e:9a:08:de:be:5f: a8:a2:ee:23:9b:01:1c:9b:65:14:80:c7:c6:7f:b2:d6 Fingerprint (SHA-256): 5D:C4:29:1F:0B:B0:00:C0:2E:E1:43:43:82:A1:04:74:54:EA:91:87:E5:0F:8D:AA:6B:46:C0:19:A3:4D:DA:62 Fingerprint (SHA1): 0D:B1:28:0C:BD:DC:0B:79:0E:66:E2:6A:13:4C:4A:DB:BB:5D:18:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142934 (0x3cafa0d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:13 2023 Not After : Wed Oct 18 14:33:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:e2:74:de:ba:3f:46:d0:08:21:ec:8d:ee:19:69:7b: 59:64:3f:32:b9:50:30:0a:92:c1:33:46:c8:a5:9d:91: 15:9e:54:e5:d4:49:98:4f:3f:46:c7:83:2c:6f:05:f8: fb:b0:54:68:b4:cc:87:00:68:c6:60:3b:64:74:0e:bf: f1:a7:ac:a6:33:94:e5:3a:3b:19:28:e1:8d:43:de:e5: c3:a8:3f:3f:7e:13:cc:eb:ce:78:b5:e2:6f:7c:79:d3: b3:a6:fd:f3:aa:3d:43:24:fd:01:a4:de:71:16:2a:89: f0:7d:b9:30:49:50:32:72:01:f8:61:37:ad:2d:b7:7d: 7c:0e:7d:e2:c0:84:2a:8d:75:b8:3c:20:f3:ec:ed:7a: 98:fa:c5:40:9a:80:a7:86:5b:59:8f:45:0f:2c:cf:b5: 42:da:a5:86:49:88:c9:cd:80:ef:b7:67:e1:7e:aa:e6: b4:a7:26:97:a9:a5:39:4f:08:2f:64:88:00:49:18:6a: cc:c6:c5:2f:16:f4:5d:3b:48:bc:dc:e8:16:fe:90:d2: cf:4f:92:19:2b:75:9e:5b:0e:21:7a:17:f2:e7:9e:6f: b8:c1:41:61:94:a9:6a:b7:24:a5:66:58:5d:cf:bd:cd: b9:c0:b3:9e:1c:e1:31:92:91:bc:f0:24:dc:1c:b6:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:bf:26:3a:a8:53:9c:3a:9d:77:ab:5e:5f:d1:72:11: 1c:b9:e7:33:44:93:3e:d6:e4:89:ad:11:0e:b4:9d:91: 29:39:0c:56:96:88:16:a8:f9:8d:c7:c4:f0:f1:42:7e: c9:8f:8a:db:a2:3e:a7:54:60:5a:ea:3a:af:37:97:e2: 2e:23:23:00:e5:e6:f9:fc:93:97:e3:43:4f:50:a5:ea: a5:4a:56:55:52:b5:42:0a:bf:3f:e9:76:bc:0f:c8:04: e5:5b:e0:25:5c:7f:a9:bc:cd:5f:05:d5:e1:df:de:28: 4a:6d:86:2b:c2:d6:4f:db:15:a9:9f:04:12:12:87:6c: 7f:0a:b9:41:f4:9d:96:53:24:af:52:4b:f1:bd:aa:47: fd:36:ea:15:3b:86:f8:e5:2e:40:ec:61:c5:3e:1e:10: 02:dd:71:f2:00:50:53:ed:27:55:97:4d:70:f2:51:ee: 13:54:7b:f6:87:d2:cb:50:0d:ee:5f:a1:03:82:e2:37: ca:98:99:e6:a6:5d:ce:f0:d9:42:15:5e:31:a3:f4:34: 87:c9:96:8a:7a:8c:12:4f:16:58:af:80:dd:91:ee:cf: 93:2c:08:13:89:1a:d8:0e:5c:2a:75:97:a8:14:f8:11: d2:e3:4e:dc:0d:c4:4e:d5:bd:7e:7b:b6:0c:31:86:86 Fingerprint (SHA-256): ED:9F:EF:08:53:F9:40:24:71:22:D4:A3:BB:ED:15:85:04:F8:4F:44:AB:4C:85:0B:73:1B:C5:C9:8B:28:88:5A Fingerprint (SHA1): DB:7A:BF:67:62:78:B3:B7:1E:04:AE:08:B5:A5:16:29:FA:B0:28:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142932 (0x3cafa0d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:11 2023 Not After : Wed Oct 18 14:33:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:bc:f2:b3:ff:10:22:b4:43:01:45:30:8a:ec:76:a2: 98:3c:2d:26:26:eb:98:b9:96:2f:e9:e6:e2:df:a6:68: 2d:ca:09:12:87:74:41:bc:cf:51:f9:45:af:7f:ba:42: 2d:33:cb:b4:c1:2c:b0:8e:38:b0:93:31:34:15:ee:12: 2d:35:dc:db:10:d8:ee:ac:1e:fc:ab:8c:f1:e5:de:99: 8f:d3:0f:61:88:0d:0c:2e:90:cd:85:f4:b2:8f:f1:4f: 5f:a1:21:f7:95:fa:7a:d2:0e:b8:49:35:b7:bb:24:12: 38:97:0c:ec:0e:6b:ef:15:0a:16:39:f3:e9:6a:2a:d3: fd:92:8d:8f:c8:d3:20:5a:5a:c0:e0:2f:ca:9d:79:86: 44:05:1f:5b:43:82:9b:03:b7:51:2e:57:05:76:c3:2b: 52:1d:32:41:df:23:59:52:67:fa:28:68:c0:f2:1a:fc: ca:9d:18:6c:33:dc:14:f2:67:9d:47:46:e5:02:b4:e2: 72:af:cf:f2:e4:71:57:4e:81:4c:46:55:1c:64:1e:80: 97:0e:98:90:ee:55:56:73:d1:c8:e0:b0:8b:3e:59:ac: 15:ff:39:eb:4d:17:0c:af:51:35:d9:3c:8c:de:fb:92: 10:28:db:bd:60:b4:b4:66:76:2e:a5:67:9a:1c:37:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ee:98:a3:20:61:50:ad:47:5b:b8:bd:bf:72:aa:83: cf:86:60:d6:26:8b:d3:5f:33:96:3e:b7:99:83:f7:c6: 8d:84:29:d5:b9:d6:d7:af:1d:27:c2:57:7e:1c:9c:ef: a1:58:83:0c:5a:d2:cd:0e:db:d3:09:8d:9d:b8:e4:0a: 3c:c9:59:c0:17:70:8e:dc:f4:bc:a2:7b:56:e4:ec:d3: e8:46:d8:25:cf:be:83:80:ba:b3:f9:76:78:b4:58:5b: ff:4b:9d:34:97:be:e5:2d:23:f4:a7:b6:00:ae:8c:f8: 5c:92:86:dd:c9:09:40:e7:8c:aa:85:ae:a1:68:22:6f: 6a:1a:19:7f:f4:87:8e:b8:35:53:2d:8e:79:a0:cb:c9: 5f:97:66:75:52:12:68:6d:1b:9c:c4:0f:0e:65:bf:7b: e1:a4:82:eb:82:e7:7d:ef:0b:49:d5:9c:72:7a:19:4a: f2:59:37:98:bd:11:84:cc:4d:39:18:09:c1:14:7b:0f: 74:95:76:a2:d5:82:16:57:87:a3:68:8e:1a:ba:ce:ea: f9:bb:d3:fa:15:65:dc:8a:84:55:db:a2:01:2f:85:73: d0:00:d8:ef:e2:e3:40:91:e8:61:09:eb:a5:d1:01:05: 6a:0b:4f:fc:d4:23:56:d4:cf:64:11:ab:28:15:af:e0 Fingerprint (SHA-256): DC:A8:44:78:BE:E7:3C:FC:90:F7:E5:E4:EF:67:66:1E:86:4C:30:B4:30:B5:AF:5E:95:A4:1E:AA:FC:07:73:09 Fingerprint (SHA1): E6:89:5C:59:A7:8E:D4:2B:90:D0:DD:40:D0:21:FB:DA:04:94:FE:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142932 (0x3cafa0d4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:11 2023 Not After : Wed Oct 18 14:33:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:bc:f2:b3:ff:10:22:b4:43:01:45:30:8a:ec:76:a2: 98:3c:2d:26:26:eb:98:b9:96:2f:e9:e6:e2:df:a6:68: 2d:ca:09:12:87:74:41:bc:cf:51:f9:45:af:7f:ba:42: 2d:33:cb:b4:c1:2c:b0:8e:38:b0:93:31:34:15:ee:12: 2d:35:dc:db:10:d8:ee:ac:1e:fc:ab:8c:f1:e5:de:99: 8f:d3:0f:61:88:0d:0c:2e:90:cd:85:f4:b2:8f:f1:4f: 5f:a1:21:f7:95:fa:7a:d2:0e:b8:49:35:b7:bb:24:12: 38:97:0c:ec:0e:6b:ef:15:0a:16:39:f3:e9:6a:2a:d3: fd:92:8d:8f:c8:d3:20:5a:5a:c0:e0:2f:ca:9d:79:86: 44:05:1f:5b:43:82:9b:03:b7:51:2e:57:05:76:c3:2b: 52:1d:32:41:df:23:59:52:67:fa:28:68:c0:f2:1a:fc: ca:9d:18:6c:33:dc:14:f2:67:9d:47:46:e5:02:b4:e2: 72:af:cf:f2:e4:71:57:4e:81:4c:46:55:1c:64:1e:80: 97:0e:98:90:ee:55:56:73:d1:c8:e0:b0:8b:3e:59:ac: 15:ff:39:eb:4d:17:0c:af:51:35:d9:3c:8c:de:fb:92: 10:28:db:bd:60:b4:b4:66:76:2e:a5:67:9a:1c:37:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ee:98:a3:20:61:50:ad:47:5b:b8:bd:bf:72:aa:83: cf:86:60:d6:26:8b:d3:5f:33:96:3e:b7:99:83:f7:c6: 8d:84:29:d5:b9:d6:d7:af:1d:27:c2:57:7e:1c:9c:ef: a1:58:83:0c:5a:d2:cd:0e:db:d3:09:8d:9d:b8:e4:0a: 3c:c9:59:c0:17:70:8e:dc:f4:bc:a2:7b:56:e4:ec:d3: e8:46:d8:25:cf:be:83:80:ba:b3:f9:76:78:b4:58:5b: ff:4b:9d:34:97:be:e5:2d:23:f4:a7:b6:00:ae:8c:f8: 5c:92:86:dd:c9:09:40:e7:8c:aa:85:ae:a1:68:22:6f: 6a:1a:19:7f:f4:87:8e:b8:35:53:2d:8e:79:a0:cb:c9: 5f:97:66:75:52:12:68:6d:1b:9c:c4:0f:0e:65:bf:7b: e1:a4:82:eb:82:e7:7d:ef:0b:49:d5:9c:72:7a:19:4a: f2:59:37:98:bd:11:84:cc:4d:39:18:09:c1:14:7b:0f: 74:95:76:a2:d5:82:16:57:87:a3:68:8e:1a:ba:ce:ea: f9:bb:d3:fa:15:65:dc:8a:84:55:db:a2:01:2f:85:73: d0:00:d8:ef:e2:e3:40:91:e8:61:09:eb:a5:d1:01:05: 6a:0b:4f:fc:d4:23:56:d4:cf:64:11:ab:28:15:af:e0 Fingerprint (SHA-256): DC:A8:44:78:BE:E7:3C:FC:90:F7:E5:E4:EF:67:66:1E:86:4C:30:B4:30:B5:AF:5E:95:A4:1E:AA:FC:07:73:09 Fingerprint (SHA1): E6:89:5C:59:A7:8E:D4:2B:90:D0:DD:40:D0:21:FB:DA:04:94:FE:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142933 (0x3cafa0d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:12 2023 Not After : Wed Oct 18 14:33:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:5a:88:32:d6:42:ed:09:af:5e:46:fc:53:ba:e5:25: 11:cf:44:6c:af:84:e8:b3:14:88:bb:1b:6c:7a:f6:cb: eb:42:2d:86:72:f4:b7:fc:03:ae:da:8a:be:69:9b:ee: 4e:c2:6a:93:16:d0:c2:c9:31:c2:aa:34:89:bd:a6:d6: 03:8d:9a:50:5b:8c:ef:04:2e:9e:a8:31:aa:ae:54:cd: e0:01:7c:e6:14:a8:b9:f3:0e:b5:e1:75:7c:31:fb:ca: ce:de:73:fa:04:c3:fc:8e:2e:4b:65:6e:1f:ea:fc:09: e1:cf:eb:55:6a:5a:06:49:b1:03:15:7e:e8:b5:88:fa: 12:ad:9e:26:79:c4:b6:7f:ba:f1:c0:27:af:c5:aa:6f: fe:58:2d:99:90:26:30:50:da:a8:60:2f:66:fe:c3:ee: b8:fc:cb:9c:74:9f:a1:8a:91:a5:c2:29:c2:a7:40:d6: d3:d3:53:7c:6b:89:9c:3b:16:cf:bb:0f:a5:e8:77:a8: 9f:3e:9a:55:1e:c8:c8:61:d0:f8:ca:c4:be:aa:82:f9: 5f:2e:be:e0:89:f2:29:e4:77:3f:32:8a:71:ee:20:0b: df:30:8b:3b:85:ea:f0:a8:8b:ae:c6:34:71:2d:c4:96: 68:08:f3:ed:43:ca:80:57:77:28:08:6e:8c:8e:50:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:53:67:7e:f7:a9:b8:44:54:c1:d0:47:6b:df:47:ee: a6:39:65:6c:11:0d:6b:c3:09:7c:fb:a0:f8:61:30:8e: 84:df:41:b0:d4:0d:a4:86:a8:69:d3:9f:f9:35:3b:a2: cf:33:64:29:46:5f:31:7f:ab:46:ba:57:b3:36:40:e5: 84:10:cd:d7:c8:16:ea:43:c2:2e:3b:5e:89:a1:d4:b0: db:5c:bd:64:c4:dd:f2:91:76:aa:93:72:77:96:2f:64: 76:b3:49:62:64:fc:d0:fc:fb:eb:1b:f1:65:0e:7e:76: c3:b6:8b:71:4f:66:6d:50:4f:76:77:33:e2:6c:c8:8e: ca:fd:d7:b2:35:58:f1:13:4f:68:35:71:e4:b3:69:3d: 0e:9c:a0:19:b9:38:ec:15:90:80:70:b7:f2:8c:3c:c8: f1:16:51:5f:24:f3:b6:bc:b5:eb:63:ba:d1:c9:46:43: 9b:46:93:49:25:0a:3d:e8:d6:88:63:64:2e:c6:1f:ac: 21:57:bc:ab:5f:91:99:05:61:ea:38:29:5f:dc:15:a2: 06:0e:6b:01:03:22:32:48:a5:4f:41:9d:1c:fb:2a:d9: bd:da:b0:de:cc:e4:6c:9d:47:d2:3e:9a:08:de:be:5f: a8:a2:ee:23:9b:01:1c:9b:65:14:80:c7:c6:7f:b2:d6 Fingerprint (SHA-256): 5D:C4:29:1F:0B:B0:00:C0:2E:E1:43:43:82:A1:04:74:54:EA:91:87:E5:0F:8D:AA:6B:46:C0:19:A3:4D:DA:62 Fingerprint (SHA1): 0D:B1:28:0C:BD:DC:0B:79:0E:66:E2:6A:13:4C:4A:DB:BB:5D:18:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142933 (0x3cafa0d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:33:12 2023 Not After : Wed Oct 18 14:33:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:5a:88:32:d6:42:ed:09:af:5e:46:fc:53:ba:e5:25: 11:cf:44:6c:af:84:e8:b3:14:88:bb:1b:6c:7a:f6:cb: eb:42:2d:86:72:f4:b7:fc:03:ae:da:8a:be:69:9b:ee: 4e:c2:6a:93:16:d0:c2:c9:31:c2:aa:34:89:bd:a6:d6: 03:8d:9a:50:5b:8c:ef:04:2e:9e:a8:31:aa:ae:54:cd: e0:01:7c:e6:14:a8:b9:f3:0e:b5:e1:75:7c:31:fb:ca: ce:de:73:fa:04:c3:fc:8e:2e:4b:65:6e:1f:ea:fc:09: e1:cf:eb:55:6a:5a:06:49:b1:03:15:7e:e8:b5:88:fa: 12:ad:9e:26:79:c4:b6:7f:ba:f1:c0:27:af:c5:aa:6f: fe:58:2d:99:90:26:30:50:da:a8:60:2f:66:fe:c3:ee: b8:fc:cb:9c:74:9f:a1:8a:91:a5:c2:29:c2:a7:40:d6: d3:d3:53:7c:6b:89:9c:3b:16:cf:bb:0f:a5:e8:77:a8: 9f:3e:9a:55:1e:c8:c8:61:d0:f8:ca:c4:be:aa:82:f9: 5f:2e:be:e0:89:f2:29:e4:77:3f:32:8a:71:ee:20:0b: df:30:8b:3b:85:ea:f0:a8:8b:ae:c6:34:71:2d:c4:96: 68:08:f3:ed:43:ca:80:57:77:28:08:6e:8c:8e:50:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:53:67:7e:f7:a9:b8:44:54:c1:d0:47:6b:df:47:ee: a6:39:65:6c:11:0d:6b:c3:09:7c:fb:a0:f8:61:30:8e: 84:df:41:b0:d4:0d:a4:86:a8:69:d3:9f:f9:35:3b:a2: cf:33:64:29:46:5f:31:7f:ab:46:ba:57:b3:36:40:e5: 84:10:cd:d7:c8:16:ea:43:c2:2e:3b:5e:89:a1:d4:b0: db:5c:bd:64:c4:dd:f2:91:76:aa:93:72:77:96:2f:64: 76:b3:49:62:64:fc:d0:fc:fb:eb:1b:f1:65:0e:7e:76: c3:b6:8b:71:4f:66:6d:50:4f:76:77:33:e2:6c:c8:8e: ca:fd:d7:b2:35:58:f1:13:4f:68:35:71:e4:b3:69:3d: 0e:9c:a0:19:b9:38:ec:15:90:80:70:b7:f2:8c:3c:c8: f1:16:51:5f:24:f3:b6:bc:b5:eb:63:ba:d1:c9:46:43: 9b:46:93:49:25:0a:3d:e8:d6:88:63:64:2e:c6:1f:ac: 21:57:bc:ab:5f:91:99:05:61:ea:38:29:5f:dc:15:a2: 06:0e:6b:01:03:22:32:48:a5:4f:41:9d:1c:fb:2a:d9: bd:da:b0:de:cc:e4:6c:9d:47:d2:3e:9a:08:de:be:5f: a8:a2:ee:23:9b:01:1c:9b:65:14:80:c7:c6:7f:b2:d6 Fingerprint (SHA-256): 5D:C4:29:1F:0B:B0:00:C0:2E:E1:43:43:82:A1:04:74:54:EA:91:87:E5:0F:8D:AA:6B:46:C0:19:A3:4D:DA:62 Fingerprint (SHA1): 0D:B1:28:0C:BD:DC:0B:79:0E:66:E2:6A:13:4C:4A:DB:BB:5D:18:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142934 (0x3cafa0d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:13 2023 Not After : Wed Oct 18 14:33:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:e2:74:de:ba:3f:46:d0:08:21:ec:8d:ee:19:69:7b: 59:64:3f:32:b9:50:30:0a:92:c1:33:46:c8:a5:9d:91: 15:9e:54:e5:d4:49:98:4f:3f:46:c7:83:2c:6f:05:f8: fb:b0:54:68:b4:cc:87:00:68:c6:60:3b:64:74:0e:bf: f1:a7:ac:a6:33:94:e5:3a:3b:19:28:e1:8d:43:de:e5: c3:a8:3f:3f:7e:13:cc:eb:ce:78:b5:e2:6f:7c:79:d3: b3:a6:fd:f3:aa:3d:43:24:fd:01:a4:de:71:16:2a:89: f0:7d:b9:30:49:50:32:72:01:f8:61:37:ad:2d:b7:7d: 7c:0e:7d:e2:c0:84:2a:8d:75:b8:3c:20:f3:ec:ed:7a: 98:fa:c5:40:9a:80:a7:86:5b:59:8f:45:0f:2c:cf:b5: 42:da:a5:86:49:88:c9:cd:80:ef:b7:67:e1:7e:aa:e6: b4:a7:26:97:a9:a5:39:4f:08:2f:64:88:00:49:18:6a: cc:c6:c5:2f:16:f4:5d:3b:48:bc:dc:e8:16:fe:90:d2: cf:4f:92:19:2b:75:9e:5b:0e:21:7a:17:f2:e7:9e:6f: b8:c1:41:61:94:a9:6a:b7:24:a5:66:58:5d:cf:bd:cd: b9:c0:b3:9e:1c:e1:31:92:91:bc:f0:24:dc:1c:b6:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:bf:26:3a:a8:53:9c:3a:9d:77:ab:5e:5f:d1:72:11: 1c:b9:e7:33:44:93:3e:d6:e4:89:ad:11:0e:b4:9d:91: 29:39:0c:56:96:88:16:a8:f9:8d:c7:c4:f0:f1:42:7e: c9:8f:8a:db:a2:3e:a7:54:60:5a:ea:3a:af:37:97:e2: 2e:23:23:00:e5:e6:f9:fc:93:97:e3:43:4f:50:a5:ea: a5:4a:56:55:52:b5:42:0a:bf:3f:e9:76:bc:0f:c8:04: e5:5b:e0:25:5c:7f:a9:bc:cd:5f:05:d5:e1:df:de:28: 4a:6d:86:2b:c2:d6:4f:db:15:a9:9f:04:12:12:87:6c: 7f:0a:b9:41:f4:9d:96:53:24:af:52:4b:f1:bd:aa:47: fd:36:ea:15:3b:86:f8:e5:2e:40:ec:61:c5:3e:1e:10: 02:dd:71:f2:00:50:53:ed:27:55:97:4d:70:f2:51:ee: 13:54:7b:f6:87:d2:cb:50:0d:ee:5f:a1:03:82:e2:37: ca:98:99:e6:a6:5d:ce:f0:d9:42:15:5e:31:a3:f4:34: 87:c9:96:8a:7a:8c:12:4f:16:58:af:80:dd:91:ee:cf: 93:2c:08:13:89:1a:d8:0e:5c:2a:75:97:a8:14:f8:11: d2:e3:4e:dc:0d:c4:4e:d5:bd:7e:7b:b6:0c:31:86:86 Fingerprint (SHA-256): ED:9F:EF:08:53:F9:40:24:71:22:D4:A3:BB:ED:15:85:04:F8:4F:44:AB:4C:85:0B:73:1B:C5:C9:8B:28:88:5A Fingerprint (SHA1): DB:7A:BF:67:62:78:B3:B7:1E:04:AE:08:B5:A5:16:29:FA:B0:28:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142934 (0x3cafa0d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:33:13 2023 Not After : Wed Oct 18 14:33:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:e2:74:de:ba:3f:46:d0:08:21:ec:8d:ee:19:69:7b: 59:64:3f:32:b9:50:30:0a:92:c1:33:46:c8:a5:9d:91: 15:9e:54:e5:d4:49:98:4f:3f:46:c7:83:2c:6f:05:f8: fb:b0:54:68:b4:cc:87:00:68:c6:60:3b:64:74:0e:bf: f1:a7:ac:a6:33:94:e5:3a:3b:19:28:e1:8d:43:de:e5: c3:a8:3f:3f:7e:13:cc:eb:ce:78:b5:e2:6f:7c:79:d3: b3:a6:fd:f3:aa:3d:43:24:fd:01:a4:de:71:16:2a:89: f0:7d:b9:30:49:50:32:72:01:f8:61:37:ad:2d:b7:7d: 7c:0e:7d:e2:c0:84:2a:8d:75:b8:3c:20:f3:ec:ed:7a: 98:fa:c5:40:9a:80:a7:86:5b:59:8f:45:0f:2c:cf:b5: 42:da:a5:86:49:88:c9:cd:80:ef:b7:67:e1:7e:aa:e6: b4:a7:26:97:a9:a5:39:4f:08:2f:64:88:00:49:18:6a: cc:c6:c5:2f:16:f4:5d:3b:48:bc:dc:e8:16:fe:90:d2: cf:4f:92:19:2b:75:9e:5b:0e:21:7a:17:f2:e7:9e:6f: b8:c1:41:61:94:a9:6a:b7:24:a5:66:58:5d:cf:bd:cd: b9:c0:b3:9e:1c:e1:31:92:91:bc:f0:24:dc:1c:b6:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:bf:26:3a:a8:53:9c:3a:9d:77:ab:5e:5f:d1:72:11: 1c:b9:e7:33:44:93:3e:d6:e4:89:ad:11:0e:b4:9d:91: 29:39:0c:56:96:88:16:a8:f9:8d:c7:c4:f0:f1:42:7e: c9:8f:8a:db:a2:3e:a7:54:60:5a:ea:3a:af:37:97:e2: 2e:23:23:00:e5:e6:f9:fc:93:97:e3:43:4f:50:a5:ea: a5:4a:56:55:52:b5:42:0a:bf:3f:e9:76:bc:0f:c8:04: e5:5b:e0:25:5c:7f:a9:bc:cd:5f:05:d5:e1:df:de:28: 4a:6d:86:2b:c2:d6:4f:db:15:a9:9f:04:12:12:87:6c: 7f:0a:b9:41:f4:9d:96:53:24:af:52:4b:f1:bd:aa:47: fd:36:ea:15:3b:86:f8:e5:2e:40:ec:61:c5:3e:1e:10: 02:dd:71:f2:00:50:53:ed:27:55:97:4d:70:f2:51:ee: 13:54:7b:f6:87:d2:cb:50:0d:ee:5f:a1:03:82:e2:37: ca:98:99:e6:a6:5d:ce:f0:d9:42:15:5e:31:a3:f4:34: 87:c9:96:8a:7a:8c:12:4f:16:58:af:80:dd:91:ee:cf: 93:2c:08:13:89:1a:d8:0e:5c:2a:75:97:a8:14:f8:11: d2:e3:4e:dc:0d:c4:4e:d5:bd:7e:7b:b6:0c:31:86:86 Fingerprint (SHA-256): ED:9F:EF:08:53:F9:40:24:71:22:D4:A3:BB:ED:15:85:04:F8:4F:44:AB:4C:85:0B:73:1B:C5:C9:8B:28:88:5A Fingerprint (SHA1): DB:7A:BF:67:62:78:B3:B7:1E:04:AE:08:B5:A5:16:29:FA:B0:28:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142937 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018142938 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142939 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018142940 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018142941 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018142942 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018142943 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142937 (0x3cafa0d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:21 2023 Not After : Wed Oct 18 14:33:21 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:23:a1:3d:d3:f6:8a:57:65:e2:04:ef:8f:f5:2a:11: bb:0a:e4:76:cb:1f:b5:5b:e0:c4:e4:5d:f5:02:5c:2e: 08:3d:db:44:4d:37:e6:a1:9c:43:91:93:74:59:41:4a: 60:62:87:32:95:9f:64:02:cd:25:7f:56:06:42:d5:c9: 1f:cb:d8:db:e2:71:48:cc:75:8b:69:a5:f0:a5:a0:4c: f8:6b:7e:ed:89:60:95:39:2d:d5:60:3a:9d:12:9b:a2: 2e:13:35:23:a3:89:0d:e9:95:40:38:b0:7b:5e:b0:9f: c2:0a:bb:47:40:cd:56:c2:c2:0b:8b:c9:8d:c5:cc:22: b7:46:64:0a:f7:4d:81:44:af:40:68:a5:be:d1:83:b2: ce:ff:8c:a1:7f:fb:30:d9:8c:39:15:71:bc:ac:5b:02: dc:b1:38:7e:b1:c6:e6:bc:9a:8b:a5:7a:41:09:d1:37: ce:c7:45:26:d0:40:fb:f4:66:b9:f5:7e:13:f2:c2:70: d1:1c:53:95:bb:43:32:bc:94:e6:c0:0a:36:95:3a:f9: 9e:e9:b1:28:e2:02:ba:c2:c9:d7:09:e3:dd:86:ea:36: 20:eb:40:98:d6:f3:26:0a:74:ed:74:b5:93:30:6d:03: 0e:c7:8b:96:63:8c:c0:1c:1a:08:bf:6f:9a:66:cb:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:f0:d1:1d:06:a2:8b:fb:a3:fa:13:d2:c4:6a:2f:f7: b6:d9:4f:83:5b:87:e6:94:2c:f6:f5:ea:ab:92:e9:f2: 96:e5:b5:52:4a:b0:43:48:7b:71:6a:b4:fd:af:eb:87: 58:b5:d2:a4:f3:14:30:7c:7c:b4:40:e4:fb:82:76:2c: b5:ee:fd:bc:6e:98:2c:6c:a5:c5:84:dc:82:e0:4c:f1: 09:9e:ae:4b:87:d9:ac:db:b9:13:cb:1f:82:ec:35:1a: 88:47:db:a8:e3:cc:24:6a:79:1d:15:71:a2:0d:ca:4d: c0:c2:ff:93:f5:2b:40:ef:0d:66:85:82:fa:46:ff:4d: 67:f0:89:20:97:1d:e0:39:e0:6a:80:45:d5:c5:c8:cd: 39:34:64:ee:6a:a5:51:84:ff:93:0c:21:21:a1:91:27: aa:31:d8:7e:eb:b7:75:95:60:96:47:a3:c1:87:8e:2b: 77:ee:9c:20:28:32:03:61:30:d4:8f:aa:1e:0e:7e:ac: f3:de:3e:58:6c:38:97:44:4e:94:0c:ac:d6:ba:ba:58: 9d:dd:d9:a4:70:85:a2:ae:4e:78:59:16:99:e5:b3:0b: 49:5b:2f:b7:a7:34:06:d5:56:7f:59:26:ea:65:77:f8: b9:0b:eb:09:ef:66:48:fa:f3:ad:43:38:77:ca:ba:29 Fingerprint (SHA-256): CA:C9:76:F0:EE:14:F5:56:B4:54:6D:4E:FB:52:7F:3A:4A:79:64:C5:44:E8:74:18:0E:50:EB:83:A6:3E:8B:91 Fingerprint (SHA1): 4D:52:E4:88:3C:4E:AC:6E:9A:33:CF:27:6C:B8:70:33:24:7A:81:32 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142937 (0x3cafa0d9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:21 2023 Not After : Wed Oct 18 14:33:21 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:23:a1:3d:d3:f6:8a:57:65:e2:04:ef:8f:f5:2a:11: bb:0a:e4:76:cb:1f:b5:5b:e0:c4:e4:5d:f5:02:5c:2e: 08:3d:db:44:4d:37:e6:a1:9c:43:91:93:74:59:41:4a: 60:62:87:32:95:9f:64:02:cd:25:7f:56:06:42:d5:c9: 1f:cb:d8:db:e2:71:48:cc:75:8b:69:a5:f0:a5:a0:4c: f8:6b:7e:ed:89:60:95:39:2d:d5:60:3a:9d:12:9b:a2: 2e:13:35:23:a3:89:0d:e9:95:40:38:b0:7b:5e:b0:9f: c2:0a:bb:47:40:cd:56:c2:c2:0b:8b:c9:8d:c5:cc:22: b7:46:64:0a:f7:4d:81:44:af:40:68:a5:be:d1:83:b2: ce:ff:8c:a1:7f:fb:30:d9:8c:39:15:71:bc:ac:5b:02: dc:b1:38:7e:b1:c6:e6:bc:9a:8b:a5:7a:41:09:d1:37: ce:c7:45:26:d0:40:fb:f4:66:b9:f5:7e:13:f2:c2:70: d1:1c:53:95:bb:43:32:bc:94:e6:c0:0a:36:95:3a:f9: 9e:e9:b1:28:e2:02:ba:c2:c9:d7:09:e3:dd:86:ea:36: 20:eb:40:98:d6:f3:26:0a:74:ed:74:b5:93:30:6d:03: 0e:c7:8b:96:63:8c:c0:1c:1a:08:bf:6f:9a:66:cb:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:f0:d1:1d:06:a2:8b:fb:a3:fa:13:d2:c4:6a:2f:f7: b6:d9:4f:83:5b:87:e6:94:2c:f6:f5:ea:ab:92:e9:f2: 96:e5:b5:52:4a:b0:43:48:7b:71:6a:b4:fd:af:eb:87: 58:b5:d2:a4:f3:14:30:7c:7c:b4:40:e4:fb:82:76:2c: b5:ee:fd:bc:6e:98:2c:6c:a5:c5:84:dc:82:e0:4c:f1: 09:9e:ae:4b:87:d9:ac:db:b9:13:cb:1f:82:ec:35:1a: 88:47:db:a8:e3:cc:24:6a:79:1d:15:71:a2:0d:ca:4d: c0:c2:ff:93:f5:2b:40:ef:0d:66:85:82:fa:46:ff:4d: 67:f0:89:20:97:1d:e0:39:e0:6a:80:45:d5:c5:c8:cd: 39:34:64:ee:6a:a5:51:84:ff:93:0c:21:21:a1:91:27: aa:31:d8:7e:eb:b7:75:95:60:96:47:a3:c1:87:8e:2b: 77:ee:9c:20:28:32:03:61:30:d4:8f:aa:1e:0e:7e:ac: f3:de:3e:58:6c:38:97:44:4e:94:0c:ac:d6:ba:ba:58: 9d:dd:d9:a4:70:85:a2:ae:4e:78:59:16:99:e5:b3:0b: 49:5b:2f:b7:a7:34:06:d5:56:7f:59:26:ea:65:77:f8: b9:0b:eb:09:ef:66:48:fa:f3:ad:43:38:77:ca:ba:29 Fingerprint (SHA-256): CA:C9:76:F0:EE:14:F5:56:B4:54:6D:4E:FB:52:7F:3A:4A:79:64:C5:44:E8:74:18:0E:50:EB:83:A6:3E:8B:91 Fingerprint (SHA1): 4D:52:E4:88:3C:4E:AC:6E:9A:33:CF:27:6C:B8:70:33:24:7A:81:32 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142944 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018142945 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018142946 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018142947 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018142948 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018142949 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018142950 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018142951 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018142952 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018142953 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018142954 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018142955 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018142956 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018142957 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018142958 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018142959 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018142960 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018142961 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018142962 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018142963 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018142964 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018142965 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018142966 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018142967 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018142968 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018142969 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018142970 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018142971 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018142972 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018142973 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142944 (0x3cafa0e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:33:31 2023 Not After : Wed Oct 18 14:33:31 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:5a:5a:f3:d6:e9:fc:74:ff:d1:ec:4b:1d:ab:b4:f9: a3:f1:5d:ac:88:c3:c4:3f:f6:44:c6:8e:d2:21:a1:dc: b9:1f:4a:03:f7:0b:05:14:ea:a6:4a:74:64:4a:b4:ff: 23:42:68:d3:97:66:8e:e5:9b:cb:5d:f8:b6:14:de:91: ff:f9:08:65:aa:75:ff:9e:15:64:d2:cd:2e:de:50:44: c1:d4:14:24:dc:f0:1e:9a:9c:e1:f2:24:2e:40:df:2d: 48:0b:f9:3b:88:db:d2:af:76:e4:bf:61:30:13:69:c1: b1:dc:33:e8:78:02:20:2e:01:8e:da:d5:9d:9d:2d:2d: 27:70:97:28:82:ab:52:8e:5b:1c:c8:cf:96:43:4b:14: 2a:5d:d1:cc:b9:52:c1:f0:b2:52:48:57:14:00:05:d3: 16:cb:c7:e8:87:88:a4:a4:e5:e9:0c:f1:0f:ad:d0:da: 62:b6:d1:e9:d9:af:5c:d5:92:fe:ba:f2:fe:db:8d:83: cc:37:73:cb:c3:57:c4:54:02:f9:e7:fd:57:f7:79:f1: e9:e9:be:18:e6:7d:9e:01:09:7e:f5:81:f4:1f:60:01: 9a:b9:e1:61:bb:8a:06:70:a0:c7:8b:ec:7f:10:20:e0: e7:bf:56:ee:9f:48:fd:16:25:9e:51:79:2e:d4:5d:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:b8:44:49:57:a7:a1:ec:78:27:6f:ba:3a:ec:53:3a: b7:67:35:93:bc:b6:fc:10:dd:3e:8b:3b:09:c1:03:68: 4f:56:b2:96:ac:ea:64:d3:a9:94:cb:26:57:e7:80:e3: 5b:53:5f:89:96:fd:21:95:1a:76:d1:ed:5a:e4:5e:9d: 51:df:86:fd:be:05:71:28:35:d5:b9:f0:08:10:8d:7b: a3:d1:1f:c3:2a:d5:21:7f:58:1d:aa:03:2b:a8:01:75: 28:d5:2c:7f:07:4f:db:da:04:1e:e2:f4:aa:8a:17:f1: 2c:96:2f:d9:9b:ef:6a:2a:26:e6:ed:d9:aa:c7:d9:00: 96:aa:95:85:ea:d9:a1:81:25:89:ae:2a:cc:0b:70:a9: 16:79:e4:3d:af:58:21:5c:8b:63:32:e3:a4:dc:a0:f3: 1b:d8:fd:c0:82:54:2f:b3:43:b7:51:9a:42:3e:c8:e1: d0:b9:ac:5a:c2:0c:65:34:96:b5:d3:67:d5:eb:b0:50: de:43:6b:6a:ae:d4:85:02:94:49:05:d4:e6:f7:52:3f: b2:6e:d7:9f:05:e5:e3:3f:0b:78:f5:dc:0b:98:2f:f6: 39:35:db:f3:38:98:da:87:bc:32:9f:47:8c:77:d3:17: ef:fc:a8:87:95:00:38:11:b1:fd:1d:47:30:16:3c:9c Fingerprint (SHA-256): 00:37:5B:67:C3:A0:34:6C:88:CD:19:83:8D:25:7C:92:3A:C3:B2:95:23:8F:17:21:37:F0:1C:67:67:34:9D:B3 Fingerprint (SHA1): 35:EA:5E:BD:A8:F2:37:D5:9B:D8:7E:79:26:92:DA:54:6E:82:A7:0E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142974 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018142975 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018142976 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018142977 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018142978 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018142979 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018142980 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142974 (0x3cafa0fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:13 2023 Not After : Wed Oct 18 14:34:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:77:27:3a:14:33:a0:91:65:05:32:f0:56:ca:9b:96: c4:84:2c:51:93:70:39:a7:53:b3:19:c1:4a:b9:53:9f: 60:c0:66:21:5e:54:22:65:cc:25:bd:50:c0:af:3d:f4: 21:ca:2f:f0:02:1e:8c:ad:3c:82:35:6e:de:c8:ac:45: 69:e2:4e:f6:b2:81:51:dc:0e:2a:d5:d2:51:f1:75:11: ff:1e:d1:c7:17:6f:49:19:79:b2:91:09:bc:a6:56:f0: 6d:85:08:27:58:50:06:0f:d8:6e:36:4e:e4:af:58:20: cb:2a:fa:20:1d:f1:66:00:33:0f:99:85:3b:b7:88:c7: 31:14:6a:2b:ed:79:1a:b1:70:20:55:7e:38:ec:7e:01: 1c:4e:84:2d:17:ff:61:3d:18:04:09:fb:6d:be:35:01: 36:27:80:c4:a9:97:b1:7c:ec:98:71:dd:26:c3:7a:0a: ee:27:0b:70:ef:ce:d7:87:c1:e7:ae:09:9c:2b:e8:1c: af:89:20:e6:19:62:1d:b3:b0:09:b8:5d:6a:ab:fa:1d: 38:57:37:57:cf:52:5e:73:51:95:a5:6e:60:22:f8:f6: 54:38:d9:6f:43:d1:47:b2:d4:b6:b9:1c:32:db:e9:17: 16:c7:1b:ca:e3:f9:38:64:89:78:5e:5f:e9:0e:3e:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:65:27:fc:91:a3:eb:c2:39:51:4e:92:5a:3f:49:94: 73:32:83:0f:33:30:b4:3f:3f:99:25:72:eb:4a:a6:74: 44:3f:8f:f0:67:bd:50:c9:0f:28:21:fe:04:db:2a:79: 86:39:d6:7f:54:bb:c6:69:a1:6a:7b:05:6d:8e:80:14: 97:6f:76:9a:c9:ed:78:0f:38:f4:b5:7a:f8:27:34:50: cb:bd:94:69:45:b9:ba:cf:a9:a7:a9:68:ba:9a:f7:62: 53:cf:69:14:2d:87:9b:13:74:6d:64:95:bd:28:b0:85: c8:9f:12:7e:a0:28:e0:f9:0d:cd:37:fc:0b:40:d6:3d: 21:3a:e4:46:b3:72:5b:32:e3:f8:f7:a1:3d:e8:c0:b6: 0e:84:52:b7:6b:ac:b9:4d:cd:9a:91:2e:4a:62:c3:df: a8:25:87:ee:ff:29:fc:f5:4e:56:be:84:1b:bc:4b:26: c0:29:4e:f1:eb:c5:a6:20:f3:1d:80:b4:07:ce:55:a6: 5e:cf:9e:ed:c6:89:6c:3f:db:f7:15:1b:ac:54:41:fd: 33:33:5c:2d:cf:8f:48:01:a5:a0:7a:af:0d:b7:31:4c: a9:9b:fa:f0:6c:6b:7a:b1:ff:02:fd:62:cd:ce:bd:64: 43:ac:bc:52:af:33:d4:f9:b2:51:97:fc:57:4d:89:d5 Fingerprint (SHA-256): E3:9B:4B:C8:EF:BB:A4:C0:3A:97:B7:9C:F5:CC:8B:D6:BC:D5:1E:F8:9C:D0:C6:78:2E:6B:4D:09:04:4A:3D:3C Fingerprint (SHA1): EC:1D:67:F2:5B:03:52:B0:04:E9:BD:88:3E:84:35:C7:31:2F:6A:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142974 (0x3cafa0fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:13 2023 Not After : Wed Oct 18 14:34:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:77:27:3a:14:33:a0:91:65:05:32:f0:56:ca:9b:96: c4:84:2c:51:93:70:39:a7:53:b3:19:c1:4a:b9:53:9f: 60:c0:66:21:5e:54:22:65:cc:25:bd:50:c0:af:3d:f4: 21:ca:2f:f0:02:1e:8c:ad:3c:82:35:6e:de:c8:ac:45: 69:e2:4e:f6:b2:81:51:dc:0e:2a:d5:d2:51:f1:75:11: ff:1e:d1:c7:17:6f:49:19:79:b2:91:09:bc:a6:56:f0: 6d:85:08:27:58:50:06:0f:d8:6e:36:4e:e4:af:58:20: cb:2a:fa:20:1d:f1:66:00:33:0f:99:85:3b:b7:88:c7: 31:14:6a:2b:ed:79:1a:b1:70:20:55:7e:38:ec:7e:01: 1c:4e:84:2d:17:ff:61:3d:18:04:09:fb:6d:be:35:01: 36:27:80:c4:a9:97:b1:7c:ec:98:71:dd:26:c3:7a:0a: ee:27:0b:70:ef:ce:d7:87:c1:e7:ae:09:9c:2b:e8:1c: af:89:20:e6:19:62:1d:b3:b0:09:b8:5d:6a:ab:fa:1d: 38:57:37:57:cf:52:5e:73:51:95:a5:6e:60:22:f8:f6: 54:38:d9:6f:43:d1:47:b2:d4:b6:b9:1c:32:db:e9:17: 16:c7:1b:ca:e3:f9:38:64:89:78:5e:5f:e9:0e:3e:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:65:27:fc:91:a3:eb:c2:39:51:4e:92:5a:3f:49:94: 73:32:83:0f:33:30:b4:3f:3f:99:25:72:eb:4a:a6:74: 44:3f:8f:f0:67:bd:50:c9:0f:28:21:fe:04:db:2a:79: 86:39:d6:7f:54:bb:c6:69:a1:6a:7b:05:6d:8e:80:14: 97:6f:76:9a:c9:ed:78:0f:38:f4:b5:7a:f8:27:34:50: cb:bd:94:69:45:b9:ba:cf:a9:a7:a9:68:ba:9a:f7:62: 53:cf:69:14:2d:87:9b:13:74:6d:64:95:bd:28:b0:85: c8:9f:12:7e:a0:28:e0:f9:0d:cd:37:fc:0b:40:d6:3d: 21:3a:e4:46:b3:72:5b:32:e3:f8:f7:a1:3d:e8:c0:b6: 0e:84:52:b7:6b:ac:b9:4d:cd:9a:91:2e:4a:62:c3:df: a8:25:87:ee:ff:29:fc:f5:4e:56:be:84:1b:bc:4b:26: c0:29:4e:f1:eb:c5:a6:20:f3:1d:80:b4:07:ce:55:a6: 5e:cf:9e:ed:c6:89:6c:3f:db:f7:15:1b:ac:54:41:fd: 33:33:5c:2d:cf:8f:48:01:a5:a0:7a:af:0d:b7:31:4c: a9:9b:fa:f0:6c:6b:7a:b1:ff:02:fd:62:cd:ce:bd:64: 43:ac:bc:52:af:33:d4:f9:b2:51:97:fc:57:4d:89:d5 Fingerprint (SHA-256): E3:9B:4B:C8:EF:BB:A4:C0:3A:97:B7:9C:F5:CC:8B:D6:BC:D5:1E:F8:9C:D0:C6:78:2E:6B:4D:09:04:4A:3D:3C Fingerprint (SHA1): EC:1D:67:F2:5B:03:52:B0:04:E9:BD:88:3E:84:35:C7:31:2F:6A:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142981 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142982 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142983 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142984 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142981 (0x3cafa105) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:24 2023 Not After : Wed Oct 18 14:34:24 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b0:10:62:8e:3f:1c:96:21:05:5f:3f:86:22:81:f6: 4c:de:11:73:38:e0:70:e0:b0:9f:64:63:fb:ae:20:fc: b3:51:6e:cc:aa:1b:47:79:f8:c7:3b:10:cc:2a:b9:b4: ac:82:cb:4f:9c:1d:09:36:4f:d7:eb:da:14:09:d2:6f: d2:77:5c:9a:8b:a8:b5:a0:a6:c9:27:59:dc:7a:b0:b4: 0c:c4:4f:fe:d5:64:63:07:32:94:fa:06:a7:f2:82:14: 26:b5:5a:f7:5d:a8:7e:25:68:2a:98:18:02:60:bb:42: a9:1f:e0:b9:e6:11:90:fb:0a:44:6b:ce:75:18:6b:2a: 85:1d:0f:ea:8e:e8:f1:f2:5a:62:23:d4:27:35:1e:5b: d7:87:dd:bd:9c:0e:82:c0:14:82:b4:59:ee:55:12:62: e1:4b:18:8c:21:32:6c:67:31:80:4a:fd:0b:f0:e3:5b: 42:3a:80:9b:cf:cb:b8:66:a3:f6:e9:4b:d7:33:07:c8: 26:5f:1d:ce:f9:8c:cc:a9:24:a7:81:99:b5:6a:97:33: d2:f9:6f:2f:95:cb:13:41:e1:d0:ae:d4:02:22:12:54: 2d:d1:fb:49:83:d1:52:07:1e:4a:50:df:43:6a:53:72: 7a:c4:d9:6a:59:6c:80:b2:87:9a:34:b3:8b:bd:98:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:e3:4b:f5:a9:71:c4:56:7d:af:ab:7d:6e:73:09:46: 70:9b:7f:3b:2e:a3:53:9d:5c:6e:3c:60:55:db:87:fa: 24:02:24:32:b4:c4:02:55:1f:e2:a5:1c:e2:1b:3a:c5: 6f:36:6e:17:56:3e:1f:fc:3c:8b:af:de:84:e2:44:c3: 9b:7e:0d:fd:e2:27:11:56:b4:0f:1e:df:47:68:69:79: fd:d0:0d:39:e7:3c:88:dd:b8:87:7d:db:65:b5:99:40: d9:70:e4:4e:db:0a:fa:a5:d2:2a:05:ad:5e:66:7e:68: 5a:bb:cc:b9:1b:db:7d:38:8d:66:32:cf:3d:05:47:4a: e8:f7:ee:47:9e:4b:4c:de:a8:65:dd:42:6f:42:d5:ea: d9:a1:a0:75:d9:1c:b3:0e:b5:cf:1d:cb:32:b7:47:ec: 6e:38:f8:12:4f:e6:e8:1b:47:e8:c3:9d:26:2c:88:72: 84:f1:8b:5f:c1:4f:91:c3:f9:46:ee:ea:16:3d:a9:06: ae:55:29:b2:f7:6d:fc:0b:2a:bf:84:c2:f4:90:b0:af: ba:03:2d:bd:09:a9:ad:28:3a:15:f7:0f:00:1a:69:25: eb:bf:fb:c1:bf:21:6d:ca:79:31:ce:57:c6:2f:a0:f2: 3c:6c:b3:99:6a:50:c3:0b:57:c9:e9:fb:67:e2:d7:66 Fingerprint (SHA-256): D6:CF:81:D0:AD:BB:EF:DD:F1:EC:79:B5:BA:3D:6F:CF:67:C4:96:E5:37:9C:9B:3A:85:16:0B:A5:E8:D7:B6:24 Fingerprint (SHA1): 71:21:D8:77:69:5D:3A:B5:A8:32:99:2A:43:04:B7:E6:94:91:D4:DE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142982 (0x3cafa106) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:25 2023 Not After : Wed Oct 18 14:34:25 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:b7:b7:1d:b6:85:ba:da:20:68:6e:5b:27:46:fa:90: 72:ea:c9:d6:29:ce:11:a7:5e:b5:45:73:6b:9b:ff:94: 36:af:15:ad:98:bd:c1:00:15:9d:64:a2:ba:04:32:9d: d8:ee:9c:23:48:f2:e7:eb:6d:33:5a:5f:18:26:4f:fd: 28:34:34:b6:53:a2:5d:10:a6:37:eb:0a:47:d0:12:8d: ef:5d:cd:19:50:e7:fd:a4:89:10:27:e5:d4:7e:c1:fe: 5d:5b:be:06:e7:57:b1:8c:29:c8:e3:90:73:6b:86:39: b5:52:66:67:b4:ec:52:16:48:05:55:a2:ff:ab:a3:ba: a5:58:61:75:10:cf:3f:f2:47:b3:0c:de:f7:9a:de:9f: a9:28:58:11:bf:90:26:1f:2f:b5:61:1c:ef:1a:65:51: 4c:be:0a:c9:49:af:05:ca:fa:7b:b1:53:af:2e:91:40: 4c:85:32:6f:1a:6b:53:f0:1d:84:2b:96:4b:54:27:b7: d5:0d:ae:7f:a0:67:38:ca:bc:76:bf:f1:90:e2:f5:c5: 67:52:c6:3f:6d:7f:5b:e5:82:47:37:22:06:cc:fc:31: 0b:89:02:cb:e2:64:6a:64:19:4a:29:1e:7b:fd:7b:f4: 7e:b9:1a:c0:f7:74:fa:3f:c1:a9:05:a1:e8:68:b6:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:c4:2d:04:30:57:02:c7:87:2b:f2:1f:83:9d:8b:a7: 73:cc:0f:ed:72:70:9f:57:47:07:ab:ed:00:4b:79:e4: 4d:8d:1d:af:27:c5:4d:67:c9:8e:75:80:ac:e0:cd:1b: 03:5f:d6:92:ec:80:6e:0f:69:44:ac:6f:40:81:3d:c9: 39:c9:99:68:c6:3b:7b:88:05:64:b0:53:9a:f0:4a:7b: ec:5c:49:4b:9a:4f:d7:03:a3:00:16:c3:ec:40:62:88: 16:3a:4f:4d:d6:d8:c0:ce:79:a1:44:3f:7a:08:02:dc: 75:f3:01:27:06:76:4a:f9:8d:04:b3:4c:8a:27:4c:e6: 35:03:d6:f9:c0:59:09:4f:c0:d5:9b:7c:35:5b:b9:45: e2:ae:82:db:45:95:86:2b:d7:9b:32:14:b1:99:db:83: eb:f2:fe:e3:31:97:76:57:52:88:8c:88:f5:f5:8a:74: 7b:39:17:28:3c:eb:98:6d:44:30:da:da:22:9d:90:1c: db:0e:1d:6c:7d:96:9d:d1:05:32:f8:4b:33:b3:83:77: c6:bd:7d:38:f8:e4:8e:a2:9a:84:52:d2:7c:dd:2c:7d: aa:48:96:ea:aa:cf:3c:a3:ee:fb:68:4b:6b:0e:87:08: 22:a8:2d:a4:af:d7:68:a0:d1:49:36:4f:f3:89:34:34 Fingerprint (SHA-256): 2B:D4:71:A1:F4:25:B7:56:00:AE:68:93:5F:66:C7:CE:EB:4D:08:23:8D:C3:E1:E2:AD:FD:48:C7:AD:9E:56:9B Fingerprint (SHA1): C4:FE:13:FC:83:85:CA:64:D4:43:25:60:69:FD:F8:F6:68:AB:59:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142983 (0x3cafa107) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:34:26 2023 Not After : Wed Oct 18 14:34:26 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:90:3d:83:8c:48:a7:c5:73:e5:94:5f:40:60:90:c2: dd:85:fd:d1:6c:a5:ab:be:ce:a4:b6:2a:c2:20:c3:7a: 6c:87:77:d0:aa:e2:91:08:86:fa:a8:8b:eb:a3:26:2d: 52:ec:2a:b7:3e:9c:1a:b9:03:16:32:b3:30:01:41:8a: 0f:1d:11:a6:0d:44:9e:f2:4d:bb:60:c3:59:8b:f9:ae: 45:c1:fa:a8:3f:a8:d9:4b:0f:13:41:f5:a7:ef:a1:cc: 24:de:ad:16:28:da:a3:6b:94:d7:8d:e7:df:e1:f1:55: 1b:df:30:d6:e2:2e:b5:fc:b5:c7:16:fc:35:85:4b:eb: f4:7a:ac:e5:b2:27:93:ea:88:90:d8:01:03:fc:27:e6: f9:d8:ab:60:4f:05:43:a5:cf:b1:fd:51:d4:53:ef:ce: 71:1c:91:33:ce:e7:89:95:76:11:66:da:38:2c:66:29: d8:0b:39:96:0a:d3:fc:03:5b:bf:f7:b5:84:20:1e:b8: 40:d2:6b:47:50:e0:ef:a5:ac:9f:1b:91:9c:fc:36:19: 3e:44:1e:9b:6e:00:dd:5a:71:a3:de:7a:64:01:ec:bc: 60:eb:73:ac:e0:63:d0:aa:dd:a4:61:2f:95:73:21:bb: bd:3d:00:5e:7c:5d:3d:c0:67:58:e4:38:a1:6d:e4:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:a0:5f:28:4b:20:c4:8f:60:8e:77:27:01:87:ee:b0: 92:7f:a3:87:0e:02:84:3e:a8:ad:2c:e9:74:58:ae:3c: cc:5e:18:82:55:66:87:db:72:d1:09:91:4d:dd:5c:58: a7:5d:c3:f7:bc:e6:22:22:75:19:a1:c1:20:6f:8c:3c: 28:b5:eb:7b:35:76:03:33:a1:44:2c:a8:a6:5b:ec:69: f3:7b:98:92:b2:a0:bb:84:a8:c8:8a:f0:e2:72:8f:a3: de:57:76:a8:ae:2a:e7:b1:7a:ad:0e:4b:c4:d7:1f:f3: 58:e6:88:a4:d8:1a:c7:50:16:b9:ef:2a:ee:a6:7d:cf: 56:4d:9d:21:98:47:bd:19:af:b7:4c:55:d8:8d:e5:9c: db:d1:78:1a:ef:d7:cb:54:65:eb:25:e3:76:16:6a:a4: 24:82:17:bf:0c:ac:2a:4b:53:e2:89:79:20:45:3d:4d: 54:e5:db:f1:71:b9:2e:0c:80:f7:08:26:a6:a5:32:79: ce:62:88:7b:3b:6f:e6:ee:6c:5a:14:e1:06:ea:2a:df: fe:3f:52:b6:e8:09:41:e1:97:39:cf:68:19:37:c1:44: 3d:9b:b6:2a:1f:b5:99:02:ff:eb:41:2d:66:d3:f4:14: b9:11:b9:82:55:59:c4:06:02:0e:93:f9:38:c0:9e:e1 Fingerprint (SHA-256): 85:83:EA:2D:03:01:02:78:61:D0:19:36:59:4A:54:27:78:05:08:11:72:6D:D0:A9:E9:B0:1B:2E:95:86:EE:34 Fingerprint (SHA1): D9:92:95:F3:10:BA:78:62:5F:F1:DC:3A:11:E8:F6:A4:1D:E6:A9:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142985 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142986 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142987 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018142988 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018142989 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142985 (0x3cafa109) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:30 2023 Not After : Wed Oct 18 14:34:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:68:0a:77:64:c7:9f:73:32:77:08:ef:ae:01:b6:38: 91:4c:d8:e4:93:18:99:b1:8e:94:f8:49:c2:20:48:87: 9b:dc:5b:2e:79:cd:3b:61:00:b5:b4:0e:af:11:34:8b: 51:a9:e5:5e:4b:87:4e:6c:45:7c:8f:fb:5f:c4:aa:27: b0:a2:2e:fb:a3:f5:e2:0c:86:2f:30:83:06:09:9a:e5: 58:18:aa:4c:b2:b6:5c:33:90:4a:cd:9e:1e:14:da:ef: 22:11:ed:d2:38:25:58:2c:eb:65:64:0b:53:dd:d1:18: c7:4f:86:0d:60:f9:1e:99:25:7d:45:fa:47:65:c7:05: f2:41:ad:08:0a:11:94:66:77:a1:9d:4f:e0:9b:84:8d: df:b3:68:f9:24:ee:a7:17:38:af:2a:d1:ee:c8:3a:a2: 42:8c:8a:e7:99:03:5a:78:a7:40:cb:b4:43:c7:c3:00: 22:5e:3e:28:2b:50:77:30:d3:ad:06:76:10:9a:55:7a: 25:7d:59:6b:0c:3c:53:a5:51:fc:b6:27:2b:2c:5d:75: 73:65:7d:a7:ce:47:61:33:18:b1:6f:70:75:0d:19:29: 44:74:1e:e7:39:76:43:f9:37:3c:18:5c:33:5a:36:32: 9a:d0:91:f6:57:ec:45:83:d2:d3:14:b0:34:71:9e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:79:f9:93:19:04:9a:a1:b5:5a:a1:37:56:d5:e6:ea: ed:22:cf:98:a1:a9:f3:09:21:49:ca:eb:c1:58:8b:99: 5a:01:be:9e:72:ac:3a:ac:45:bc:0c:7f:59:33:2f:6e: 68:8d:ab:fb:9e:84:20:ca:a1:22:41:f1:7d:de:0a:33: fc:8e:b4:4f:76:a2:55:fb:1d:3c:75:a1:37:fe:37:2e: 53:22:96:74:2f:17:fa:19:08:95:14:27:1e:0c:c6:66: 89:db:21:e8:0d:06:68:2f:00:21:42:8a:78:1b:86:8f: a1:89:5c:23:25:99:dd:f6:2e:c2:f7:44:f2:c9:07:cb: 7d:5c:a5:b9:b7:77:2d:b8:c1:da:a6:da:2a:e7:76:b0: 7d:0c:3c:a9:1f:9b:c3:c6:da:5c:46:18:84:c2:c2:59: 74:ff:d1:64:ed:0d:62:46:df:0a:23:2d:43:7b:0e:6f: f0:f6:af:d9:1f:9e:0c:71:f1:3e:d7:d5:bc:43:9d:d3: 32:42:28:93:08:77:42:d2:98:07:7c:a0:26:83:6d:62: 2a:7f:c1:ee:6f:7e:81:7a:25:5e:c5:e7:d9:01:fa:af: 60:a2:b7:36:52:1f:ae:4b:c5:16:bf:93:cc:83:43:e7: fd:dc:06:85:1e:1d:36:2a:93:a9:26:aa:8e:b9:9f:cf Fingerprint (SHA-256): B9:54:61:0A:D9:D2:EC:47:08:67:E3:20:BD:CA:5C:D1:49:11:2E:E7:FC:33:8F:D5:0B:5C:72:2F:2D:44:59:01 Fingerprint (SHA1): 14:F6:F9:9D:68:EB:67:71:B6:02:24:5F:BF:45:62:12:A5:D8:4C:09 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142986 (0x3cafa10a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:31 2023 Not After : Wed Oct 18 14:34:31 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 96:10:bb:15:36:8b:3a:9d:cb:c5:0d:84:d7:45:15:df: 15:ad:b1:9c:ac:c0:52:4c:f6:16:63:f1:04:c7:5f:3a: f3:75:1d:52:21:9d:bb:a5:c9:61:48:d5:af:9c:88:d3: dd:63:60:de:41:42:ed:e5:c4:5b:95:17:33:9f:f4:32: 89:e0:18:b3:c6:3b:c5:f4:4e:72:fb:3e:1b:d1:e6:f9: 3a:4b:38:73:7b:86:5b:6e:30:1a:e1:8c:46:53:c7:95: e1:ec:4c:d3:20:bd:7e:59:42:d0:a3:90:51:96:00:05: 59:00:18:84:c7:e8:7c:89:ad:0f:e0:ec:ad:99:9a:c3: 9f:f5:41:f2:27:b4:03:cc:34:83:85:ed:c2:00:7d:83: fa:7f:3f:76:cd:14:f4:69:29:96:ef:72:96:a2:11:a4: f6:9e:c6:29:fa:81:ab:cf:fd:e7:11:34:82:8a:89:14: e2:b5:9a:91:80:7d:19:8e:da:32:4c:24:8a:88:99:ac: 5a:f9:c8:f9:e6:6b:d0:eb:e2:07:23:6e:48:1a:97:a8: 5a:84:15:46:38:ed:00:58:fc:a6:4e:d3:0b:c6:8b:c1: a4:09:81:3a:2a:b3:c3:51:41:b4:2a:60:bb:ee:68:a5: 95:c4:c6:53:99:39:0a:c3:b4:47:96:12:03:7e:30:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:81:ba:00:6f:4a:c5:e5:c2:a0:45:23:bd:1d:43:77: 9c:9b:2c:e1:ee:ba:3e:c1:dd:c3:c1:f2:d7:af:7d:af: 6f:c2:3f:c5:f9:c3:28:fa:f4:68:9f:e1:2d:43:8a:78: 31:be:39:b0:32:3b:00:32:ba:56:85:eb:53:d0:27:f5: 7a:34:10:83:4a:87:05:14:96:c1:4e:e7:ab:fe:7c:a3: 09:2d:87:bd:85:e0:15:24:76:33:0c:3c:04:39:46:4e: ef:fd:69:3b:8c:6d:83:80:1c:14:91:1f:36:a6:7b:30: 57:0d:08:1a:bc:42:4b:92:77:d4:aa:65:64:35:9b:7c: 7a:6e:9a:02:1e:cc:2c:84:9f:b6:df:17:0f:fa:c8:29: 35:17:d6:21:04:f6:5c:84:18:54:0d:e4:77:b3:d1:75: 8e:4b:ed:29:e4:f4:a2:d0:48:c0:7a:14:59:4f:88:c9: 08:17:be:89:e6:7c:2f:9d:5b:d8:d7:0a:d7:bb:9d:dd: 4b:c8:4e:9d:b3:56:a9:9f:6a:62:35:2f:ad:ca:0c:1d: 69:f2:2e:79:2d:c0:7d:60:0e:c5:e0:74:e9:5d:c4:7c: ab:f7:a9:6b:37:b0:40:07:5e:42:48:fe:0a:7d:2f:d0: 6a:ef:6e:ad:da:80:5b:7c:85:29:0e:5b:81:52:5a:2a Fingerprint (SHA-256): 3F:42:BE:39:98:28:40:09:4E:B7:9E:5C:97:07:0A:26:BC:E8:C0:74:FD:B8:C7:E3:95:3A:D8:60:8C:2B:91:75 Fingerprint (SHA1): 30:11:22:C1:C8:70:C0:71:0E:F5:8B:C2:B4:76:43:30:22:43:92:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142987 (0x3cafa10b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:34:33 2023 Not After : Wed Oct 18 14:34:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:ab:81:07:50:42:fe:4b:f3:45:b3:e6:c2:0d:cb:64: 93:de:0c:30:8e:ad:90:a0:4f:d7:6c:79:a2:55:c0:1e: a7:40:9c:f6:fc:e5:94:1c:45:fd:96:bb:72:1c:de:17: 2c:55:03:c8:3e:ca:86:72:e0:01:18:dd:f3:12:83:14: 00:40:36:30:a2:22:b8:63:e7:2e:34:f1:e0:2a:a7:79: 19:f5:d1:19:4d:08:a6:7e:ed:19:70:85:c8:8e:0a:4f: 39:75:b1:2d:e4:f5:06:46:fc:ee:67:da:35:28:e3:c2: 6b:ef:8f:42:bb:f9:95:e9:71:20:2f:d1:39:e1:e9:d5: e7:7b:e0:30:ec:57:fc:d6:11:a1:bc:b5:94:c5:96:32: 47:28:5a:39:4a:21:86:d9:f5:46:e2:b5:3b:36:dc:23: 5d:fa:01:9e:33:20:cb:9c:1a:06:9c:96:c3:92:38:bc: 97:74:80:63:8e:81:6f:e1:84:be:da:ab:7a:09:2c:e9: 20:d4:f6:f5:02:28:26:d3:24:ac:e8:aa:69:90:03:b7: 99:26:6d:02:db:0a:40:42:bf:55:ab:08:00:54:cc:c9: 6d:7a:d7:48:e4:10:23:ab:28:2d:be:da:ed:ec:e9:b9: c6:8c:e5:ad:85:6c:0d:0f:68:bf:00:c2:b8:af:a9:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:0b:df:c6:a3:bc:df:f5:f3:f6:a0:5b:e6:b4:78:86: b3:42:e0:4f:24:01:cb:82:4f:ea:9a:07:46:72:be:ce: df:a1:3f:41:f1:d5:b0:1d:1d:93:1b:5a:35:33:76:e4: 48:51:93:05:70:85:dc:87:06:38:75:a2:c7:47:f2:9f: 1c:94:3a:bb:25:ed:19:95:fe:74:a4:dc:c1:c0:a7:23: ec:a2:c1:16:62:5b:25:45:2c:37:4c:60:78:3c:89:e2: 1e:dd:f8:7e:98:d1:83:fd:9c:e4:e9:ab:f1:d6:06:9f: 42:d1:79:15:e8:fc:09:53:0c:35:f0:81:ef:97:1a:5f: e1:d2:55:10:23:fe:20:32:0d:0f:9a:8b:b4:33:f7:5e: 77:ac:05:7a:77:9f:f0:2d:89:8b:69:b5:07:e9:22:ca: 5c:d1:8e:72:3a:12:69:f0:9c:af:66:68:d4:40:18:64: 43:e3:74:24:b4:7c:4f:3c:6e:0e:2a:09:7a:74:2e:f4: 7d:05:0c:9c:61:b1:b5:9f:92:a2:ea:03:ac:0c:83:43: 25:72:b9:a5:33:be:52:9a:5e:c3:5c:94:86:48:6a:25: d7:31:26:a1:eb:1e:b8:e5:2e:37:54:96:34:09:c0:ac: 60:66:1a:ab:86:26:4d:04:c3:16:ef:66:16:7a:ad:21 Fingerprint (SHA-256): 79:B2:92:73:74:85:C6:2F:24:A1:41:71:29:38:C8:69:4D:9B:9D:84:AF:03:83:C0:F8:BD:2A:8A:66:35:A8:25 Fingerprint (SHA1): 62:58:4F:C8:33:39:37:49:AB:55:DA:13:1C:06:75:30:64:C1:D3:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142990 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018142991 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018142992 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018142753.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018142993 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142990 (0x3cafa10e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:34:39 2023 Not After : Wed Oct 18 14:34:39 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:b4:42:3b:3c:44:fc:3f:ee:c4:77:0b:48:9b:60:d9: 4a:d5:99:7c:40:b2:14:79:2c:5c:41:cd:5c:63:62:12: fb:10:ee:eb:bb:27:77:e5:08:30:73:3e:20:cf:49:18: ed:35:87:c7:0f:26:23:38:9c:b8:a6:a1:91:c2:2b:6d: 3c:85:ff:24:b6:fd:02:35:cb:14:45:16:9e:99:ce:67: 81:b4:b9:96:7f:02:be:5c:6a:c1:88:44:64:e1:7d:ff: d5:2c:27:69:7b:f8:d1:a4:c5:fc:29:0a:a7:87:30:13: ca:e0:db:9b:9c:13:bd:35:b6:9a:0b:e0:ca:38:21:42: 1f:d8:f3:70:d1:5d:ca:93:4d:ca:4b:43:6f:e5:e1:f6: 4e:65:41:9c:86:cb:be:9d:09:ec:a3:af:be:0c:2a:51: 91:8a:e0:69:96:ec:3c:87:bf:2f:f0:a6:e9:db:58:04: 25:d0:06:f5:03:30:35:d2:92:83:1a:45:79:56:b1:47: f0:c9:05:f0:0c:32:10:ab:6b:de:e7:94:23:94:a6:f6: de:29:87:7c:13:6d:53:b5:f8:80:13:31:8f:28:d9:fe: 98:4a:d0:ee:ef:9c:9f:07:78:e0:24:af:8b:2c:80:bc: f7:50:7a:b0:f2:00:f5:d4:1c:ab:3e:da:58:a6:16:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:3e:21:b5:d7:46:c4:23:20:16:f9:40:24:47:dd:5d: 71:a4:a1:29:12:f9:52:ad:89:7a:45:ef:b5:7f:ef:81: 39:11:60:4d:b3:b7:df:c4:7d:af:d0:e5:c4:9f:ac:80: ac:31:6d:99:54:64:3c:6a:05:7b:be:d1:0f:8e:c1:b7: 6d:2c:66:72:55:8d:b9:52:7b:78:39:81:ed:19:ac:9d: f8:89:66:b2:05:fd:38:a3:08:03:ae:b2:19:7c:1a:22: d7:65:c8:6f:fa:06:80:56:fb:e0:99:56:a5:ed:2c:27: 16:41:77:f5:75:92:df:7a:16:90:6b:84:58:a7:dc:4b: bf:c9:be:16:2b:cf:d0:dc:8d:7d:59:cf:91:65:cc:11: 4c:43:51:ba:03:f6:04:20:3c:e1:cd:7a:e7:7c:92:5f: 17:b4:ca:eb:38:f1:e3:33:fe:0d:f5:e5:fd:59:1f:db: c0:77:40:4b:0b:2e:6a:10:05:07:f6:21:bc:c1:21:0c: af:e8:72:1a:cc:6c:60:3e:4c:77:78:03:6e:aa:0c:18: 93:4d:9a:65:18:20:32:89:4d:93:cb:58:1c:48:7a:37: 97:df:ab:d2:17:dc:e8:c7:1d:3f:0a:77:dd:4a:11:52: 94:d9:6a:a6:97:af:16:b9:40:f1:f4:29:32:dc:54:09 Fingerprint (SHA-256): 99:BB:51:04:CA:9A:74:D2:30:2C:81:04:31:7E:C4:D3:FD:F9:F0:CD:00:D1:0E:B5:49:05:68:69:6D:91:21:D6 Fingerprint (SHA1): 67:18:3E:69:74:D5:55:D4:8E:D6:2F:B4:59:0B:2F:48:2F:8C:12:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142994 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018142995 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018142996 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018142997 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018142998 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018142754.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018142999 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142995 (0x3cafa113) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:44 2023 Not After : Wed Oct 18 14:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:3d:81:9b:a9:cb:04:c1:82:29:a2:57:f5:ee:68:e0: 1c:3f:09:af:b0:a5:57:a1:f8:7e:8d:39:f4:2c:1a:d0: 57:5b:1f:3c:7b:4d:86:32:40:e3:f1:41:0e:41:61:9b: 21:14:6f:6b:30:e5:86:8d:ae:cb:1e:54:e2:b5:a0:e6: 51:95:b9:55:29:d0:09:88:99:d9:94:9f:dc:eb:8d:9e: 4e:32:da:cc:45:6b:5f:49:ab:92:65:7c:46:f5:63:68: bb:e8:9b:b6:67:08:bd:57:c6:0a:d1:36:60:b7:ab:e9: 17:bc:68:c4:ea:2b:6c:68:8b:84:cc:8f:0f:8a:92:91: c5:9c:a2:3b:c6:2f:d8:38:a8:b7:21:71:85:2f:dc:ed: dc:2b:29:d6:a5:5f:3a:ac:cb:c6:cb:34:e8:9c:08:75: 26:5c:1d:46:6d:fc:0e:4e:40:43:fc:30:c3:78:91:79: 2c:b2:ab:1d:56:74:32:c4:c3:74:d8:3a:f9:c2:59:dc: 5c:37:22:5b:7f:1a:cc:b1:88:81:75:51:f9:97:81:b9: 46:1b:86:32:74:79:b7:12:57:c5:d7:08:29:67:95:7d: 97:0a:2f:04:cc:7e:84:9a:74:8f:18:8d:23:8c:b9:78: 00:30:a8:a0:41:39:a6:eb:26:d5:fb:cb:3c:2d:76:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:54:3a:9f:f4:5f:0a:8d:d1:f6:48:75:54:6c:3b:b4: cc:57:b7:95:3c:34:67:66:89:32:0c:e0:f0:fa:62:ef: 00:19:d1:2a:31:73:f1:75:b4:7c:05:49:29:11:4a:dd: c7:0f:e5:22:0c:8d:0c:77:c3:ab:ef:2b:74:5a:e9:4d: 5e:a0:8f:6a:46:d6:dc:79:77:b0:5c:00:6e:ab:90:c4: c9:5a:26:7c:06:4f:cd:cb:34:df:dc:91:a5:bd:b4:67: f6:21:5a:05:8c:f6:02:88:c9:95:88:8c:42:5a:c9:77: 5e:0c:6c:f7:7d:86:a3:58:d0:b2:ba:87:1b:03:2f:51: f5:e8:17:e8:88:36:80:13:f0:3f:88:41:1c:e7:11:6b: 07:f4:c0:25:cd:06:1f:99:14:44:bb:98:fa:ec:be:03: d0:4c:1a:c0:f8:1d:5d:e2:bb:e0:88:4f:18:6a:c8:db: ea:fa:f0:62:a5:43:c3:48:50:3e:da:0b:ff:39:14:cd: 0d:11:e3:03:57:1e:7a:94:7f:8a:d8:4a:6c:21:c4:44: 03:29:06:f6:7b:d8:85:70:da:67:a9:ff:91:08:2c:f0: ae:83:b7:3f:ef:a1:5f:35:3e:13:dc:a0:19:69:88:ca: 10:09:ed:9e:3f:81:32:0f:b1:ec:75:d7:91:d4:bf:d8 Fingerprint (SHA-256): 47:C1:BD:79:4C:B4:BE:0D:CC:75:9E:E1:6A:3B:7C:54:C1:F0:51:9B:40:AA:30:BB:40:76:91:F5:72:BA:6C:2C Fingerprint (SHA1): 34:28:FA:78:B2:A2:76:B1:6B:74:79:30:C3:13:56:7F:B8:98:40:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018142995 (0x3cafa113) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:44 2023 Not After : Wed Oct 18 14:34:44 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:3d:81:9b:a9:cb:04:c1:82:29:a2:57:f5:ee:68:e0: 1c:3f:09:af:b0:a5:57:a1:f8:7e:8d:39:f4:2c:1a:d0: 57:5b:1f:3c:7b:4d:86:32:40:e3:f1:41:0e:41:61:9b: 21:14:6f:6b:30:e5:86:8d:ae:cb:1e:54:e2:b5:a0:e6: 51:95:b9:55:29:d0:09:88:99:d9:94:9f:dc:eb:8d:9e: 4e:32:da:cc:45:6b:5f:49:ab:92:65:7c:46:f5:63:68: bb:e8:9b:b6:67:08:bd:57:c6:0a:d1:36:60:b7:ab:e9: 17:bc:68:c4:ea:2b:6c:68:8b:84:cc:8f:0f:8a:92:91: c5:9c:a2:3b:c6:2f:d8:38:a8:b7:21:71:85:2f:dc:ed: dc:2b:29:d6:a5:5f:3a:ac:cb:c6:cb:34:e8:9c:08:75: 26:5c:1d:46:6d:fc:0e:4e:40:43:fc:30:c3:78:91:79: 2c:b2:ab:1d:56:74:32:c4:c3:74:d8:3a:f9:c2:59:dc: 5c:37:22:5b:7f:1a:cc:b1:88:81:75:51:f9:97:81:b9: 46:1b:86:32:74:79:b7:12:57:c5:d7:08:29:67:95:7d: 97:0a:2f:04:cc:7e:84:9a:74:8f:18:8d:23:8c:b9:78: 00:30:a8:a0:41:39:a6:eb:26:d5:fb:cb:3c:2d:76:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:54:3a:9f:f4:5f:0a:8d:d1:f6:48:75:54:6c:3b:b4: cc:57:b7:95:3c:34:67:66:89:32:0c:e0:f0:fa:62:ef: 00:19:d1:2a:31:73:f1:75:b4:7c:05:49:29:11:4a:dd: c7:0f:e5:22:0c:8d:0c:77:c3:ab:ef:2b:74:5a:e9:4d: 5e:a0:8f:6a:46:d6:dc:79:77:b0:5c:00:6e:ab:90:c4: c9:5a:26:7c:06:4f:cd:cb:34:df:dc:91:a5:bd:b4:67: f6:21:5a:05:8c:f6:02:88:c9:95:88:8c:42:5a:c9:77: 5e:0c:6c:f7:7d:86:a3:58:d0:b2:ba:87:1b:03:2f:51: f5:e8:17:e8:88:36:80:13:f0:3f:88:41:1c:e7:11:6b: 07:f4:c0:25:cd:06:1f:99:14:44:bb:98:fa:ec:be:03: d0:4c:1a:c0:f8:1d:5d:e2:bb:e0:88:4f:18:6a:c8:db: ea:fa:f0:62:a5:43:c3:48:50:3e:da:0b:ff:39:14:cd: 0d:11:e3:03:57:1e:7a:94:7f:8a:d8:4a:6c:21:c4:44: 03:29:06:f6:7b:d8:85:70:da:67:a9:ff:91:08:2c:f0: ae:83:b7:3f:ef:a1:5f:35:3e:13:dc:a0:19:69:88:ca: 10:09:ed:9e:3f:81:32:0f:b1:ec:75:d7:91:d4:bf:d8 Fingerprint (SHA-256): 47:C1:BD:79:4C:B4:BE:0D:CC:75:9E:E1:6A:3B:7C:54:C1:F0:51:9B:40:AA:30:BB:40:76:91:F5:72:BA:6C:2C Fingerprint (SHA1): 34:28:FA:78:B2:A2:76:B1:6B:74:79:30:C3:13:56:7F:B8:98:40:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143000 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143001 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018143002 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018143003 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018143004 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018142755.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018143005 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018143006 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018142756.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018143007 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143001 (0x3cafa119) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:53 2023 Not After : Wed Oct 18 14:34:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:41:2b:9e:1f:07:e7:50:b0:51:82:e4:eb:30:27:dc: e6:c8:97:e8:26:d9:d0:90:2d:3c:56:31:ef:42:25:23: ea:d6:ad:a9:2b:3e:8c:1d:b5:c0:5a:3f:95:83:26:2a: c0:fe:cf:8a:a2:00:0a:9f:cc:0f:51:85:24:ed:48:26: db:bb:5b:fc:ad:31:8f:50:c9:e6:68:f9:12:dc:07:8c: 7a:2d:7a:c2:70:47:3b:45:df:4c:4d:03:e7:c3:3b:be: 0d:26:3f:a8:46:0f:2f:e8:85:49:b0:c7:6c:9e:dd:a9: 82:46:27:5d:c6:45:98:cd:1e:53:f5:4e:a7:06:61:ab: 32:ae:7f:5c:76:c3:c5:5b:6a:c9:8e:7c:b6:e7:1d:bb: 49:e0:3c:4c:46:ba:74:8a:da:35:e0:13:2c:c1:c5:62: ce:2d:59:96:d4:78:95:9e:dc:0e:f9:0c:f6:62:dc:ef: 31:09:1e:bd:d0:4b:9d:7a:62:4e:cc:a2:4e:0b:b0:82: 1e:de:c8:d1:e4:d7:d2:55:4b:e6:6d:ca:ba:9d:96:bb: 52:25:c4:65:ce:f0:72:ad:fe:f1:ac:ca:cc:91:17:c7: c9:65:aa:64:df:fe:f5:bc:de:01:d4:0a:d7:c4:ae:17: bc:c4:33:28:b7:31:54:ed:cf:d0:97:f7:d3:29:11:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:c3:55:fb:e3:78:d2:c9:47:bf:70:f4:f6:1d:15:09: 94:79:04:91:2b:61:e8:a9:75:4f:6c:ca:0b:f7:fd:54: bd:a2:ac:50:34:aa:45:d4:27:6e:a9:33:85:2b:41:f1: 7a:1e:83:6e:43:64:3f:58:ac:c4:d3:52:ca:9b:5b:e6: 8c:25:60:d3:e0:c5:03:ec:2b:93:e0:57:df:9a:cc:48: f4:a7:12:44:c6:38:9b:7e:31:90:7b:b5:f9:04:85:46: fa:2b:04:76:47:eb:92:08:5d:b0:e3:f3:e6:c1:9f:a8: 68:ad:8a:30:ae:ec:78:c2:32:ca:40:b4:33:8a:55:d1: f6:57:f8:d9:7e:0a:8d:b9:be:76:84:cd:18:1d:d9:69: 45:a9:b3:98:97:77:36:0f:9d:85:b6:65:5e:f8:5d:17: 08:29:0b:54:d7:55:85:17:05:32:df:2b:dd:3e:d3:ab: 4f:64:93:43:3a:ca:f9:14:44:bb:03:15:35:12:62:a3: b2:37:50:bb:0a:1f:a9:8c:98:1e:fd:c7:68:19:1c:c1: 24:3a:b1:9d:70:06:3a:6c:59:17:f3:9e:49:34:e7:7f: eb:44:a7:de:88:b6:4c:19:bc:81:68:37:2b:8c:49:98: 29:a8:40:6f:72:45:72:5d:9c:08:22:95:52:1a:d1:12 Fingerprint (SHA-256): E3:6D:2F:9E:6F:45:AF:90:6B:2A:42:EB:6D:92:2E:6E:1D:CF:00:B1:45:4B:9F:F7:DF:02:43:9C:B6:01:FE:61 Fingerprint (SHA1): B9:1E:CC:66:24:C8:CE:77:98:5A:1A:47:AD:6E:E3:C5:BE:41:92:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143001 (0x3cafa119) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:53 2023 Not After : Wed Oct 18 14:34:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:41:2b:9e:1f:07:e7:50:b0:51:82:e4:eb:30:27:dc: e6:c8:97:e8:26:d9:d0:90:2d:3c:56:31:ef:42:25:23: ea:d6:ad:a9:2b:3e:8c:1d:b5:c0:5a:3f:95:83:26:2a: c0:fe:cf:8a:a2:00:0a:9f:cc:0f:51:85:24:ed:48:26: db:bb:5b:fc:ad:31:8f:50:c9:e6:68:f9:12:dc:07:8c: 7a:2d:7a:c2:70:47:3b:45:df:4c:4d:03:e7:c3:3b:be: 0d:26:3f:a8:46:0f:2f:e8:85:49:b0:c7:6c:9e:dd:a9: 82:46:27:5d:c6:45:98:cd:1e:53:f5:4e:a7:06:61:ab: 32:ae:7f:5c:76:c3:c5:5b:6a:c9:8e:7c:b6:e7:1d:bb: 49:e0:3c:4c:46:ba:74:8a:da:35:e0:13:2c:c1:c5:62: ce:2d:59:96:d4:78:95:9e:dc:0e:f9:0c:f6:62:dc:ef: 31:09:1e:bd:d0:4b:9d:7a:62:4e:cc:a2:4e:0b:b0:82: 1e:de:c8:d1:e4:d7:d2:55:4b:e6:6d:ca:ba:9d:96:bb: 52:25:c4:65:ce:f0:72:ad:fe:f1:ac:ca:cc:91:17:c7: c9:65:aa:64:df:fe:f5:bc:de:01:d4:0a:d7:c4:ae:17: bc:c4:33:28:b7:31:54:ed:cf:d0:97:f7:d3:29:11:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:c3:55:fb:e3:78:d2:c9:47:bf:70:f4:f6:1d:15:09: 94:79:04:91:2b:61:e8:a9:75:4f:6c:ca:0b:f7:fd:54: bd:a2:ac:50:34:aa:45:d4:27:6e:a9:33:85:2b:41:f1: 7a:1e:83:6e:43:64:3f:58:ac:c4:d3:52:ca:9b:5b:e6: 8c:25:60:d3:e0:c5:03:ec:2b:93:e0:57:df:9a:cc:48: f4:a7:12:44:c6:38:9b:7e:31:90:7b:b5:f9:04:85:46: fa:2b:04:76:47:eb:92:08:5d:b0:e3:f3:e6:c1:9f:a8: 68:ad:8a:30:ae:ec:78:c2:32:ca:40:b4:33:8a:55:d1: f6:57:f8:d9:7e:0a:8d:b9:be:76:84:cd:18:1d:d9:69: 45:a9:b3:98:97:77:36:0f:9d:85:b6:65:5e:f8:5d:17: 08:29:0b:54:d7:55:85:17:05:32:df:2b:dd:3e:d3:ab: 4f:64:93:43:3a:ca:f9:14:44:bb:03:15:35:12:62:a3: b2:37:50:bb:0a:1f:a9:8c:98:1e:fd:c7:68:19:1c:c1: 24:3a:b1:9d:70:06:3a:6c:59:17:f3:9e:49:34:e7:7f: eb:44:a7:de:88:b6:4c:19:bc:81:68:37:2b:8c:49:98: 29:a8:40:6f:72:45:72:5d:9c:08:22:95:52:1a:d1:12 Fingerprint (SHA-256): E3:6D:2F:9E:6F:45:AF:90:6B:2A:42:EB:6D:92:2E:6E:1D:CF:00:B1:45:4B:9F:F7:DF:02:43:9C:B6:01:FE:61 Fingerprint (SHA1): B9:1E:CC:66:24:C8:CE:77:98:5A:1A:47:AD:6E:E3:C5:BE:41:92:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143000 (0x3cafa118) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:34:51 2023 Not After : Wed Oct 18 14:34:51 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:01:21:6e:50:f0:82:13:d7:32:b5:6a:30:c4:c5:ff: ad:05:a9:42:0a:5f:a7:5b:17:b6:cc:ce:99:f0:5c:15: 94:eb:d5:fe:49:7b:cf:38:ef:4c:cf:18:0c:56:6e:67: 73:0b:87:46:44:b5:c8:36:0f:ea:35:c5:92:52:e8:c9: 14:ca:ba:48:5f:69:41:f0:0e:e3:23:13:fa:a1:06:b0: e0:0c:69:a5:b0:e0:1e:d0:5e:98:16:5f:a5:b0:b9:46: 2a:1d:45:f0:8b:28:0b:2c:b2:e9:3e:d9:2c:06:6e:9c: 38:ca:8d:79:0f:a0:ea:cb:9a:0f:bf:e1:a7:21:ad:ea: 91:16:46:87:fb:3c:5a:96:0f:50:58:be:ba:64:7a:01: b2:ec:78:18:26:38:a4:67:40:7a:10:f1:f0:17:cd:ba: 45:f0:2c:1e:97:4e:5e:9b:cb:28:31:3e:71:b8:44:fb: 65:98:bd:34:8a:4a:ca:38:ac:cf:24:7a:26:16:6e:cc: b1:10:79:dc:e2:e7:86:68:c7:c9:01:e6:c3:05:09:e2: 32:33:2a:d7:b3:d8:37:a4:4d:d5:02:54:3c:d9:68:0f: 4d:d4:5c:da:1e:d5:e3:45:03:01:b8:f7:a1:d7:73:2f: f9:39:1a:51:99:8a:ca:4c:aa:a2:c4:03:5d:cd:d4:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:ad:d4:a2:01:3a:7b:dd:32:60:47:27:cc:e9:2c:a1: 3c:e0:85:fb:12:e4:68:2b:4b:4e:48:04:fc:c4:d3:bd: 30:52:99:da:04:c4:9a:36:c3:25:89:c6:d8:2c:b7:20: ed:07:69:8d:2b:19:49:bb:88:ee:dd:a7:63:09:26:ff: d9:f8:4e:d7:f1:1c:e9:af:7b:af:fd:bb:0a:69:20:bf: 40:fa:2a:aa:83:04:6a:3d:ed:6f:dd:92:26:b8:5a:49: 60:f3:95:5f:3c:a5:d9:e3:3b:ce:f9:44:5d:18:f4:b5: 27:fa:26:14:58:3e:ce:14:2f:18:a2:77:5b:57:f5:98: 35:a0:28:8a:37:cc:39:e5:0a:34:07:bf:06:e5:a4:e8: 17:1d:20:05:2e:fa:14:1d:fa:29:f1:84:4d:0e:b2:3b: 4a:74:ba:73:56:c5:f1:a5:8d:15:57:db:78:a1:d6:75: 54:3b:3d:c6:4b:32:25:43:f2:5d:63:b2:8e:50:c8:98: 11:44:38:1c:fc:ef:a6:0d:b1:a5:99:57:b8:57:e8:5f: 81:9f:55:73:68:92:a3:49:8b:e3:85:ab:1d:50:81:36: f1:6e:ef:88:e9:af:6e:72:4a:41:9d:15:5a:fc:e5:0f: da:8d:c7:2d:9d:49:c1:ce:e3:47:0c:eb:ff:e7:86:de Fingerprint (SHA-256): BF:04:3D:8E:C2:73:44:E3:32:DC:84:D4:EF:35:A2:78:BD:0A:C9:2A:F9:E9:B9:F9:58:E4:96:9B:DE:03:25:32 Fingerprint (SHA1): A2:CF:FE:12:51:F9:06:61:07:7C:89:E4:DF:01:3A:AF:23:CB:57:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143001 (0x3cafa119) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:53 2023 Not After : Wed Oct 18 14:34:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:41:2b:9e:1f:07:e7:50:b0:51:82:e4:eb:30:27:dc: e6:c8:97:e8:26:d9:d0:90:2d:3c:56:31:ef:42:25:23: ea:d6:ad:a9:2b:3e:8c:1d:b5:c0:5a:3f:95:83:26:2a: c0:fe:cf:8a:a2:00:0a:9f:cc:0f:51:85:24:ed:48:26: db:bb:5b:fc:ad:31:8f:50:c9:e6:68:f9:12:dc:07:8c: 7a:2d:7a:c2:70:47:3b:45:df:4c:4d:03:e7:c3:3b:be: 0d:26:3f:a8:46:0f:2f:e8:85:49:b0:c7:6c:9e:dd:a9: 82:46:27:5d:c6:45:98:cd:1e:53:f5:4e:a7:06:61:ab: 32:ae:7f:5c:76:c3:c5:5b:6a:c9:8e:7c:b6:e7:1d:bb: 49:e0:3c:4c:46:ba:74:8a:da:35:e0:13:2c:c1:c5:62: ce:2d:59:96:d4:78:95:9e:dc:0e:f9:0c:f6:62:dc:ef: 31:09:1e:bd:d0:4b:9d:7a:62:4e:cc:a2:4e:0b:b0:82: 1e:de:c8:d1:e4:d7:d2:55:4b:e6:6d:ca:ba:9d:96:bb: 52:25:c4:65:ce:f0:72:ad:fe:f1:ac:ca:cc:91:17:c7: c9:65:aa:64:df:fe:f5:bc:de:01:d4:0a:d7:c4:ae:17: bc:c4:33:28:b7:31:54:ed:cf:d0:97:f7:d3:29:11:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:c3:55:fb:e3:78:d2:c9:47:bf:70:f4:f6:1d:15:09: 94:79:04:91:2b:61:e8:a9:75:4f:6c:ca:0b:f7:fd:54: bd:a2:ac:50:34:aa:45:d4:27:6e:a9:33:85:2b:41:f1: 7a:1e:83:6e:43:64:3f:58:ac:c4:d3:52:ca:9b:5b:e6: 8c:25:60:d3:e0:c5:03:ec:2b:93:e0:57:df:9a:cc:48: f4:a7:12:44:c6:38:9b:7e:31:90:7b:b5:f9:04:85:46: fa:2b:04:76:47:eb:92:08:5d:b0:e3:f3:e6:c1:9f:a8: 68:ad:8a:30:ae:ec:78:c2:32:ca:40:b4:33:8a:55:d1: f6:57:f8:d9:7e:0a:8d:b9:be:76:84:cd:18:1d:d9:69: 45:a9:b3:98:97:77:36:0f:9d:85:b6:65:5e:f8:5d:17: 08:29:0b:54:d7:55:85:17:05:32:df:2b:dd:3e:d3:ab: 4f:64:93:43:3a:ca:f9:14:44:bb:03:15:35:12:62:a3: b2:37:50:bb:0a:1f:a9:8c:98:1e:fd:c7:68:19:1c:c1: 24:3a:b1:9d:70:06:3a:6c:59:17:f3:9e:49:34:e7:7f: eb:44:a7:de:88:b6:4c:19:bc:81:68:37:2b:8c:49:98: 29:a8:40:6f:72:45:72:5d:9c:08:22:95:52:1a:d1:12 Fingerprint (SHA-256): E3:6D:2F:9E:6F:45:AF:90:6B:2A:42:EB:6D:92:2E:6E:1D:CF:00:B1:45:4B:9F:F7:DF:02:43:9C:B6:01:FE:61 Fingerprint (SHA1): B9:1E:CC:66:24:C8:CE:77:98:5A:1A:47:AD:6E:E3:C5:BE:41:92:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143001 (0x3cafa119) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:34:53 2023 Not After : Wed Oct 18 14:34:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:41:2b:9e:1f:07:e7:50:b0:51:82:e4:eb:30:27:dc: e6:c8:97:e8:26:d9:d0:90:2d:3c:56:31:ef:42:25:23: ea:d6:ad:a9:2b:3e:8c:1d:b5:c0:5a:3f:95:83:26:2a: c0:fe:cf:8a:a2:00:0a:9f:cc:0f:51:85:24:ed:48:26: db:bb:5b:fc:ad:31:8f:50:c9:e6:68:f9:12:dc:07:8c: 7a:2d:7a:c2:70:47:3b:45:df:4c:4d:03:e7:c3:3b:be: 0d:26:3f:a8:46:0f:2f:e8:85:49:b0:c7:6c:9e:dd:a9: 82:46:27:5d:c6:45:98:cd:1e:53:f5:4e:a7:06:61:ab: 32:ae:7f:5c:76:c3:c5:5b:6a:c9:8e:7c:b6:e7:1d:bb: 49:e0:3c:4c:46:ba:74:8a:da:35:e0:13:2c:c1:c5:62: ce:2d:59:96:d4:78:95:9e:dc:0e:f9:0c:f6:62:dc:ef: 31:09:1e:bd:d0:4b:9d:7a:62:4e:cc:a2:4e:0b:b0:82: 1e:de:c8:d1:e4:d7:d2:55:4b:e6:6d:ca:ba:9d:96:bb: 52:25:c4:65:ce:f0:72:ad:fe:f1:ac:ca:cc:91:17:c7: c9:65:aa:64:df:fe:f5:bc:de:01:d4:0a:d7:c4:ae:17: bc:c4:33:28:b7:31:54:ed:cf:d0:97:f7:d3:29:11:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:c3:55:fb:e3:78:d2:c9:47:bf:70:f4:f6:1d:15:09: 94:79:04:91:2b:61:e8:a9:75:4f:6c:ca:0b:f7:fd:54: bd:a2:ac:50:34:aa:45:d4:27:6e:a9:33:85:2b:41:f1: 7a:1e:83:6e:43:64:3f:58:ac:c4:d3:52:ca:9b:5b:e6: 8c:25:60:d3:e0:c5:03:ec:2b:93:e0:57:df:9a:cc:48: f4:a7:12:44:c6:38:9b:7e:31:90:7b:b5:f9:04:85:46: fa:2b:04:76:47:eb:92:08:5d:b0:e3:f3:e6:c1:9f:a8: 68:ad:8a:30:ae:ec:78:c2:32:ca:40:b4:33:8a:55:d1: f6:57:f8:d9:7e:0a:8d:b9:be:76:84:cd:18:1d:d9:69: 45:a9:b3:98:97:77:36:0f:9d:85:b6:65:5e:f8:5d:17: 08:29:0b:54:d7:55:85:17:05:32:df:2b:dd:3e:d3:ab: 4f:64:93:43:3a:ca:f9:14:44:bb:03:15:35:12:62:a3: b2:37:50:bb:0a:1f:a9:8c:98:1e:fd:c7:68:19:1c:c1: 24:3a:b1:9d:70:06:3a:6c:59:17:f3:9e:49:34:e7:7f: eb:44:a7:de:88:b6:4c:19:bc:81:68:37:2b:8c:49:98: 29:a8:40:6f:72:45:72:5d:9c:08:22:95:52:1a:d1:12 Fingerprint (SHA-256): E3:6D:2F:9E:6F:45:AF:90:6B:2A:42:EB:6D:92:2E:6E:1D:CF:00:B1:45:4B:9F:F7:DF:02:43:9C:B6:01:FE:61 Fingerprint (SHA1): B9:1E:CC:66:24:C8:CE:77:98:5A:1A:47:AD:6E:E3:C5:BE:41:92:95 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143008 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143009 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018143010 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018143011 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018143012 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018143013 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018143014 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018143015 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018143016 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018143017 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143008 (0x3cafa120) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:35:02 2023 Not After : Wed Oct 18 14:35:02 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:10:be:9e:4a:70:2d:d6:bf:a0:17:56:41:1e:f7:74: 46:65:8e:2f:29:ad:55:a9:29:6b:c0:7e:e8:e6:29:b4: 30:52:b6:0e:b0:89:77:5c:23:03:5e:62:21:17:2b:6c: a8:aa:cc:2b:41:5b:12:1c:25:61:28:71:29:60:9f:5c: c2:eb:0a:c3:87:04:c3:6e:44:e3:79:53:15:f1:29:1a: cf:3d:bf:0f:95:ae:bf:23:22:fd:64:e8:6a:9b:e3:bb: 5a:11:5b:85:a8:9a:80:94:a4:d1:a1:ba:ae:53:5d:65: 51:a9:67:df:7c:3d:14:b8:25:85:6a:e7:6b:a5:bd:e3: 08:2b:7b:39:2c:5b:f2:cb:43:f4:e9:d0:bd:6b:5c:90: 5d:b0:e1:6e:03:6b:3f:57:ca:39:3f:72:54:31:71:04: 8c:62:d3:74:85:30:91:20:58:54:9f:f7:42:f1:2b:45: 6a:be:a6:ae:52:25:12:e9:8a:92:8f:f3:5b:97:32:81: a9:7b:48:98:ad:af:cd:49:31:be:d3:6a:1c:c7:87:93: 32:69:61:f7:b4:0a:e3:88:ab:b1:ec:58:af:50:02:14: 4a:f2:e7:90:57:9c:e4:9e:b1:05:c9:f3:49:9a:bf:d0: 0b:07:98:4b:28:79:54:e9:a5:71:fd:f2:e7:91:52:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:99:42:ef:9f:b1:8c:be:40:3a:61:bd:ad:de:81:40: 38:20:12:29:96:b2:cb:5f:83:53:ea:e4:92:b0:d9:82: 1b:90:44:01:c7:9f:9f:b9:e7:d5:68:d7:48:54:50:c7: f4:3c:0c:8e:31:08:21:b4:ef:ee:3d:ce:92:98:85:78: ea:5e:e6:d2:22:5d:65:d9:6b:f9:71:6a:ed:6e:61:a7: 75:bc:6c:d9:00:86:b2:a4:93:c3:fa:47:c0:8e:8a:6c: de:35:17:90:38:c5:eb:27:a4:69:7b:6a:29:d1:76:dd: fb:87:13:94:b6:e7:70:59:a2:d7:77:f2:78:17:ee:ae: 69:19:b1:4d:73:78:8b:4c:fd:ab:20:24:36:b8:63:bb: fe:43:bc:f6:1e:bc:9a:c2:2c:3c:35:82:54:b1:7d:46: 77:45:1b:86:4f:2b:36:af:44:8e:87:73:0b:57:a7:98: af:25:d4:a7:20:5f:c8:6a:4c:7a:7e:77:ea:c5:45:ff: 60:77:93:9b:49:42:34:20:40:e4:51:3e:0e:e0:62:df: c9:51:d2:a3:33:02:a5:55:1e:d7:58:c2:aa:81:6a:0f: 1b:bf:71:e8:32:de:35:28:91:69:e4:a0:fe:bd:42:8a: 48:c5:6a:6a:00:ef:4c:c8:75:37:de:ce:09:e7:75:73 Fingerprint (SHA-256): 02:99:99:F7:BE:7C:95:7A:C7:37:50:35:B4:6E:0A:10:EC:D4:8B:3D:53:AC:47:07:E0:99:22:90:62:7A:AB:95 Fingerprint (SHA1): 47:88:19:F7:9E:0F:35:14:0E:CD:2B:E0:E4:35:63:D0:1A:84:10:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143009 (0x3cafa121) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:35:03 2023 Not After : Wed Oct 18 14:35:03 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:80:ee:0a:48:56:8e:bf:18:65:05:b4:cd:6b:94:fc: eb:72:09:10:68:f2:e0:b7:4b:3b:3e:6e:02:53:bb:b6: 89:f2:cd:6f:9a:03:63:8b:1c:5f:f6:42:f7:ef:b2:7d: be:5f:3b:f3:e3:33:1d:c2:65:9b:b5:a4:f3:14:9d:33: f8:f6:76:b3:4d:7b:fd:4c:13:b7:87:fb:0b:59:cd:52: 90:07:84:74:e9:28:c9:63:0c:42:d9:be:5a:04:62:27: 84:f7:3b:b1:3b:09:7a:3e:dc:cc:b3:46:64:b9:fe:de: 8a:a2:91:0a:98:dd:22:dd:df:b9:db:c2:19:ac:6d:5c: 55:ac:45:7b:92:b5:c5:85:d1:1e:01:8a:4f:e9:f3:7a: 17:2c:4a:72:29:b3:c1:69:a3:8a:29:27:e8:24:cf:b4: f3:67:c0:71:8c:3f:67:d2:a2:f5:45:80:ca:67:31:98: 6c:2f:01:d3:10:42:bb:2a:95:88:6c:d7:c9:43:47:a7: 32:b5:de:4d:c4:ae:2e:91:5f:24:c1:92:6b:d9:00:d2: c2:26:f1:aa:c7:77:1a:3d:c2:3a:f8:41:22:3d:19:9f: a8:31:3a:11:62:e6:ed:4a:49:1d:7d:43:e1:9b:67:5d: 50:16:66:42:20:8f:04:33:b5:f7:4b:84:9a:8d:a8:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 57:9d:b3:39:ea:21:d6:de:e7:a6:33:82:b8:2c:45:23: b9:2e:da:d6:49:d8:14:06:70:51:d5:de:58:45:c9:75: 6c:5a:b7:f8:98:83:c8:f4:ad:53:61:fe:1e:43:43:55: 18:e4:34:a8:2e:81:d7:b8:0e:c8:2a:29:3b:99:90:7a: c7:a2:af:7b:3d:8a:61:96:00:bd:4d:25:83:7d:4b:87: ad:93:5f:c6:fb:24:99:65:9b:89:2e:77:f3:0e:70:be: 50:e0:e8:5c:c8:e9:32:92:00:42:cd:62:75:fd:5b:a9: 42:bb:11:d9:e8:5f:02:fc:3a:e9:28:31:61:16:3d:dd: 9c:17:d1:6c:ba:39:3b:17:ef:08:a2:72:d1:2c:45:79: eb:57:8d:ac:56:60:d1:bb:50:e6:1c:78:0f:8d:c0:eb: 8f:13:aa:26:3b:c4:cc:cb:58:c0:71:7d:b5:c7:eb:98: 8b:2a:2a:df:f8:a0:a6:b4:b8:97:32:06:29:78:fa:dd: 95:5d:72:12:62:e7:e2:49:94:b6:12:06:39:a3:46:98: b5:a9:38:2e:e9:ba:a5:64:45:9f:42:f1:ac:c2:1b:31: a7:c9:b6:82:4d:8e:07:47:ea:a8:2e:b9:81:88:4c:ed: 38:5a:17:ff:ee:79:8b:29:35:13:99:e2:ee:81:8a:66 Fingerprint (SHA-256): 04:6E:A9:CF:7E:68:9C:75:09:16:3B:E4:92:D3:6B:D2:9B:CB:35:23:A6:C7:33:ED:99:22:1F:B5:50:15:18:D9 Fingerprint (SHA1): 9B:1D:2C:11:A4:39:81:31:70:BF:2E:E3:A0:C7:80:AD:27:13:9F:89 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143018 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018143019 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018143020 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018143021 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018143022 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018143023 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018143024 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018143025 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018143026 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143018 (0x3cafa12a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:18 2023 Not After : Wed Oct 18 14:35:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8a:a9:1e:f1:53:c7:b1:b6:70:f8:23:15:b2:0a:29:de: 63:50:c2:f3:07:85:5d:54:8c:7e:f5:14:ab:d6:c7:60: 35:e7:a7:84:12:79:b4:d8:9e:8e:93:28:81:42:95:50: ad:5e:ea:d9:a1:74:53:9a:fe:90:15:6e:fb:d1:2b:1c: 3a:68:23:cc:a7:39:aa:43:7c:a8:fe:df:dc:d7:2d:72: 06:77:05:41:b7:61:27:7b:f4:70:4d:59:63:b1:83:b6: 39:e9:e5:0d:db:6c:29:e5:72:9c:e6:c9:1c:34:dd:6d: bb:d1:98:1f:c0:6d:37:1c:70:a8:0c:88:27:92:56:c4: 6f:5e:4d:0f:a6:ac:13:0a:6b:8d:43:a0:18:9c:e3:ea: 4d:b3:d2:d6:dc:77:8a:aa:37:e0:a4:44:7f:7e:46:78: a5:ce:af:27:c7:ed:78:f3:ca:a5:93:4b:33:05:2c:e9: 6d:95:49:7e:85:d7:ca:d5:d0:33:79:21:ba:10:a1:ec: ac:e7:0c:5a:6a:f9:97:04:df:25:7d:81:c8:ca:f7:af: 97:05:48:41:ee:91:e4:a8:fb:bf:ba:6f:9f:57:d3:01: e6:1a:6c:09:4a:06:3c:ca:07:c2:08:d4:69:7e:b2:e0: 42:20:9b:da:d0:76:49:41:03:60:6c:19:38:1e:ea:bd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:54:6f:6f:00:bd:32:ba:37:31:d6: 0b:38:cb:35:84:21:d7:d5:ea:10:58:b5:5a:f5:b2:c3: 9f:02:1c:62:d4:ce:f3:2e:5d:45:da:5c:e0:dc:eb:50: 22:37:ff:22:db:f9:4f:24:34:71:db:d0:57:be:9d Fingerprint (SHA-256): BF:0D:77:07:FA:65:49:AC:CA:88:D8:E5:A6:91:4E:E2:95:7A:D5:0A:BC:EA:42:36:AC:18:0A:94:35:FF:61:53 Fingerprint (SHA1): B1:F9:B2:F8:8C:3C:74:33:D0:49:82:21:4E:5C:92:35:24:26:50:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143018 (0x3cafa12a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:18 2023 Not After : Wed Oct 18 14:35:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8a:a9:1e:f1:53:c7:b1:b6:70:f8:23:15:b2:0a:29:de: 63:50:c2:f3:07:85:5d:54:8c:7e:f5:14:ab:d6:c7:60: 35:e7:a7:84:12:79:b4:d8:9e:8e:93:28:81:42:95:50: ad:5e:ea:d9:a1:74:53:9a:fe:90:15:6e:fb:d1:2b:1c: 3a:68:23:cc:a7:39:aa:43:7c:a8:fe:df:dc:d7:2d:72: 06:77:05:41:b7:61:27:7b:f4:70:4d:59:63:b1:83:b6: 39:e9:e5:0d:db:6c:29:e5:72:9c:e6:c9:1c:34:dd:6d: bb:d1:98:1f:c0:6d:37:1c:70:a8:0c:88:27:92:56:c4: 6f:5e:4d:0f:a6:ac:13:0a:6b:8d:43:a0:18:9c:e3:ea: 4d:b3:d2:d6:dc:77:8a:aa:37:e0:a4:44:7f:7e:46:78: a5:ce:af:27:c7:ed:78:f3:ca:a5:93:4b:33:05:2c:e9: 6d:95:49:7e:85:d7:ca:d5:d0:33:79:21:ba:10:a1:ec: ac:e7:0c:5a:6a:f9:97:04:df:25:7d:81:c8:ca:f7:af: 97:05:48:41:ee:91:e4:a8:fb:bf:ba:6f:9f:57:d3:01: e6:1a:6c:09:4a:06:3c:ca:07:c2:08:d4:69:7e:b2:e0: 42:20:9b:da:d0:76:49:41:03:60:6c:19:38:1e:ea:bd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:54:6f:6f:00:bd:32:ba:37:31:d6: 0b:38:cb:35:84:21:d7:d5:ea:10:58:b5:5a:f5:b2:c3: 9f:02:1c:62:d4:ce:f3:2e:5d:45:da:5c:e0:dc:eb:50: 22:37:ff:22:db:f9:4f:24:34:71:db:d0:57:be:9d Fingerprint (SHA-256): BF:0D:77:07:FA:65:49:AC:CA:88:D8:E5:A6:91:4E:E2:95:7A:D5:0A:BC:EA:42:36:AC:18:0A:94:35:FF:61:53 Fingerprint (SHA1): B1:F9:B2:F8:8C:3C:74:33:D0:49:82:21:4E:5C:92:35:24:26:50:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143018 (0x3cafa12a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:18 2023 Not After : Wed Oct 18 14:35:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8a:a9:1e:f1:53:c7:b1:b6:70:f8:23:15:b2:0a:29:de: 63:50:c2:f3:07:85:5d:54:8c:7e:f5:14:ab:d6:c7:60: 35:e7:a7:84:12:79:b4:d8:9e:8e:93:28:81:42:95:50: ad:5e:ea:d9:a1:74:53:9a:fe:90:15:6e:fb:d1:2b:1c: 3a:68:23:cc:a7:39:aa:43:7c:a8:fe:df:dc:d7:2d:72: 06:77:05:41:b7:61:27:7b:f4:70:4d:59:63:b1:83:b6: 39:e9:e5:0d:db:6c:29:e5:72:9c:e6:c9:1c:34:dd:6d: bb:d1:98:1f:c0:6d:37:1c:70:a8:0c:88:27:92:56:c4: 6f:5e:4d:0f:a6:ac:13:0a:6b:8d:43:a0:18:9c:e3:ea: 4d:b3:d2:d6:dc:77:8a:aa:37:e0:a4:44:7f:7e:46:78: a5:ce:af:27:c7:ed:78:f3:ca:a5:93:4b:33:05:2c:e9: 6d:95:49:7e:85:d7:ca:d5:d0:33:79:21:ba:10:a1:ec: ac:e7:0c:5a:6a:f9:97:04:df:25:7d:81:c8:ca:f7:af: 97:05:48:41:ee:91:e4:a8:fb:bf:ba:6f:9f:57:d3:01: e6:1a:6c:09:4a:06:3c:ca:07:c2:08:d4:69:7e:b2:e0: 42:20:9b:da:d0:76:49:41:03:60:6c:19:38:1e:ea:bd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:54:6f:6f:00:bd:32:ba:37:31:d6: 0b:38:cb:35:84:21:d7:d5:ea:10:58:b5:5a:f5:b2:c3: 9f:02:1c:62:d4:ce:f3:2e:5d:45:da:5c:e0:dc:eb:50: 22:37:ff:22:db:f9:4f:24:34:71:db:d0:57:be:9d Fingerprint (SHA-256): BF:0D:77:07:FA:65:49:AC:CA:88:D8:E5:A6:91:4E:E2:95:7A:D5:0A:BC:EA:42:36:AC:18:0A:94:35:FF:61:53 Fingerprint (SHA1): B1:F9:B2:F8:8C:3C:74:33:D0:49:82:21:4E:5C:92:35:24:26:50:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143018 (0x3cafa12a) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:18 2023 Not After : Wed Oct 18 14:35:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 8a:a9:1e:f1:53:c7:b1:b6:70:f8:23:15:b2:0a:29:de: 63:50:c2:f3:07:85:5d:54:8c:7e:f5:14:ab:d6:c7:60: 35:e7:a7:84:12:79:b4:d8:9e:8e:93:28:81:42:95:50: ad:5e:ea:d9:a1:74:53:9a:fe:90:15:6e:fb:d1:2b:1c: 3a:68:23:cc:a7:39:aa:43:7c:a8:fe:df:dc:d7:2d:72: 06:77:05:41:b7:61:27:7b:f4:70:4d:59:63:b1:83:b6: 39:e9:e5:0d:db:6c:29:e5:72:9c:e6:c9:1c:34:dd:6d: bb:d1:98:1f:c0:6d:37:1c:70:a8:0c:88:27:92:56:c4: 6f:5e:4d:0f:a6:ac:13:0a:6b:8d:43:a0:18:9c:e3:ea: 4d:b3:d2:d6:dc:77:8a:aa:37:e0:a4:44:7f:7e:46:78: a5:ce:af:27:c7:ed:78:f3:ca:a5:93:4b:33:05:2c:e9: 6d:95:49:7e:85:d7:ca:d5:d0:33:79:21:ba:10:a1:ec: ac:e7:0c:5a:6a:f9:97:04:df:25:7d:81:c8:ca:f7:af: 97:05:48:41:ee:91:e4:a8:fb:bf:ba:6f:9f:57:d3:01: e6:1a:6c:09:4a:06:3c:ca:07:c2:08:d4:69:7e:b2:e0: 42:20:9b:da:d0:76:49:41:03:60:6c:19:38:1e:ea:bd Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:c2:54:6f:6f:00:bd:32:ba:37:31:d6: 0b:38:cb:35:84:21:d7:d5:ea:10:58:b5:5a:f5:b2:c3: 9f:02:1c:62:d4:ce:f3:2e:5d:45:da:5c:e0:dc:eb:50: 22:37:ff:22:db:f9:4f:24:34:71:db:d0:57:be:9d Fingerprint (SHA-256): BF:0D:77:07:FA:65:49:AC:CA:88:D8:E5:A6:91:4E:E2:95:7A:D5:0A:BC:EA:42:36:AC:18:0A:94:35:FF:61:53 Fingerprint (SHA1): B1:F9:B2:F8:8C:3C:74:33:D0:49:82:21:4E:5C:92:35:24:26:50:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018143535Z nextupdate=20241018143535Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:35:35 2023 Next Update: Fri Oct 18 14:35:35 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143536Z nextupdate=20241018143536Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:35:36 2023 Next Update: Fri Oct 18 14:35:36 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143536Z nextupdate=20241018143536Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:35:36 2023 Next Update: Fri Oct 18 14:35:36 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018143536Z nextupdate=20241018143536Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:35:36 2023 Next Update: Fri Oct 18 14:35:36 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143537Z addcert 14 20231018143537Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:35:37 2023 Next Update: Fri Oct 18 14:35:36 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:35:37 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143538Z addcert 15 20231018143538Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:35:38 2023 Next Update: Fri Oct 18 14:35:36 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:35:38 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:27 2023 Not After : Wed Oct 18 14:35:27 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:1c:b5:18:59:d0:78:5d:11:a1:af:a2:68:54:be:3c: 8e:96:dc:8d:95:5d:d4:df:57:e8:bf:1f:0b:4b:ff:bb: 17:96:26:8a:27:0d:87:f8:3e:e4:50:37:d8:9a:3d:39: ea:3c:87:27:2f:f0:1b:6c:a1:62:f6:09:0a:5b:5d:da: 33:50:12:cb:07:a2:02:fd:27:fe:4d:21:44:0c:eb:7c: a6:28:e6:de:2f:91:73:2d:f2:4a:58:cb:07:c6:03:28: b9:69:c6:94:5f:e1:8e:bf:85:49:2a:4e:23:58:03:e4: ca:c5:df:a8:3a:37:e8:e7:92:00:28:c6:e3:14:de:1f: 8d:9f:e4:82:d0:fa:34:cb:74:f3:d7:08:d8:b0:a4:59: 60:40:5d:97:c3:6e:59:9a:05:3c:b6:dc:7b:33:7b:d6: 68:ce:32:b4:c4:ae:de:ad:27:d5:fd:b9:3d:a8:3b:4f: 7a:b7:e2:43:4c:24:2c:e8:93:59:e4:a7:4e:ae:c6:12: 79:97:ea:21:9c:91:c0:81:8d:22:79:31:95:72:c3:d5: 38:97:cd:d8:88:10:1f:cf:d5:e3:82:2d:b5:4b:d3:2b: 4b:71:6e:d5:cc:3b:98:94:21:92:d6:0a:35:ed:a6:fd: 69:66:3e:41:f4:1b:32:7f:a7:b7:45:58:db:07:e8:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:bb:a2:47:16:ee:94:05:22:b3:44:56:8e:cd:a5:12: a5:24:d7:fd:63:02:85:b2:67:55:15:37:36:57:3d:27: c6:de:e3:f0:05:87:9a:67:e0:55:3f:17:7e:64:56:9b: 4f:c1:1e:b4:ac:41:8a:1b:7c:5e:ab:54:12:98:5d:81: c3:a7:d9:54:2f:34:bf:a6:c0:ef:19:63:f6:e4:c5:ca: c7:8b:4c:d2:18:e6:23:da:df:72:fd:c6:49:5c:7f:20: 80:26:e1:5b:45:25:90:61:ac:93:f2:5c:04:7f:fc:5d: 75:2d:83:27:5b:af:d9:d0:33:16:15:61:90:a3:1c:97: e7:64:7b:15:81:dd:ea:fc:c3:65:b9:6a:71:29:3f:9b: bc:9b:55:e6:5c:70:87:9c:2e:32:d0:69:e3:29:11:e1: 68:8b:fe:61:e5:ec:5a:e7:1b:39:fd:de:ef:21:cb:dd: a3:33:da:d0:0d:90:81:ff:5e:6b:ce:99:d6:a2:ad:09: 27:19:ce:1a:3a:30:4b:13:27:21:45:a2:d9:43:3c:25: be:38:b8:04:7e:6a:8f:aa:91:09:3e:95:dc:d0:4c:a7: 60:d9:c0:c6:5d:20:1d:a0:65:f0:cc:9d:90:0a:bb:81: 61:21:4c:31:50:93:8c:ad:f2:25:d6:ca:4c:16:0d:9f Fingerprint (SHA-256): 20:E1:C5:AB:AD:B8:FC:92:14:19:5E:64:B4:60:97:27:8D:76:FC:CA:53:96:7A:6E:C5:D8:7E:DD:9E:DA:7A:75 Fingerprint (SHA1): 78:28:BA:4F:2B:3B:22:87:B8:F1:75:06:EB:F3:3E:35:0D:4A:64:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:27 2023 Not After : Wed Oct 18 14:35:27 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:1c:b5:18:59:d0:78:5d:11:a1:af:a2:68:54:be:3c: 8e:96:dc:8d:95:5d:d4:df:57:e8:bf:1f:0b:4b:ff:bb: 17:96:26:8a:27:0d:87:f8:3e:e4:50:37:d8:9a:3d:39: ea:3c:87:27:2f:f0:1b:6c:a1:62:f6:09:0a:5b:5d:da: 33:50:12:cb:07:a2:02:fd:27:fe:4d:21:44:0c:eb:7c: a6:28:e6:de:2f:91:73:2d:f2:4a:58:cb:07:c6:03:28: b9:69:c6:94:5f:e1:8e:bf:85:49:2a:4e:23:58:03:e4: ca:c5:df:a8:3a:37:e8:e7:92:00:28:c6:e3:14:de:1f: 8d:9f:e4:82:d0:fa:34:cb:74:f3:d7:08:d8:b0:a4:59: 60:40:5d:97:c3:6e:59:9a:05:3c:b6:dc:7b:33:7b:d6: 68:ce:32:b4:c4:ae:de:ad:27:d5:fd:b9:3d:a8:3b:4f: 7a:b7:e2:43:4c:24:2c:e8:93:59:e4:a7:4e:ae:c6:12: 79:97:ea:21:9c:91:c0:81:8d:22:79:31:95:72:c3:d5: 38:97:cd:d8:88:10:1f:cf:d5:e3:82:2d:b5:4b:d3:2b: 4b:71:6e:d5:cc:3b:98:94:21:92:d6:0a:35:ed:a6:fd: 69:66:3e:41:f4:1b:32:7f:a7:b7:45:58:db:07:e8:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:bb:a2:47:16:ee:94:05:22:b3:44:56:8e:cd:a5:12: a5:24:d7:fd:63:02:85:b2:67:55:15:37:36:57:3d:27: c6:de:e3:f0:05:87:9a:67:e0:55:3f:17:7e:64:56:9b: 4f:c1:1e:b4:ac:41:8a:1b:7c:5e:ab:54:12:98:5d:81: c3:a7:d9:54:2f:34:bf:a6:c0:ef:19:63:f6:e4:c5:ca: c7:8b:4c:d2:18:e6:23:da:df:72:fd:c6:49:5c:7f:20: 80:26:e1:5b:45:25:90:61:ac:93:f2:5c:04:7f:fc:5d: 75:2d:83:27:5b:af:d9:d0:33:16:15:61:90:a3:1c:97: e7:64:7b:15:81:dd:ea:fc:c3:65:b9:6a:71:29:3f:9b: bc:9b:55:e6:5c:70:87:9c:2e:32:d0:69:e3:29:11:e1: 68:8b:fe:61:e5:ec:5a:e7:1b:39:fd:de:ef:21:cb:dd: a3:33:da:d0:0d:90:81:ff:5e:6b:ce:99:d6:a2:ad:09: 27:19:ce:1a:3a:30:4b:13:27:21:45:a2:d9:43:3c:25: be:38:b8:04:7e:6a:8f:aa:91:09:3e:95:dc:d0:4c:a7: 60:d9:c0:c6:5d:20:1d:a0:65:f0:cc:9d:90:0a:bb:81: 61:21:4c:31:50:93:8c:ad:f2:25:d6:ca:4c:16:0d:9f Fingerprint (SHA-256): 20:E1:C5:AB:AD:B8:FC:92:14:19:5E:64:B4:60:97:27:8D:76:FC:CA:53:96:7A:6E:C5:D8:7E:DD:9E:DA:7A:75 Fingerprint (SHA1): 78:28:BA:4F:2B:3B:22:87:B8:F1:75:06:EB:F3:3E:35:0D:4A:64:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143027 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018143028 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142784.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142757.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142784.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018143029 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142784.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142758.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018143030 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142784.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142759.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018142784.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018142760.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018143551Z nextupdate=20241018143551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:35:51 2023 Next Update: Fri Oct 18 14:35:51 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143551Z nextupdate=20241018143551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:35:51 2023 Next Update: Fri Oct 18 14:35:51 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018143551Z nextupdate=20241018143551Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:35:51 2023 Next Update: Fri Oct 18 14:35:51 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018143552Z nextupdate=20241018143552Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:35:52 2023 Next Update: Fri Oct 18 14:35:52 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143553Z addcert 20 20231018143553Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:35:53 2023 Next Update: Fri Oct 18 14:35:51 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:35:53 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018143554Z addcert 40 20231018143554Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:35:54 2023 Next Update: Fri Oct 18 14:35:51 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:35:53 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:35:54 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143027 (0x3cafa133) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:42 2023 Not After : Wed Oct 18 14:35:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a2:5f:67:e6:6a:d4:18:37:44:29:3e:83:82:5a:58: 05:f1:2c:3f:95:0b:7e:ac:cd:20:98:14:c5:7c:3a:e1: c6:a4:f5:9d:1e:6b:5d:5a:21:d8:22:df:c2:0d:ec:97: d7:77:3e:06:99:8e:e6:ec:e7:cb:7e:ea:e1:c2:8d:e8: 24:9e:12:55:a3:7a:a2:8d:6a:c3:f7:56:d9:26:a9:29: 25:18:23:82:43:05:88:44:99:0b:21:6e:e0:d1:66:c9: 9a:b9:92:e3:51:0a:51:9f:ed:d3:14:3e:4e:79:5b:63: de:56:b1:f4:2e:9c:fa:b1:1c:7a:af:53:30:de:27:ae: d8:7b:23:6d:13:6c:2a:2b:79:84:42:1b:9c:0e:a0:69: da:a1:84:e9:e6:94:88:a0:65:f8:1f:ab:92:b8:9e:18: 40:0b:9d:50:0b:61:df:ed:02:77:d8:96:bf:55:1c:7b: aa:50:98:7e:20:86:fa:a7:e0:3c:d5:92:db:5b:30:fd: a8:1c:45:0b:0b:85:7e:34:e8:47:cd:a9:61:8c:39:1c: 51:9a:ac:c4:81:af:94:dc:c0:89:7b:7c:a4:b3:f8:a6: 42:db:d3:b7:0b:a4:02:6d:eb:3b:ff:d7:f6:92:2f:dd: 67:c5:9e:4f:fa:d3:95:e5:b4:2c:e9:b0:1e:14:67:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:04:d1:5a:61:98:10:cc:ff:5a:60:b8:f3:9c:3f:34: 15:f5:36:83:b9:da:c2:47:ee:d2:05:13:d3:3e:11:6f: f2:96:0f:f9:59:19:0f:0a:5a:ae:bb:56:ec:43:8d:4e: 33:e9:60:c2:f2:91:8c:b0:4d:87:59:54:3a:2d:40:6c: e9:a6:4d:0a:95:fa:f4:81:5c:17:5f:02:b0:ae:c7:04: b8:87:e6:d4:22:3a:ff:26:62:f5:a1:70:bb:09:07:5a: 35:1f:a7:3b:6e:ad:2c:cf:4e:43:fd:3e:d7:bb:57:33: 78:d0:a5:cf:d2:a7:21:dd:ed:14:bf:dd:6b:39:87:c5: a0:da:78:45:3f:b5:0b:c0:95:9a:e8:30:49:ec:14:c9: 1f:9a:5b:3b:bd:a3:2b:8c:4a:8e:a3:89:2b:67:0a:0b: f1:cd:98:1b:18:28:81:d8:29:3a:1a:30:bf:98:5e:43: 3b:96:4b:d7:0d:19:fd:6c:98:d4:73:e2:eb:a8:31:f2: 9a:fb:90:97:da:e4:16:fb:f2:82:b5:bc:a3:1d:d5:45: 82:8d:a8:9e:2b:d8:1e:c0:c8:15:da:d0:5e:2e:83:2c: a5:f0:f9:15:4b:9b:16:eb:11:bf:a0:49:19:ab:57:09: 90:d4:af:1b:96:26:22:a6:13:11:27:27:a1:3b:a3:a8 Fingerprint (SHA-256): 53:DA:A2:F3:1D:6E:50:F7:BB:94:2E:99:2C:76:5B:80:71:25:BB:A7:CB:13:AC:2B:0A:1E:B4:C2:EC:F3:29:AE Fingerprint (SHA1): CA:66:2D:D8:A4:F4:D1:51:96:F4:D0:A1:21:95:DC:CC:2C:C3:E5:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143027 (0x3cafa133) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:35:42 2023 Not After : Wed Oct 18 14:35:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a2:5f:67:e6:6a:d4:18:37:44:29:3e:83:82:5a:58: 05:f1:2c:3f:95:0b:7e:ac:cd:20:98:14:c5:7c:3a:e1: c6:a4:f5:9d:1e:6b:5d:5a:21:d8:22:df:c2:0d:ec:97: d7:77:3e:06:99:8e:e6:ec:e7:cb:7e:ea:e1:c2:8d:e8: 24:9e:12:55:a3:7a:a2:8d:6a:c3:f7:56:d9:26:a9:29: 25:18:23:82:43:05:88:44:99:0b:21:6e:e0:d1:66:c9: 9a:b9:92:e3:51:0a:51:9f:ed:d3:14:3e:4e:79:5b:63: de:56:b1:f4:2e:9c:fa:b1:1c:7a:af:53:30:de:27:ae: d8:7b:23:6d:13:6c:2a:2b:79:84:42:1b:9c:0e:a0:69: da:a1:84:e9:e6:94:88:a0:65:f8:1f:ab:92:b8:9e:18: 40:0b:9d:50:0b:61:df:ed:02:77:d8:96:bf:55:1c:7b: aa:50:98:7e:20:86:fa:a7:e0:3c:d5:92:db:5b:30:fd: a8:1c:45:0b:0b:85:7e:34:e8:47:cd:a9:61:8c:39:1c: 51:9a:ac:c4:81:af:94:dc:c0:89:7b:7c:a4:b3:f8:a6: 42:db:d3:b7:0b:a4:02:6d:eb:3b:ff:d7:f6:92:2f:dd: 67:c5:9e:4f:fa:d3:95:e5:b4:2c:e9:b0:1e:14:67:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:04:d1:5a:61:98:10:cc:ff:5a:60:b8:f3:9c:3f:34: 15:f5:36:83:b9:da:c2:47:ee:d2:05:13:d3:3e:11:6f: f2:96:0f:f9:59:19:0f:0a:5a:ae:bb:56:ec:43:8d:4e: 33:e9:60:c2:f2:91:8c:b0:4d:87:59:54:3a:2d:40:6c: e9:a6:4d:0a:95:fa:f4:81:5c:17:5f:02:b0:ae:c7:04: b8:87:e6:d4:22:3a:ff:26:62:f5:a1:70:bb:09:07:5a: 35:1f:a7:3b:6e:ad:2c:cf:4e:43:fd:3e:d7:bb:57:33: 78:d0:a5:cf:d2:a7:21:dd:ed:14:bf:dd:6b:39:87:c5: a0:da:78:45:3f:b5:0b:c0:95:9a:e8:30:49:ec:14:c9: 1f:9a:5b:3b:bd:a3:2b:8c:4a:8e:a3:89:2b:67:0a:0b: f1:cd:98:1b:18:28:81:d8:29:3a:1a:30:bf:98:5e:43: 3b:96:4b:d7:0d:19:fd:6c:98:d4:73:e2:eb:a8:31:f2: 9a:fb:90:97:da:e4:16:fb:f2:82:b5:bc:a3:1d:d5:45: 82:8d:a8:9e:2b:d8:1e:c0:c8:15:da:d0:5e:2e:83:2c: a5:f0:f9:15:4b:9b:16:eb:11:bf:a0:49:19:ab:57:09: 90:d4:af:1b:96:26:22:a6:13:11:27:27:a1:3b:a3:a8 Fingerprint (SHA-256): 53:DA:A2:F3:1D:6E:50:F7:BB:94:2E:99:2C:76:5B:80:71:25:BB:A7:CB:13:AC:2B:0A:1E:B4:C2:EC:F3:29:AE Fingerprint (SHA1): CA:66:2D:D8:A4:F4:D1:51:96:F4:D0:A1:21:95:DC:CC:2C:C3:E5:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143031 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018143032 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018143033 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018143034 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018143035 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018143036 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018143037 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143031 (0x3cafa137) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:35:56 2023 Not After : Wed Oct 18 14:35:56 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:77:58:b2:be:32:6b:5f:9d:56:da:df:6c:56:fd:4f: 82:1d:44:83:73:52:b5:22:6d:c3:59:aa:c3:00:a6:53: 33:86:74:bb:3d:e2:95:a8:61:2e:9b:a0:73:46:ae:f3: f8:11:49:29:23:41:22:5a:5e:14:d9:8a:6c:9d:c0:0d: f8:08:40:c8:42:38:e7:fb:cd:ab:51:7c:09:dc:14:54: 57:24:bc:55:96:7d:2f:9c:3a:8c:20:13:89:69:61:f3: cb:7c:4a:1c:2f:10:80:72:7a:91:72:c4:19:bb:58:1e: fc:77:fd:ca:3b:da:6b:c5:00:2a:fb:14:d7:40:0e:a2: 9d:ce:49:62:e7:03:cd:64:4b:ed:6f:f2:8a:10:55:31: a3:3b:0f:c5:ff:01:f0:d4:ad:8d:97:0a:39:36:67:3d: 84:50:02:4d:de:64:ee:3f:db:07:8d:08:d9:71:9f:99: bb:fe:98:9c:0a:b1:33:5b:fb:2b:e2:c4:6f:8e:ce:4b: a2:24:34:c9:02:98:87:cd:f8:e9:04:60:c3:0d:b4:25: a5:48:1d:79:99:58:91:e0:66:1e:d4:e2:47:9e:54:8e: 1c:2d:61:0a:84:88:a9:97:1c:ea:de:aa:00:2e:57:02: b3:3b:cf:bd:65:16:af:08:75:37:37:e1:39:06:27:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:03:f2:b3:5b:ff:71:7e:1d:6a:45:10:9c:86:60:54: be:44:fe:95:04:7e:22:7b:a1:6a:9c:74:37:d9:58:2f: 58:37:4e:e0:23:41:8e:ce:5b:61:29:2e:4a:bd:26:20: 6c:9d:d8:c1:f7:83:f1:e8:48:9a:20:a9:1f:ef:0a:4c: 37:55:95:00:46:9d:66:70:87:37:3f:e8:dd:9c:2f:d2: 83:70:75:12:5a:a4:12:27:ac:f6:df:bf:9f:73:8e:34: 38:1d:fc:c1:c7:a3:3a:d9:1f:00:99:6b:86:83:b6:a7: 16:02:cd:73:f7:04:c1:69:12:d1:ff:16:17:e6:76:fc: a8:78:82:3b:1a:60:62:bd:d0:d4:bb:08:d6:62:b9:cb: b8:e1:76:3b:08:45:46:13:e4:6d:43:9a:aa:d3:37:bd: b9:60:6d:5a:d5:e1:6b:d4:a3:40:7c:f0:29:1d:73:03: ee:71:b5:fd:0b:ee:cd:c5:fe:0d:58:96:ca:8a:a9:ad: 77:d3:ed:d2:0d:d9:f2:e0:58:d6:94:41:25:9a:ff:21: 25:31:64:a3:4d:20:a4:e0:32:02:c3:14:b4:c4:59:bd: 8a:80:48:9a:f2:89:e0:af:54:45:db:f5:a7:0c:07:59: a9:93:d3:f4:9d:d3:30:75:bb:8f:ee:68:a0:ad:7c:f5 Fingerprint (SHA-256): DF:5C:7F:E4:ED:C8:61:7F:50:37:D2:B0:BE:33:E7:84:70:5F:3C:2C:1D:C1:AB:B3:D9:F5:EE:AB:E2:7C:3D:EF Fingerprint (SHA1): 8D:C1:B4:B6:60:05:90:D5:BF:FE:C8:2D:0C:30:55:FE:F0:12:2D:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143033 (0x3cafa139) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:35:58 2023 Not After : Wed Oct 18 14:35:58 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:14:20:a0:60:4f:30:3a:5c:4a:25:9e:73:cd:53:b0: 35:fd:36:27:88:6c:fd:43:75:99:f2:f7:5c:65:50:60: b2:96:c8:d3:51:41:dd:91:1c:56:73:a8:78:9b:9a:e8: 9b:e5:fc:77:3a:1b:46:63:32:e1:77:f6:42:d6:e8:e5: 81:24:93:49:13:a5:2c:bb:54:98:b2:27:c3:7e:29:27: e0:1b:a0:34:4c:a3:a6:e1:28:f9:96:cd:12:4b:ec:f3: 73:58:59:cc:8c:e2:27:66:aa:a5:06:f7:1f:e2:90:bf: 72:43:e4:a5:38:f4:b0:86:d0:1d:91:34:91:ba:2d:9e: 74:28:28:f2:bc:93:42:7c:bc:f4:94:e2:50:88:48:e3: 64:25:00:cc:78:2b:f4:08:01:5d:3d:26:c6:1b:62:33: fd:ab:59:62:fb:8b:ed:93:2a:d9:6a:a5:12:ac:f3:9d: 28:db:79:aa:e3:b2:47:63:45:1c:4d:52:d4:80:33:30: 07:25:7b:be:48:f5:0c:af:36:8e:48:42:c8:03:e0:2c: a1:70:89:02:31:5e:47:94:72:58:57:0b:50:08:29:91: 14:2f:45:56:7e:af:92:ad:8c:64:bd:30:83:c2:69:75: fa:4c:0f:86:09:1e:b3:70:e4:7a:b0:2f:79:96:dd:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:33:37:80:0f:3d:31:2a:68:fe:b8:ca:60:a3:b5:ab: 5a:e6:11:8c:28:69:a7:ad:2a:02:b4:d4:be:7e:b7:9f: 9c:27:61:6e:24:eb:c8:da:ff:7f:22:f9:5c:46:a1:2a: 5b:9f:db:94:ac:34:5b:26:be:4b:91:b8:ed:d4:d5:56: 3b:20:13:98:2b:10:f0:ad:24:cc:c5:0e:1b:4c:87:45: 29:57:a4:7e:3b:38:90:22:d1:81:47:11:97:92:94:85: e3:31:d4:b8:62:68:01:4b:ff:cd:59:be:4e:25:14:70: 75:d1:3f:aa:57:2c:1d:63:1c:69:47:a2:29:10:82:ab: 25:58:92:04:5e:c3:46:d6:cb:61:4a:b3:db:be:0c:25: 72:2a:4c:a0:42:8e:e8:4e:9d:fa:5a:05:05:bb:d3:2b: af:79:5e:0c:b1:d7:6b:ee:6b:f8:32:a7:44:fe:93:10: 18:da:f1:23:4c:0d:cf:5c:e4:92:30:69:12:2b:4e:4e: 79:87:64:9a:27:d1:00:0a:60:9f:f8:8b:fb:18:32:94: da:bf:20:4e:24:58:38:36:59:c0:98:30:32:a6:60:d5: 82:93:ae:6d:e9:70:bb:b9:dc:00:f1:1b:2a:19:a6:89: 8c:29:32:69:d2:f5:f9:3d:1d:c1:f8:90:01:b7:66:d4 Fingerprint (SHA-256): 9A:B3:F2:4E:E7:85:9B:95:0C:C2:A5:5B:F0:C8:AA:1C:BA:D9:C5:A9:52:84:57:51:23:F8:E4:58:98:83:E3:14 Fingerprint (SHA1): EE:B7:5E:97:08:E0:4B:15:0F:D6:DB:3D:59:EE:2D:5D:3A:9D:B1:14 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143031 (0x3cafa137) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:35:56 2023 Not After : Wed Oct 18 14:35:56 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:77:58:b2:be:32:6b:5f:9d:56:da:df:6c:56:fd:4f: 82:1d:44:83:73:52:b5:22:6d:c3:59:aa:c3:00:a6:53: 33:86:74:bb:3d:e2:95:a8:61:2e:9b:a0:73:46:ae:f3: f8:11:49:29:23:41:22:5a:5e:14:d9:8a:6c:9d:c0:0d: f8:08:40:c8:42:38:e7:fb:cd:ab:51:7c:09:dc:14:54: 57:24:bc:55:96:7d:2f:9c:3a:8c:20:13:89:69:61:f3: cb:7c:4a:1c:2f:10:80:72:7a:91:72:c4:19:bb:58:1e: fc:77:fd:ca:3b:da:6b:c5:00:2a:fb:14:d7:40:0e:a2: 9d:ce:49:62:e7:03:cd:64:4b:ed:6f:f2:8a:10:55:31: a3:3b:0f:c5:ff:01:f0:d4:ad:8d:97:0a:39:36:67:3d: 84:50:02:4d:de:64:ee:3f:db:07:8d:08:d9:71:9f:99: bb:fe:98:9c:0a:b1:33:5b:fb:2b:e2:c4:6f:8e:ce:4b: a2:24:34:c9:02:98:87:cd:f8:e9:04:60:c3:0d:b4:25: a5:48:1d:79:99:58:91:e0:66:1e:d4:e2:47:9e:54:8e: 1c:2d:61:0a:84:88:a9:97:1c:ea:de:aa:00:2e:57:02: b3:3b:cf:bd:65:16:af:08:75:37:37:e1:39:06:27:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:03:f2:b3:5b:ff:71:7e:1d:6a:45:10:9c:86:60:54: be:44:fe:95:04:7e:22:7b:a1:6a:9c:74:37:d9:58:2f: 58:37:4e:e0:23:41:8e:ce:5b:61:29:2e:4a:bd:26:20: 6c:9d:d8:c1:f7:83:f1:e8:48:9a:20:a9:1f:ef:0a:4c: 37:55:95:00:46:9d:66:70:87:37:3f:e8:dd:9c:2f:d2: 83:70:75:12:5a:a4:12:27:ac:f6:df:bf:9f:73:8e:34: 38:1d:fc:c1:c7:a3:3a:d9:1f:00:99:6b:86:83:b6:a7: 16:02:cd:73:f7:04:c1:69:12:d1:ff:16:17:e6:76:fc: a8:78:82:3b:1a:60:62:bd:d0:d4:bb:08:d6:62:b9:cb: b8:e1:76:3b:08:45:46:13:e4:6d:43:9a:aa:d3:37:bd: b9:60:6d:5a:d5:e1:6b:d4:a3:40:7c:f0:29:1d:73:03: ee:71:b5:fd:0b:ee:cd:c5:fe:0d:58:96:ca:8a:a9:ad: 77:d3:ed:d2:0d:d9:f2:e0:58:d6:94:41:25:9a:ff:21: 25:31:64:a3:4d:20:a4:e0:32:02:c3:14:b4:c4:59:bd: 8a:80:48:9a:f2:89:e0:af:54:45:db:f5:a7:0c:07:59: a9:93:d3:f4:9d:d3:30:75:bb:8f:ee:68:a0:ad:7c:f5 Fingerprint (SHA-256): DF:5C:7F:E4:ED:C8:61:7F:50:37:D2:B0:BE:33:E7:84:70:5F:3C:2C:1D:C1:AB:B3:D9:F5:EE:AB:E2:7C:3D:EF Fingerprint (SHA1): 8D:C1:B4:B6:60:05:90:D5:BF:FE:C8:2D:0C:30:55:FE:F0:12:2D:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143031 (0x3cafa137) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:35:56 2023 Not After : Wed Oct 18 14:35:56 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:77:58:b2:be:32:6b:5f:9d:56:da:df:6c:56:fd:4f: 82:1d:44:83:73:52:b5:22:6d:c3:59:aa:c3:00:a6:53: 33:86:74:bb:3d:e2:95:a8:61:2e:9b:a0:73:46:ae:f3: f8:11:49:29:23:41:22:5a:5e:14:d9:8a:6c:9d:c0:0d: f8:08:40:c8:42:38:e7:fb:cd:ab:51:7c:09:dc:14:54: 57:24:bc:55:96:7d:2f:9c:3a:8c:20:13:89:69:61:f3: cb:7c:4a:1c:2f:10:80:72:7a:91:72:c4:19:bb:58:1e: fc:77:fd:ca:3b:da:6b:c5:00:2a:fb:14:d7:40:0e:a2: 9d:ce:49:62:e7:03:cd:64:4b:ed:6f:f2:8a:10:55:31: a3:3b:0f:c5:ff:01:f0:d4:ad:8d:97:0a:39:36:67:3d: 84:50:02:4d:de:64:ee:3f:db:07:8d:08:d9:71:9f:99: bb:fe:98:9c:0a:b1:33:5b:fb:2b:e2:c4:6f:8e:ce:4b: a2:24:34:c9:02:98:87:cd:f8:e9:04:60:c3:0d:b4:25: a5:48:1d:79:99:58:91:e0:66:1e:d4:e2:47:9e:54:8e: 1c:2d:61:0a:84:88:a9:97:1c:ea:de:aa:00:2e:57:02: b3:3b:cf:bd:65:16:af:08:75:37:37:e1:39:06:27:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:03:f2:b3:5b:ff:71:7e:1d:6a:45:10:9c:86:60:54: be:44:fe:95:04:7e:22:7b:a1:6a:9c:74:37:d9:58:2f: 58:37:4e:e0:23:41:8e:ce:5b:61:29:2e:4a:bd:26:20: 6c:9d:d8:c1:f7:83:f1:e8:48:9a:20:a9:1f:ef:0a:4c: 37:55:95:00:46:9d:66:70:87:37:3f:e8:dd:9c:2f:d2: 83:70:75:12:5a:a4:12:27:ac:f6:df:bf:9f:73:8e:34: 38:1d:fc:c1:c7:a3:3a:d9:1f:00:99:6b:86:83:b6:a7: 16:02:cd:73:f7:04:c1:69:12:d1:ff:16:17:e6:76:fc: a8:78:82:3b:1a:60:62:bd:d0:d4:bb:08:d6:62:b9:cb: b8:e1:76:3b:08:45:46:13:e4:6d:43:9a:aa:d3:37:bd: b9:60:6d:5a:d5:e1:6b:d4:a3:40:7c:f0:29:1d:73:03: ee:71:b5:fd:0b:ee:cd:c5:fe:0d:58:96:ca:8a:a9:ad: 77:d3:ed:d2:0d:d9:f2:e0:58:d6:94:41:25:9a:ff:21: 25:31:64:a3:4d:20:a4:e0:32:02:c3:14:b4:c4:59:bd: 8a:80:48:9a:f2:89:e0:af:54:45:db:f5:a7:0c:07:59: a9:93:d3:f4:9d:d3:30:75:bb:8f:ee:68:a0:ad:7c:f5 Fingerprint (SHA-256): DF:5C:7F:E4:ED:C8:61:7F:50:37:D2:B0:BE:33:E7:84:70:5F:3C:2C:1D:C1:AB:B3:D9:F5:EE:AB:E2:7C:3D:EF Fingerprint (SHA1): 8D:C1:B4:B6:60:05:90:D5:BF:FE:C8:2D:0C:30:55:FE:F0:12:2D:0C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143033 (0x3cafa139) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:35:58 2023 Not After : Wed Oct 18 14:35:58 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:14:20:a0:60:4f:30:3a:5c:4a:25:9e:73:cd:53:b0: 35:fd:36:27:88:6c:fd:43:75:99:f2:f7:5c:65:50:60: b2:96:c8:d3:51:41:dd:91:1c:56:73:a8:78:9b:9a:e8: 9b:e5:fc:77:3a:1b:46:63:32:e1:77:f6:42:d6:e8:e5: 81:24:93:49:13:a5:2c:bb:54:98:b2:27:c3:7e:29:27: e0:1b:a0:34:4c:a3:a6:e1:28:f9:96:cd:12:4b:ec:f3: 73:58:59:cc:8c:e2:27:66:aa:a5:06:f7:1f:e2:90:bf: 72:43:e4:a5:38:f4:b0:86:d0:1d:91:34:91:ba:2d:9e: 74:28:28:f2:bc:93:42:7c:bc:f4:94:e2:50:88:48:e3: 64:25:00:cc:78:2b:f4:08:01:5d:3d:26:c6:1b:62:33: fd:ab:59:62:fb:8b:ed:93:2a:d9:6a:a5:12:ac:f3:9d: 28:db:79:aa:e3:b2:47:63:45:1c:4d:52:d4:80:33:30: 07:25:7b:be:48:f5:0c:af:36:8e:48:42:c8:03:e0:2c: a1:70:89:02:31:5e:47:94:72:58:57:0b:50:08:29:91: 14:2f:45:56:7e:af:92:ad:8c:64:bd:30:83:c2:69:75: fa:4c:0f:86:09:1e:b3:70:e4:7a:b0:2f:79:96:dd:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:33:37:80:0f:3d:31:2a:68:fe:b8:ca:60:a3:b5:ab: 5a:e6:11:8c:28:69:a7:ad:2a:02:b4:d4:be:7e:b7:9f: 9c:27:61:6e:24:eb:c8:da:ff:7f:22:f9:5c:46:a1:2a: 5b:9f:db:94:ac:34:5b:26:be:4b:91:b8:ed:d4:d5:56: 3b:20:13:98:2b:10:f0:ad:24:cc:c5:0e:1b:4c:87:45: 29:57:a4:7e:3b:38:90:22:d1:81:47:11:97:92:94:85: e3:31:d4:b8:62:68:01:4b:ff:cd:59:be:4e:25:14:70: 75:d1:3f:aa:57:2c:1d:63:1c:69:47:a2:29:10:82:ab: 25:58:92:04:5e:c3:46:d6:cb:61:4a:b3:db:be:0c:25: 72:2a:4c:a0:42:8e:e8:4e:9d:fa:5a:05:05:bb:d3:2b: af:79:5e:0c:b1:d7:6b:ee:6b:f8:32:a7:44:fe:93:10: 18:da:f1:23:4c:0d:cf:5c:e4:92:30:69:12:2b:4e:4e: 79:87:64:9a:27:d1:00:0a:60:9f:f8:8b:fb:18:32:94: da:bf:20:4e:24:58:38:36:59:c0:98:30:32:a6:60:d5: 82:93:ae:6d:e9:70:bb:b9:dc:00:f1:1b:2a:19:a6:89: 8c:29:32:69:d2:f5:f9:3d:1d:c1:f8:90:01:b7:66:d4 Fingerprint (SHA-256): 9A:B3:F2:4E:E7:85:9B:95:0C:C2:A5:5B:F0:C8:AA:1C:BA:D9:C5:A9:52:84:57:51:23:F8:E4:58:98:83:E3:14 Fingerprint (SHA1): EE:B7:5E:97:08:E0:4B:15:0F:D6:DB:3D:59:EE:2D:5D:3A:9D:B1:14 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143031 (0x3cafa137) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:35:56 2023 Not After : Wed Oct 18 14:35:56 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:77:58:b2:be:32:6b:5f:9d:56:da:df:6c:56:fd:4f: 82:1d:44:83:73:52:b5:22:6d:c3:59:aa:c3:00:a6:53: 33:86:74:bb:3d:e2:95:a8:61:2e:9b:a0:73:46:ae:f3: f8:11:49:29:23:41:22:5a:5e:14:d9:8a:6c:9d:c0:0d: f8:08:40:c8:42:38:e7:fb:cd:ab:51:7c:09:dc:14:54: 57:24:bc:55:96:7d:2f:9c:3a:8c:20:13:89:69:61:f3: cb:7c:4a:1c:2f:10:80:72:7a:91:72:c4:19:bb:58:1e: fc:77:fd:ca:3b:da:6b:c5:00:2a:fb:14:d7:40:0e:a2: 9d:ce:49:62:e7:03:cd:64:4b:ed:6f:f2:8a:10:55:31: a3:3b:0f:c5:ff:01:f0:d4:ad:8d:97:0a:39:36:67:3d: 84:50:02:4d:de:64:ee:3f:db:07:8d:08:d9:71:9f:99: bb:fe:98:9c:0a:b1:33:5b:fb:2b:e2:c4:6f:8e:ce:4b: a2:24:34:c9:02:98:87:cd:f8:e9:04:60:c3:0d:b4:25: a5:48:1d:79:99:58:91:e0:66:1e:d4:e2:47:9e:54:8e: 1c:2d:61:0a:84:88:a9:97:1c:ea:de:aa:00:2e:57:02: b3:3b:cf:bd:65:16:af:08:75:37:37:e1:39:06:27:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:03:f2:b3:5b:ff:71:7e:1d:6a:45:10:9c:86:60:54: be:44:fe:95:04:7e:22:7b:a1:6a:9c:74:37:d9:58:2f: 58:37:4e:e0:23:41:8e:ce:5b:61:29:2e:4a:bd:26:20: 6c:9d:d8:c1:f7:83:f1:e8:48:9a:20:a9:1f:ef:0a:4c: 37:55:95:00:46:9d:66:70:87:37:3f:e8:dd:9c:2f:d2: 83:70:75:12:5a:a4:12:27:ac:f6:df:bf:9f:73:8e:34: 38:1d:fc:c1:c7:a3:3a:d9:1f:00:99:6b:86:83:b6:a7: 16:02:cd:73:f7:04:c1:69:12:d1:ff:16:17:e6:76:fc: a8:78:82:3b:1a:60:62:bd:d0:d4:bb:08:d6:62:b9:cb: b8:e1:76:3b:08:45:46:13:e4:6d:43:9a:aa:d3:37:bd: b9:60:6d:5a:d5:e1:6b:d4:a3:40:7c:f0:29:1d:73:03: ee:71:b5:fd:0b:ee:cd:c5:fe:0d:58:96:ca:8a:a9:ad: 77:d3:ed:d2:0d:d9:f2:e0:58:d6:94:41:25:9a:ff:21: 25:31:64:a3:4d:20:a4:e0:32:02:c3:14:b4:c4:59:bd: 8a:80:48:9a:f2:89:e0:af:54:45:db:f5:a7:0c:07:59: a9:93:d3:f4:9d:d3:30:75:bb:8f:ee:68:a0:ad:7c:f5 Fingerprint (SHA-256): DF:5C:7F:E4:ED:C8:61:7F:50:37:D2:B0:BE:33:E7:84:70:5F:3C:2C:1D:C1:AB:B3:D9:F5:EE:AB:E2:7C:3D:EF Fingerprint (SHA1): 8D:C1:B4:B6:60:05:90:D5:BF:FE:C8:2D:0C:30:55:FE:F0:12:2D:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143035 (0x3cafa13b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:36:01 2023 Not After : Wed Oct 18 14:36:01 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:47:df:66:42:00:e6:5b:35:de:75:7d:3e:56:13:77: cd:26:a6:bd:95:89:76:a1:8d:73:20:a9:8f:ce:6e:ca: 74:37:32:11:e0:4f:35:70:f4:f5:f4:7b:13:4f:a2:cf: f4:3a:56:1a:42:1c:59:f5:6d:55:14:69:c8:d3:93:3d: 77:1b:e8:b1:f0:0a:9f:44:2a:9c:ad:8f:f1:20:99:ba: 7d:c3:21:cf:c2:6d:ff:cf:14:f6:8f:84:0e:3c:72:5c: 84:0f:b7:da:96:d1:64:3b:4f:48:13:45:55:bb:aa:f3: 25:ff:63:39:33:89:6e:1c:b8:07:55:f3:84:5d:96:02: 67:95:39:26:64:7f:eb:8c:5c:77:b7:c2:fc:8c:93:13: 3d:a8:4d:a0:32:bf:ab:16:9f:35:a9:10:3b:0f:ed:a8: 8a:4e:3e:0e:b7:86:8e:ba:1d:2b:05:f4:5c:13:04:b9: 67:4b:68:f6:d0:fe:35:c1:98:49:a3:79:2a:c3:8e:0e: dc:4c:29:a8:2a:33:f2:ad:f9:6a:fb:bb:51:4d:8e:59: 69:a3:ce:79:a1:ff:4a:33:a6:62:a1:75:a4:ca:c6:5f: f6:6f:39:a3:72:63:de:ac:41:57:a6:c8:8e:f6:af:00: 43:95:ef:70:2e:c0:4e:59:50:76:6b:5d:26:2e:20:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:e3:ee:6c:ca:18:a9:14:88:30:d6:ca:17:6c:2b:8a: d4:6b:8c:ba:87:34:1b:3d:8d:14:01:39:11:de:7f:90: 95:f7:08:f1:bc:3d:7a:b7:67:45:a5:2d:a0:33:95:ed: c4:e0:d0:b9:de:9d:8d:d2:47:31:0e:7a:ac:11:fe:33: df:b6:7f:b1:dd:dd:26:2f:64:4c:cf:b0:b2:24:51:98: 96:47:4f:3c:6e:86:e5:8f:3c:e5:f9:1b:34:dd:ae:6f: 44:1e:a3:8e:46:31:fc:68:c3:d6:53:49:73:46:b0:3c: 6b:b3:99:0e:a3:65:08:de:0d:1d:15:8a:1a:dd:ea:30: 3d:01:b7:19:70:05:d6:50:35:12:61:c3:ec:81:cc:f0: da:d8:00:83:53:ae:c1:fa:d7:96:50:d0:75:84:47:95: c4:2b:d3:31:ab:80:bc:5e:86:f0:eb:de:d6:6a:73:bc: 25:e4:a2:c5:0b:25:93:52:d3:05:21:4a:9f:2e:d1:13: f8:d7:e5:5c:89:07:1b:7a:e0:fb:c4:2f:49:2c:fb:af: 2f:f7:3a:18:0d:e2:c4:2d:df:2f:45:b3:ed:03:ca:9e: 7b:7c:9f:31:5a:1b:11:d4:1d:8d:a3:a6:5b:09:cc:7f: a9:d0:89:2c:c0:64:a7:30:78:90:fa:7a:53:87:47:1c Fingerprint (SHA-256): 2F:18:5C:42:B5:CC:30:93:78:E9:EF:A4:46:35:D6:B1:33:40:64:BE:46:AF:0B:A4:0A:97:5E:DA:5E:85:08:79 Fingerprint (SHA1): 83:3E:24:40:3B:28:13:DF:76:FB:05:E3:18:0A:94:E9:96:81:3D:20 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143031 (0x3cafa137) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:35:56 2023 Not After : Wed Oct 18 14:35:56 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:77:58:b2:be:32:6b:5f:9d:56:da:df:6c:56:fd:4f: 82:1d:44:83:73:52:b5:22:6d:c3:59:aa:c3:00:a6:53: 33:86:74:bb:3d:e2:95:a8:61:2e:9b:a0:73:46:ae:f3: f8:11:49:29:23:41:22:5a:5e:14:d9:8a:6c:9d:c0:0d: f8:08:40:c8:42:38:e7:fb:cd:ab:51:7c:09:dc:14:54: 57:24:bc:55:96:7d:2f:9c:3a:8c:20:13:89:69:61:f3: cb:7c:4a:1c:2f:10:80:72:7a:91:72:c4:19:bb:58:1e: fc:77:fd:ca:3b:da:6b:c5:00:2a:fb:14:d7:40:0e:a2: 9d:ce:49:62:e7:03:cd:64:4b:ed:6f:f2:8a:10:55:31: a3:3b:0f:c5:ff:01:f0:d4:ad:8d:97:0a:39:36:67:3d: 84:50:02:4d:de:64:ee:3f:db:07:8d:08:d9:71:9f:99: bb:fe:98:9c:0a:b1:33:5b:fb:2b:e2:c4:6f:8e:ce:4b: a2:24:34:c9:02:98:87:cd:f8:e9:04:60:c3:0d:b4:25: a5:48:1d:79:99:58:91:e0:66:1e:d4:e2:47:9e:54:8e: 1c:2d:61:0a:84:88:a9:97:1c:ea:de:aa:00:2e:57:02: b3:3b:cf:bd:65:16:af:08:75:37:37:e1:39:06:27:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:03:f2:b3:5b:ff:71:7e:1d:6a:45:10:9c:86:60:54: be:44:fe:95:04:7e:22:7b:a1:6a:9c:74:37:d9:58:2f: 58:37:4e:e0:23:41:8e:ce:5b:61:29:2e:4a:bd:26:20: 6c:9d:d8:c1:f7:83:f1:e8:48:9a:20:a9:1f:ef:0a:4c: 37:55:95:00:46:9d:66:70:87:37:3f:e8:dd:9c:2f:d2: 83:70:75:12:5a:a4:12:27:ac:f6:df:bf:9f:73:8e:34: 38:1d:fc:c1:c7:a3:3a:d9:1f:00:99:6b:86:83:b6:a7: 16:02:cd:73:f7:04:c1:69:12:d1:ff:16:17:e6:76:fc: a8:78:82:3b:1a:60:62:bd:d0:d4:bb:08:d6:62:b9:cb: b8:e1:76:3b:08:45:46:13:e4:6d:43:9a:aa:d3:37:bd: b9:60:6d:5a:d5:e1:6b:d4:a3:40:7c:f0:29:1d:73:03: ee:71:b5:fd:0b:ee:cd:c5:fe:0d:58:96:ca:8a:a9:ad: 77:d3:ed:d2:0d:d9:f2:e0:58:d6:94:41:25:9a:ff:21: 25:31:64:a3:4d:20:a4:e0:32:02:c3:14:b4:c4:59:bd: 8a:80:48:9a:f2:89:e0:af:54:45:db:f5:a7:0c:07:59: a9:93:d3:f4:9d:d3:30:75:bb:8f:ee:68:a0:ad:7c:f5 Fingerprint (SHA-256): DF:5C:7F:E4:ED:C8:61:7F:50:37:D2:B0:BE:33:E7:84:70:5F:3C:2C:1D:C1:AB:B3:D9:F5:EE:AB:E2:7C:3D:EF Fingerprint (SHA1): 8D:C1:B4:B6:60:05:90:D5:BF:FE:C8:2D:0C:30:55:FE:F0:12:2D:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018143036 (0x3cafa13c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:36:02 2023 Not After : Wed Oct 18 14:36:02 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:76:12:62:16:62:29:29:80:90:dd:b9:3b:3f:eb:d9: 94:65:56:f6:39:02:1f:1f:14:c7:dc:61:c2:43:9e:b4: d5:d0:50:20:58:ed:46:00:35:4f:ed:38:d8:c7:32:5a: a8:cf:49:8b:c6:b5:f5:50:eb:43:c5:a5:ce:56:09:b5: b3:52:ec:e4:e5:df:79:ac:c7:92:ca:a8:a3:ab:43:5e: a2:76:1e:74:88:5b:d4:9a:6e:3f:90:8b:ac:75:2a:3d: 40:e1:ef:86:10:ab:9c:46:1a:6a:3e:eb:dc:fb:72:4b: da:5f:9d:90:3e:77:91:21:04:ea:ed:89:55:61:9d:a1: 8f:20:c8:87:f4:4d:57:f3:68:1e:d8:0b:31:81:f0:03: 6e:52:e5:5b:81:7c:73:52:cd:7c:b4:12:d3:b3:74:e8: 06:a6:44:e9:34:1f:a8:a7:dc:de:c2:59:cf:28:3f:4f: 4c:4c:e2:87:55:cd:78:35:e7:67:72:41:75:75:12:2d: 1d:36:7c:1c:05:2c:90:1f:19:b8:37:e5:9a:dc:3f:dd: 34:3b:ac:5b:2e:e0:03:a6:13:1b:da:f9:7f:55:7e:94: 56:0f:0c:24:19:10:21:ed:e5:cb:30:9a:1c:1f:26:4a: 5a:4d:99:39:7f:58:0d:a9:9a:43:eb:2b:0d:8f:d2:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:a2:6f:92:c2:8a:5a:3c:e0:3d:34:7c:ee:28:58:aa: fa:7a:82:b2:31:ec:66:3f:9b:ac:b3:02:1f:c6:1a:73: 01:38:b8:08:23:c3:46:b1:d7:4f:0e:63:a6:c7:a6:2d: 61:d5:d6:72:a8:17:25:d7:0a:27:91:f2:4b:8c:3c:cf: 49:81:ee:21:bd:cc:ba:a5:7a:00:d2:cc:30:13:83:1e: f5:7a:c2:38:03:8c:11:50:ae:22:42:ef:e1:ec:b2:9c: 09:cb:c2:6a:85:d8:2c:25:de:fc:bd:ce:dc:24:e3:e4: 7f:6c:53:a2:06:8e:66:52:e7:e7:1c:4e:d0:81:16:43: 0c:44:bc:e2:41:2d:ef:41:bf:98:46:13:2b:ae:9a:a2: 21:73:98:c9:68:dc:98:91:d9:15:e1:53:47:2d:28:a1: 62:0a:0d:4a:78:80:31:a9:5a:ba:07:18:ca:a0:9d:aa: 29:ee:26:b5:79:c2:7e:ed:09:cb:8c:ca:46:81:7e:ce: 2c:28:31:70:13:64:ad:8e:a8:12:27:11:e2:94:ae:1b: 69:78:35:f4:7b:5b:ac:1b:de:82:89:f4:9c:74:c8:09: ee:3e:f0:7d:ba:cf:4b:db:f0:4e:d3:82:c6:91:18:1f: 1a:a7:fd:2d:94:38:26:e6:d1:96:54:1a:d7:1d:4c:fc Fingerprint (SHA-256): 69:1F:76:71:CD:89:DA:83:DE:33:AE:1F:E5:EA:21:A9:E7:2C:A3:E2:66:FA:78:20:83:D1:F3:4D:87:4B:C4:1A Fingerprint (SHA1): 15:53:71:92:0C:12:41:60:CC:4E:5F:29:13:F0:43:8B:22:A4:71:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 19273 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 19273 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 19273 killed at Wed Oct 18 14:36:11 UTC 2023 TIMESTAMP chains END: Wed Oct 18 14:36:11 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 14:36:11 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 14:36:11 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 14:36:11 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 14:36:11 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #5: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 14:36:12 UTC 2023 TIMESTAMP ec END: Wed Oct 18 14:36:12 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 14:36:12 UTC 2023 ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 14:36:12 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 14:36:12 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 14:36:12 UTC 2023 %{do_ssl_gtests}.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed Oct 18 14:36:12 UTC 2023 TIMESTAMP libpkix END: Wed Oct 18 14:36:12 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 14:36:12 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #81: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #84: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #109: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #114: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k eb153da523831d319c3b3ae558c236665900ee29 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k fea0172b6f0a424f05296b6778b67b9d717d887f -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:ac:3d:60:9e:50:22:4f:2a:e0:fb:e6:ed:b7:45:a4: 2a:05:a7:71:41:46:ad:0e:18:90:e1:c6:dc:7a:87:09: be:e7:71:b0:19:64:7d:6f:96:e2:0d:af:b3:e7:ad:7c: 84:0e:58:88:13:b8:9a:68:3e:12:48:25:03:cb:f5:62: 61:b8:31:3d:b9:90:8a:7a:74:71:1d:4b:ea:bb:10:2b: 9a:67:a3:46:16:3e:0a:06:b7:23:ae:27:b7:a7:03:04: e5:4c:e6:77:f5:f9:d2:2a:41:4e:e8:7c:42:38:25:8a: 5e:e9:48:c3:a9:d6:c8:2e:9a:23:d1:a0:fd:f1:93:c9: 26:9d:35:44:1d:ec:7f:bf:de:b2:f3:ee:ae:7a:be:d7: 1c:53:a3:95:ac:5e:fd:0a:18:7f:45:a5:f0:87:b6:37: a7:4d:c2:db:96:9b:3e:b1:6a:59:93:78:b3:c7:5b:d4: b1:b6:aa:53:7c:d1:38:03:7a:6e:70:cb:f8:38:66:2c: 78:5e:d0:35:5a:90:a8:b5:50:67:6f:d4:a3:5e:24:49: dc:b9:1b:85:df:25:05:b8:76:32:5c:2c:65:8b:80:70: 54:a3:26:a8:fd:1a:06:8e:cc:70:e6:4a:55:e8:4e:c3: 92:80:81:13:2b:19:00:96:f2:18:5a:9e:4e:44:90:43 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:fc:0a:f1:da:fb:e9:53:69:31:45:d3:ad:21:fe:f3: 5f:ba:32:8a:16:d0:91:c5:64:10:80:ed:c0:7e:86:cf: 0c:33:90:ff:8e:39:0e:63:14:48:b6:87:99:7b:21:ff: 0d:d0:34:4f:c3:32:fb:ab:9c:9c:09:51:03:f1:29:ad: 2d:60:17:05:d0:5c:53:54:c0:d4:b8:75:20:fd:4c:48: 3e:79:74:9d:07:c4:f0:f7:a4:dd:d6:bb:b7:ea:8b:e8: 10:5e:b5:71:28:95:23:56:3b:84:6b:fe:e6:cb:43:68: 08:d3:b4:6c:90:de:af:8a:03:69:b5:df:5d:5e:e5:23: 9f:d6:21:f4:f8:76:11:16:c5:a4:8b:6e:fa:f0:06:bd: fa:e2:ed:67:95:22:43:65:ac:33:49:f5:d9:85:f1:8e: 16:95:75:9d:19:2f:4f:07:54:94:52:6e:c6:c2:29:2c: db:c4:b3:58:e6:0d:28:c2:14:9c:70:3f:f0:25:d4:f8: 82:35:c9:f2:c8:8b:a9:6b:00:60:fa:b3:95:8f:9e:f5: fb:49:35:ba:d6:61:54:6c:45:0e:e9:51:ca:10:86:6a: 32:59:e6:4e:8f:69:67:56:e1:82:fb:46:cb:82:50:d2: 78:e1:2c:63:ef:88:36:61:03:bc:3e:9f:04:f1:a6:03 Fingerprint (SHA-256): 53:00:6E:D6:BE:5A:3A:6E:31:E2:AD:A2:D1:41:C5:0C:41:9B:BB:D2:AA:DA:20:E4:1A:F8:8F:11:AA:1E:A5:6D Fingerprint (SHA1): BC:C7:54:15:1F:8A:82:F2:CD:C9:6F:88:95:B6:F7:79:5F:BA:C6:97 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:6d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:17 2023 Not After : Thu Jan 18 14:37:17 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:c8:47:b3:25:79:24:67:15:e3:26:8f:df:f9:2d:76: 63:23:35:bd:a9:63:bd:1e:e4:0a:a0:ee:7f:f9:e6:ac: 79:ee:c6:a9:9b:52:01:9a:55:89:3e:5f:ec:04:2a:44: 58:6e:f7:bd:d9:79:ed:cb:10:e6:b4:80:22:e0:c8:46: 22:26:14:4a:6a:b8:b1:9f:f4:75:63:5e:72:2d:ed:19: 43:64:fa:e1:1f:f5:39:fe:4c:a4:13:66:e6:39:3b:97: 71:04:bf:d4:ea:92:bf:90:14:0c:4d:8c:fd:b5:22:ed: 3e:f1:10:e4:14:70:85:43:44:b2:d7:c0:1c:3a:d6:bf: e0:f0:4f:0c:9f:ea:2c:6a:a2:e9:d3:20:cd:25:8b:fb: 21:ef:d1:4f:f1:2f:34:48:fe:4a:14:fd:8b:55:c8:13: 5c:69:25:0e:5d:0c:3a:83:ce:d7:a1:ca:e9:79:15:73: 3b:d9:55:d1:86:28:8d:2e:bb:dc:54:59:8c:76:78:16: 36:19:97:ad:03:ff:af:fb:98:1d:cd:cd:41:c8:9a:9d: 76:18:4e:aa:c7:ca:1a:63:aa:8a:59:24:6e:c6:fa:dd: 8d:d5:a2:f5:35:cc:99:be:1d:fa:50:be:f9:db:64:37: 67:09:fe:af:6b:e3:7b:45:b4:2a:2e:46:af:2a:b7:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:f8:98:3e:d0:33:de:d1:9e:19:6b:06:8c:b0:e2:67: 3a:d9:ce:93:d6:ad:48:e7:d6:99:9e:2c:87:0c:6d:99: 0c:3b:e0:64:d1:5e:6b:2f:91:88:46:3b:ff:b3:f3:87: 08:7c:ae:ce:64:27:83:18:b3:d5:cf:03:4b:12:a2:de: 6f:ab:06:e0:82:5b:24:78:49:9c:38:6a:29:34:e3:01: e8:c3:dc:b9:c5:45:3c:2f:c2:fa:40:ff:3d:0b:87:a1: 4d:d9:56:4e:30:e1:6f:b3:6d:bf:88:d7:ea:53:0c:73: 38:38:a0:85:b1:90:30:a4:4b:83:46:f2:07:e3:b5:16: 73:93:8c:b0:34:fd:af:8c:ab:2b:d3:3a:99:80:8d:f6: 82:6e:18:dd:ee:cd:c4:ad:4f:16:e0:1e:10:55:85:dd: 0f:d5:1c:3e:d8:29:42:83:2c:e7:68:79:f1:65:c8:9c: 21:82:3a:4f:f9:f7:9c:12:de:84:f6:7a:e5:ec:41:26: 37:60:8e:89:a4:cb:cf:17:0e:90:b4:a7:c6:4f:e0:40: d0:77:5f:70:17:c3:51:1d:34:82:31:60:ad:e0:6d:44: 69:e9:60:69:66:80:6d:47:3f:e7:2a:f6:69:c6:87:f8: 81:e8:51:a3:9c:03:0f:df:b1:83:f2:cd:aa:bb:dc:56 Fingerprint (SHA-256): 8F:FE:17:D7:FD:35:51:5C:9E:2F:FA:0B:7B:0D:06:80:42:7B:35:F4:D4:E7:75:F9:BB:A4:75:00:E0:C2:E2:0D Fingerprint (SHA1): CB:70:7E:3B:EA:E1:02:55:2C:60:C9:C2:B9:C3:B4:DF:E8:26:1D:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:6f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:18 2023 Not After : Thu Jan 18 14:37:18 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:fa:34:94:ee:ae:ca:7b:de:49:f6:97:48:92:42:de: 22:cc:71:5f:64:2f:8e:f4:5d:da:68:ee:95:4a:1f:c6: 18:1a:70:ec:2f:8f:c9:91:88:27:3f:09:a8:89:93:df: d7:e2:b3:f8:2c:eb:b3:0d:02:d2:1b:01:e9:b1:32:73: c8:96:c6:69:3e:fb:84:7e:08:2d:30:93:8e:fe:de:d4: a8:3f:cf:25:36:2b:84:7c:a1:12:1b:81:b0:99:88:83: 65:bb:2d:a6:e9:7c:ce:09:b0:1d:b6:f8:9b:73:db:8d: 98:72:5f:04:1e:fe:37:1c:fe:27:c0:4f:fa:7e:1e:da: 0a:61:aa:8c:4f:82:7b:99:02:4c:6c:3e:72:ac:54:be: 1f:10:08:e1:5b:3e:25:85:38:e0:61:f8:bd:e3:45:81: 39:12:db:6f:21:f0:15:d3:8f:03:a5:67:9c:61:1a:84: e0:ef:24:df:87:91:13:ec:aa:29:ae:e8:69:b1:6b:98: af:a5:d3:db:43:52:fc:5a:c3:26:0b:a4:69:a1:bb:d0: 61:12:bb:17:a8:43:ba:5f:fa:b8:36:92:44:fa:ad:34: 89:58:28:89:24:2b:c7:1d:06:01:54:22:a7:76:c9:e9: 9b:36:97:4e:dd:be:4e:6b:30:5d:c3:d8:3c:a1:21:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:24:a6:ab:55:a5:48:ec:82:74:52:68:b1:f4:d3:0a: 8b:61:be:b9:41:e3:f7:bf:05:47:24:17:a5:38:e0:7f: 3f:fb:7c:f8:4f:01:11:84:39:a8:f5:02:a1:99:4b:ac: 16:06:e1:fd:04:fc:8c:46:29:c5:a9:67:9b:d6:06:45: 43:b4:92:04:57:27:cb:63:0e:d3:98:6a:e3:56:b4:26: fa:05:40:01:ec:9d:d6:54:e4:ec:69:7f:5c:26:92:47: c6:cc:ef:c4:31:f4:f3:93:81:20:00:3d:c3:3d:8b:55: 84:1c:46:a4:34:02:e8:e7:1a:33:a4:f0:66:0a:3f:dd: 24:5d:53:8a:9e:d2:cb:4d:71:4b:dd:55:48:79:00:38: c4:7b:6a:3d:4b:28:d9:7e:e1:55:c8:d9:8b:e4:e4:61: e0:e4:97:5b:35:27:ed:97:42:fa:2f:e4:6f:9a:37:05: 27:64:fe:24:28:eb:da:50:a3:dc:5c:6b:bc:3e:90:15: 32:41:c7:41:65:80:12:18:df:25:aa:43:bf:1b:f6:2d: 88:2c:e6:73:bb:cd:26:05:05:ea:f2:18:70:87:5b:4e: c8:a4:b3:c3:52:c0:94:b8:04:76:77:ee:87:53:cd:ec: 34:a1:7f:9a:ce:9f:96:14:6c:e0:5a:4e:50:ae:52:11 Fingerprint (SHA-256): C2:B4:07:4D:37:04:7F:67:02:F9:89:11:DE:05:70:EE:0A:25:4F:C8:A5:E6:F0:B1:AB:8C:40:89:1F:66:DF:6D Fingerprint (SHA1): EE:AF:70:0D:C2:E7:46:D7:E6:47:65:F5:40:8F:77:92:92:CB:A7:33 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:71 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:19 2023 Not After : Thu Jan 18 14:37:19 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:e4:57:0c:6e:29:21:1f:4f:f8:41:74:ae:37:b1:79: a5:c8:7d:43:1d:46:3b:0f:7d:0d:94:4a:25:b6:c4:f5: 46:94:fb:db:1a:2b:c0:b0:67:b4:c6:87:09:d3:cc:65: ed:aa:ee:bb:8d:aa:e8:6d:76:e8:8a:09:79:e4:bd:d6: 22:d7:f4:f9:ff:f7:13:28:0f:e6:31:67:92:7c:cb:d9: 22:c5:80:46:d1:1d:af:94:a1:ce:e1:e9:25:5d:fa:7c: 55:d5:8b:e3:f9:3d:e0:b2:e2:b9:4e:c8:60:e1:47:88: 42:a2:e9:fa:81:4b:c1:0b:01:e9:f0:a6:18:f4:d7:d4: 19:44:c6:8e:01:18:46:6b:1c:83:e2:ef:9e:e2:19:e3: 15:7a:15:ba:8e:f9:4e:a0:22:a2:94:5d:c6:d2:28:eb: 74:d0:af:e3:fc:25:8f:45:5e:54:e5:96:3b:95:58:02: c5:97:08:92:65:a8:46:f7:2d:59:f0:19:82:5c:12:15: 99:d3:92:d5:1d:30:2c:fa:2e:d0:88:47:75:c5:20:5e: 24:ae:eb:78:45:2d:82:fe:aa:67:a7:c2:96:99:52:e5: ae:1a:4b:ee:ea:8d:a0:a1:5d:b1:1f:ed:9d:bd:83:2b: 11:27:a9:d1:bf:0c:12:25:53:bc:6b:e0:09:bb:ac:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:39:c0:68:92:e0:22:5f:58:33:70:20:0f:fd:7a:51: 54:b5:da:4d:a3:d5:f8:ca:64:7a:a7:2b:c1:2c:d8:56: 01:8f:44:57:7c:56:fd:4b:84:fd:5f:ce:e1:22:ef:ea: 34:8a:e3:3b:36:8b:49:39:a3:2f:34:d2:4d:6b:c5:f5: 6e:db:5d:a9:88:b1:17:17:d4:fd:5d:f6:25:14:f0:9b: 76:98:cd:1f:fb:ea:bb:b2:dc:af:3f:2c:03:48:5c:53: 0c:bc:3f:03:80:57:2e:54:4d:eb:82:2e:e0:e9:cb:b8: 0d:db:30:f2:97:09:85:b3:09:53:79:d7:93:a7:cb:d3: 51:30:45:d8:06:57:4d:d1:c8:ae:a9:bf:ef:ae:53:47: aa:ce:b4:12:41:bb:57:85:70:48:64:e9:7c:03:3f:64: 8d:55:c3:45:15:f1:a8:2c:d6:97:26:40:3e:b8:85:8e: ac:ff:c2:56:1e:0d:3c:6f:ff:d5:b1:14:73:7e:c0:21: e9:57:63:55:ac:67:6c:e2:64:38:bb:f9:f8:6e:1f:51: 2f:71:bd:32:7b:f0:f3:1b:08:03:33:41:83:5d:9a:32: d6:9e:43:fa:cc:44:36:42:3e:5f:8b:61:35:3a:8f:62: b2:e3:47:f3:e8:8b:70:de:55:bb:f9:25:96:a6:42:cf Fingerprint (SHA-256): D3:84:41:52:CC:11:F7:F7:1A:CC:1A:03:24:57:9F:D7:97:51:F0:38:43:E8:44:D1:CA:7D:CF:F7:1E:E0:5D:DA Fingerprint (SHA1): B9:F8:78:2F:F8:EF:D6:27:70:FF:FC:A1:90:33:CA:47:3A:ED:DB:C6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:74 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:21 2023 Not After : Thu Jan 18 14:37:21 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:be:54:76:2d:07:8f:17:4a:98:80:bd:9d:85:ca:c9: cf:8d:e3:42:c7:eb:32:2f:a1:cc:78:87:09:18:28:d6: 83:ff:09:c8:16:89:66:10:2b:8b:b1:c9:c1:e9:be:40: a9:55:6b:e4:df:31:16:2f:69:5c:0b:fa:ae:17:fc:63: 64:2d:7d:1c:65:63:d3:2f:5d:69:46:14:44:a9:81:95: aa:da:b0:12:fe:ba:da:4d:b7:7a:0b:90:11:ec:c9:26: 28:3a:92:07:7c:d1:03:8d:9b:33:a9:da:61:b9:31:c1: c8:e3:28:5b:d6:64:52:a9:48:8b:57:12:a7:c8:05:64: a1:63:3b:33:fb:24:90:e3:9b:3a:67:84:18:a7:2e:38: 1a:9b:d8:2d:c9:59:cc:8e:bb:a1:f2:c6:cc:d0:7f:ec: 25:52:f7:21:3f:10:97:c6:de:03:7d:84:c0:0f:1f:20: 50:5b:cf:a4:cd:fe:ea:2d:b1:36:24:ef:1f:c5:c6:e5: a8:8e:39:d4:37:48:51:43:0c:79:f2:5d:c7:cb:df:d9: 3f:ea:f5:c0:93:1e:75:1c:db:15:91:4e:51:a1:2a:b8: 1f:c6:75:f0:17:49:b3:88:95:22:7d:e7:3b:8b:ff:09: 9a:05:8c:3b:81:e5:6a:53:37:e9:95:f0:c8:c5:b2:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e9:ba:4e:0f:1c:65:34:48:9e:ba:37:f8:8b:82:33: 33:57:a8:d0:60:b3:5f:57:9b:20:11:4c:02:0b:8f:50: f0:ea:73:5a:4a:7b:81:50:2a:f7:7c:67:d6:39:da:af: 4e:c9:7f:d5:32:f1:27:69:28:7b:33:04:d9:a3:45:7c: 63:5e:40:66:75:cf:9a:08:14:fd:4b:5e:6c:66:fb:11: 0d:2b:15:e2:27:3d:e7:e4:50:a9:41:02:7b:5b:76:41: 99:5a:9f:0b:31:c9:15:e3:9b:a5:cb:1e:6a:a0:76:72: bf:3f:5d:bf:a0:7f:6b:8d:de:a1:45:af:a2:53:74:f3: 56:0f:8b:44:f3:9e:a0:39:9b:9b:e7:10:c0:03:3e:ea: a3:af:7c:2d:21:1b:c1:df:02:83:56:63:b6:b4:d9:a6: 05:ea:a6:68:d5:1a:d5:11:20:ec:3d:64:f7:96:1b:cb: e7:e2:15:06:dc:fe:3b:4f:34:07:1f:ca:eb:2d:9e:b3: bd:e9:85:56:f7:e7:32:f5:35:44:5a:1b:dc:37:f2:79: 32:aa:4a:33:eb:9f:bf:d6:37:c5:d2:99:b7:da:d2:78: a2:c2:4c:13:09:50:be:44:d7:66:7d:0d:09:0f:a6:0b: a9:c8:2c:21:2b:88:54:f8:bc:85:27:3f:f6:55:c0:7d Fingerprint (SHA-256): 6B:D4:C4:E0:C6:34:B0:0A:94:87:54:AB:F7:25:99:95:18:65:BD:9A:D4:F8:9E:AA:FC:94:3E:E6:2E:72:53:E1 Fingerprint (SHA1): 9A:14:7E:A1:A6:BF:24:F3:B6:58:6D:EC:38:90:0A:83:A6:34:3B:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:77 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:22 2023 Not After : Thu Jan 18 14:37:22 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:23:ac:a9:41:ec:30:30:1b:3c:e9:84:b1:36:de:c5: f8:02:9a:a9:e6:67:58:74:d5:80:c2:9f:a6:2e:6b:f7: 2d:cf:ff:f2:0c:7c:d9:74:8e:8a:44:91:3a:31:b8:92: f0:8c:bb:50:92:d8:39:1a:cd:9d:40:bc:27:0e:b1:22: e0:af:5b:e3:9d:4a:6f:1d:8a:cc:bb:9c:33:d8:bd:0a: 47:b8:c8:dc:2f:7a:51:3b:86:8a:50:34:04:3c:39:49: 35:58:7a:46:78:05:d0:6b:ee:30:91:5a:8a:d4:f9:5e: 37:dd:ef:ea:54:a7:e9:c1:4f:3a:54:88:28:3e:36:36: f6:4c:d3:b7:8f:06:a6:6e:9f:50:98:f5:a6:bf:68:6b: 31:b3:86:63:09:8b:e2:f8:92:06:08:80:af:9e:9c:b4: 40:b9:aa:91:fd:ef:2a:f2:1c:bb:0e:6a:6c:3d:f3:47: 9a:ae:90:95:1f:03:9d:a0:76:19:d0:e1:03:cb:ef:1d: 65:fc:24:b2:09:6b:69:fc:cf:26:e1:2f:51:18:ec:f4: 66:45:02:32:d4:64:f0:ce:ea:e9:4a:8c:e7:7f:fe:6d: 11:0b:5d:d5:52:c9:6f:d6:c6:36:8d:93:af:d2:1c:a6: 35:d5:29:da:86:77:01:ac:43:67:dd:e5:38:b1:91:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:c8:50:60:d1:17:9b:17:d9:b5:17:53:60:ff:34:e8: c2:99:70:ff:53:4a:0f:0e:2d:18:d3:92:5b:47:16:32: 8f:7e:1e:ee:38:b1:f6:4b:1c:c6:70:74:32:17:64:8a: e4:b1:2e:ac:fd:a8:4f:08:38:cc:dc:f2:ac:4e:b6:94: 0d:6d:69:a9:cb:b3:de:c2:cf:0f:20:a2:64:bb:31:1d: 4a:26:dc:ff:85:cb:b4:fb:5d:f7:84:5f:ba:4d:15:02: 3f:33:e1:3c:1a:a9:d9:d2:21:ef:c2:e9:10:33:6a:f1: 58:62:50:23:8d:d0:8f:4e:57:53:ba:62:6e:58:b4:af: 28:db:9e:a2:98:44:06:cc:7d:92:a8:c4:77:63:32:3b: ed:1d:2a:98:5a:3f:c0:38:95:bf:97:7b:75:44:c4:13: da:92:cc:67:b0:81:f6:21:10:c9:73:dd:3e:38:9f:58: dc:f1:1a:d0:77:33:ee:2e:e5:64:f2:d3:09:64:1c:f6: c9:d6:ce:6d:dd:d6:07:0c:6d:80:7b:1f:70:94:85:69: b9:5b:56:69:06:11:17:da:27:49:da:5f:d8:14:81:b4: 89:58:e8:71:4d:c1:4e:6e:8b:e4:de:b4:7d:83:ca:95: d8:70:34:4b:7a:94:41:7a:cb:fc:69:78:f4:9f:07:c4 Fingerprint (SHA-256): 8B:E4:A3:D4:9D:7D:56:56:E0:DE:4B:0A:26:39:EB:C4:1A:BF:A9:64:0E:C1:48:22:41:D8:23:BD:5F:3B:6E:F4 Fingerprint (SHA1): A1:56:E0:1F:7C:6F:6A:FB:18:95:8D:45:87:6D:00:96:2D:B6:74:C7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:79 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:23 2023 Not After : Thu Jan 18 14:37:23 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:e3:2f:a6:5c:68:bb:77:37:86:f8:62:49:87:64:ed: 6c:a8:98:33:c8:43:c9:55:f7:3c:5f:11:91:5e:ee:30: 9f:66:2c:32:10:21:29:1d:44:67:dc:d4:b4:17:3e:03: 93:11:a3:ad:d0:27:81:e4:a7:4e:da:a3:78:ee:88:3e: 65:e2:a3:cf:73:b2:fe:0c:07:b4:cc:1e:e8:48:37:12: b0:6f:3d:13:3e:ba:c7:34:03:a2:26:8c:4e:84:00:fe: d9:82:99:9a:f5:c9:d3:5a:dc:3c:cc:0c:60:e4:f4:66: 49:7f:58:7d:8b:9e:7b:77:9e:76:95:10:d8:be:7a:bb: cd:0d:c3:78:b5:b3:0b:4f:bd:d0:a6:f4:9f:27:12:12: 1e:5c:27:f8:77:da:d1:1b:70:20:16:df:67:06:54:78: 66:5b:c2:6c:1a:25:fe:e1:ce:ef:05:22:31:0e:d7:d4: 70:7b:03:e0:41:77:cb:0c:a2:b1:f7:9a:66:23:07:69: 6c:7a:a5:5c:b5:ea:90:87:35:3e:ab:4f:15:71:03:24: 2e:3e:dd:f9:ea:03:4b:f3:f0:20:0a:33:bd:4d:a1:8d: c5:61:3f:e2:69:6d:97:bf:1e:7d:26:18:06:f3:c3:5d: 72:8a:6e:22:93:f0:b6:21:c7:c5:f4:cf:7e:17:c2:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:80:28:2b:20:ac:62:bb:46:c9:e1:8e:ef:b3:13:73: bb:81:ad:69:33:76:ba:8c:ae:ab:84:eb:f7:6e:dd:20: 3b:bd:90:5a:c1:ae:d5:5e:f6:a5:a8:25:bd:ad:0c:f9: 71:23:82:3f:f7:76:5f:f0:da:8c:65:9b:40:c7:74:c3: 4d:9b:32:d9:55:f3:b3:3e:2d:21:78:cf:26:c6:23:c1: 9a:9d:53:6b:4b:e0:12:63:a9:4c:6f:98:95:b9:62:c9: 89:72:cf:13:53:99:f7:07:2c:79:91:27:78:57:1f:34: 0b:77:2f:75:ce:83:ba:c8:6c:b4:62:a8:24:23:a6:85: fc:9b:9b:88:57:04:82:13:e1:e1:57:14:b3:36:23:6c: da:a0:cb:30:a8:3a:fe:3d:58:e6:46:77:2c:63:c9:17: 47:5a:46:3c:bb:e2:c1:6f:3f:9a:16:b3:3e:c9:90:71: 77:be:95:16:a8:4b:04:44:f1:af:d0:32:e3:fa:82:f7: 45:8d:c4:ae:ed:bf:4e:48:92:9b:1e:f7:2e:a3:19:09: 9b:a0:de:3b:05:9b:88:0a:a3:c3:e3:28:ff:38:9e:dc: f5:41:11:f7:99:01:9c:85:56:be:02:7d:d3:f8:6c:45: e2:a9:0f:2e:42:17:a7:ef:c4:b3:c1:9f:6e:41:c1:42 Fingerprint (SHA-256): 50:D0:E5:69:21:66:A8:5A:82:13:DE:C7:DE:E3:98:94:F4:29:23:2D:D9:9B:BD:FE:A5:63:BB:DF:C3:31:64:49 Fingerprint (SHA1): 06:ED:AB:07:41:CB:D7:C6:D7:04:BC:46:99:2A:67:5F:95:C0:71:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:7b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:24 2023 Not After : Thu Jan 18 14:37:24 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:e5:46:37:95:46:ca:87:35:ca:45:5a:ce:42:df:18: f3:32:f2:4a:ff:87:d1:1a:2c:7e:74:dd:2e:77:75:bd: 8e:da:b5:61:6f:bf:3d:e2:59:f3:c5:aa:6e:fd:d5:03: 5a:a8:59:f4:49:9b:98:7b:ec:3e:c3:e4:90:80:58:52: 3f:9d:36:80:01:8f:f7:5a:25:97:66:9b:ae:16:0a:6f: 9f:5c:4e:7d:e8:06:64:19:b2:cf:5a:ac:76:73:c0:5c: 90:90:18:c7:2f:f7:57:74:94:b2:a7:09:1d:dc:23:48: e1:36:05:82:79:c7:3f:25:c3:d6:b4:c5:6d:8a:5c:8a: 08:64:c5:2a:c3:5e:73:89:06:3c:f8:fa:90:d7:a4:69: ec:d4:e2:9e:8a:f9:9a:cb:0e:70:85:86:1b:6f:d1:76: 3b:ea:f2:16:5c:d5:0f:96:97:0f:7f:bc:a4:95:b5:f9: 8c:53:51:63:4f:40:e0:a4:a0:bc:6e:0f:11:0f:6e:11: ad:d8:e1:2b:e2:47:9a:ab:83:90:0c:bd:d2:e7:e8:de: ff:f6:06:52:bf:0d:49:4f:6a:7b:33:99:b3:e8:04:1d: 1d:67:ec:f7:7d:c8:ea:c6:b9:dd:9c:03:78:fe:2d:36: 7e:01:57:8a:4b:a6:55:e9:d5:02:73:a9:88:13:9a:61 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:84:fd:d9:c9:52:d1:31:ac:ab:a1:84:ed:a8:88:6c: 72:f6:f4:55:84:a7:fc:98:a6:01:ee:af:5e:37:dd:e0: b9:2b:07:a0:28:b4:bf:2b:be:34:45:54:0d:2d:20:d8: 96:46:db:85:5e:73:e6:89:57:28:8f:1a:8a:b8:c5:fa: 2e:16:39:87:94:76:df:61:a4:2b:8c:6a:68:7e:8f:00: a6:95:93:90:31:70:50:91:c3:1e:7b:67:85:29:5e:f1: 94:b0:ac:2c:7d:88:70:27:b2:6a:11:87:e0:0b:b2:ab: 66:f2:6a:c7:78:0f:69:f3:38:41:6d:3e:af:5e:84:e2: 39:92:7b:4a:32:8c:2b:3e:94:4c:c3:2f:c8:1e:9e:5d: 8c:6e:2a:c0:ae:f1:e7:e2:bc:c5:a0:40:ca:23:ef:d4: b8:9b:53:dc:94:70:ea:a5:b0:56:8a:6d:20:bc:95:b5: d1:fa:3d:a0:45:03:a0:68:43:53:5d:4f:73:ab:d5:63: 31:84:0d:78:84:c3:20:bf:89:96:b5:9c:7b:89:2d:a8: 68:f2:4e:c2:d8:62:9c:b8:b0:be:0a:32:31:e2:4f:3f: 48:64:28:2a:bd:be:7c:07:4c:e9:cc:7c:34:a7:d7:31: 3a:78:0d:0d:7f:0d:ab:1f:a6:de:9c:d9:62:93:72:c3 Fingerprint (SHA-256): D3:EA:6A:FD:4B:70:21:A0:AD:50:19:FF:DF:38:9A:C3:6E:0C:C1:75:15:BE:58:C1:C7:81:D6:A5:D2:2E:4D:36 Fingerprint (SHA1): C8:8E:E1:8D:2D:F8:EB:1F:14:A4:BB:4B:8B:01:2B:46:90:35:0D:CD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:7d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:25 2023 Not After : Thu Jan 18 14:37:25 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:40:cc:eb:ec:30:63:3b:03:f8:91:1c:d6:79:22:d5: 29:00:b3:fb:f7:1a:1b:95:89:8e:42:3d:37:67:21:14: de:b2:2f:d0:41:10:83:8f:41:9e:8d:f4:6d:e6:f3:47: 86:60:62:31:8f:27:08:64:6e:19:1d:6c:64:da:76:ef: 53:93:34:5b:47:13:d3:f9:5e:32:35:8a:3b:f9:21:f4: 92:1b:a2:ad:c1:e3:fc:ca:71:56:1f:26:65:21:2a:7a: af:9e:44:25:c7:f3:bf:3e:4f:b7:0b:ad:1c:60:f3:05: 43:0a:1f:e1:16:6f:f6:26:7a:b9:74:a9:9f:3b:26:b7: 6b:86:55:70:5d:e6:41:b3:03:86:c0:72:97:e0:57:70: 28:1a:9c:e8:c7:9e:85:b6:02:a5:06:13:ab:5a:8b:ab: f6:e6:a5:5f:9b:18:37:99:57:59:45:76:e2:23:02:c4: 07:5d:3d:93:a7:df:c6:8b:23:90:78:d6:fc:cb:8b:89: 04:03:c6:77:bb:7e:1e:a6:24:e1:8b:53:04:3b:a9:a6: 75:15:35:49:41:c3:4f:7b:f4:2a:c3:5c:37:17:e0:81: 8f:3d:1b:1a:d2:2d:0a:5d:5b:c6:0b:ed:2f:2d:c1:16: 59:6a:0f:a5:da:46:2b:6f:24:7f:01:b9:fd:a1:fd:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:e0:9d:cd:0d:04:97:6b:c4:e6:d4:c2:45:31:4e:e2: e1:73:84:fe:8b:4a:19:12:ca:82:2a:ca:26:25:de:e2: f9:10:ca:76:52:d0:ad:4b:bd:96:85:d5:53:6f:d7:0d: d7:b5:92:a5:ef:3d:d5:c0:30:fd:9e:41:8e:37:4c:b6: a1:5a:c5:cd:3e:b8:92:2a:90:ea:f5:b1:b9:30:ce:0f: 1d:d0:37:ea:de:87:60:4b:d1:d2:41:82:10:d0:b5:3a: 86:ab:3d:a2:b6:67:28:7e:51:08:ed:31:1b:9e:0b:1c: e9:a4:5e:40:3a:63:2a:df:60:9f:02:42:ee:3e:f9:50: f8:34:7a:39:db:06:6a:64:b4:5a:82:07:7a:1b:e8:a5: 5f:04:aa:21:02:2a:29:0b:e6:8d:27:42:df:f5:20:29: 4f:09:1a:61:02:65:e2:a7:bc:ae:94:74:b4:f0:52:b8: d0:ff:9f:fe:d3:df:b8:7b:59:6c:53:d3:0f:e6:e2:0b: 70:5b:eb:52:12:1e:69:f0:03:dd:18:11:62:13:b9:27: b3:ea:f2:a9:d0:73:8a:16:6e:a0:68:46:df:21:93:af: f9:9a:b1:25:73:1f:02:dd:6f:5a:dc:63:13:cc:81:06: 0a:e2:63:a6:11:8d:e6:9a:3b:71:f2:45:11:8c:fa:d3 Fingerprint (SHA-256): 46:BC:03:AC:2C:FC:E4:BC:66:D0:89:03:3F:11:63:A3:D4:24:D5:1F:66:56:80:DA:50:1B:1F:AA:8F:7D:73:38 Fingerprint (SHA1): 8A:65:50:8B:E7:1C:A2:01:E1:35:25:06:E6:29:73:B3:9F:71:EC:BF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:7f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:26 2023 Not After : Thu Jan 18 14:37:26 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:49:38:23:a6:6f:db:38:9b:20:76:25:5d:4d:49:84: f1:59:3e:55:1d:c2:e1:dc:ac:f3:f8:c2:74:31:f1:f7: c4:f9:60:61:c1:57:b0:45:25:09:76:14:e3:b3:c4:1a: 9b:b0:cc:ad:12:15:f9:7d:60:df:fa:56:85:84:be:e4: 44:27:f0:85:c4:e0:b6:db:73:93:bd:4e:be:42:e7:a2: f3:49:04:ed:c6:eb:df:07:7f:6b:fe:e3:73:fe:72:dc: f0:e7:da:1f:f0:8c:e3:b9:86:1b:00:ba:91:d1:ac:3b: af:33:0d:93:9d:86:67:5f:4c:85:f9:43:b7:d7:13:91: 8c:b4:98:b1:7d:89:c3:b9:ac:98:68:7e:d3:ac:2e:8a: dc:4d:7f:90:1a:c2:a7:3b:ea:68:0a:19:91:89:4e:6f: 33:3a:17:3f:ae:86:3d:02:b5:d6:18:9a:a4:f9:ca:22: ab:27:fb:05:92:2a:84:20:3f:c7:cb:ef:44:37:eb:af: 78:9e:b0:45:ee:84:d3:b4:e2:39:1c:9c:eb:c1:14:bd: cd:35:28:a9:46:27:22:5d:c1:62:15:dd:3f:79:69:47: ed:24:30:bb:ba:72:ce:8c:64:87:24:1d:2b:6d:46:cd: a4:a8:39:a5:51:af:b5:17:c6:7d:75:51:6c:2b:e7:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:49:a8:de:34:c6:35:c8:b3:ec:90:4d:bb:e3:23:fc: 9f:79:02:c7:81:21:48:e9:8d:2d:cc:17:57:a4:da:d7: 08:5b:6c:93:b7:20:8e:32:12:b9:67:86:00:65:b1:36: 51:05:33:dc:1f:06:83:78:92:30:8f:cc:78:5a:dd:71: f5:10:b6:fd:ac:eb:ac:33:11:81:b5:58:22:79:5e:71: 11:26:ae:23:70:e0:33:af:11:e3:b8:92:ef:4f:6b:ed: 12:46:91:83:b6:46:e3:79:c3:0b:7b:90:71:ba:67:34: 0d:b9:1d:fb:7d:83:7b:fa:93:80:1f:46:1a:cd:3d:7c: 63:42:0e:79:91:ca:40:10:d0:2e:4b:29:38:8a:7f:16: 7e:7e:cd:2a:58:cc:20:02:0a:3e:4b:80:b4:04:17:73: f7:1f:6c:7b:f4:4f:72:18:15:bb:ce:8e:e6:88:75:43: cf:1d:2e:ed:0e:5d:1f:d0:fa:f8:df:99:38:43:89:3f: 72:41:cd:de:7e:44:06:a8:17:27:51:ce:c8:63:e0:c5: 34:7a:78:9a:39:7c:14:79:ca:6d:2b:aa:f1:c8:00:dc: 0a:b3:4d:20:48:17:f2:97:fc:95:df:0c:0b:3b:72:9b: 1a:e5:a6:f9:70:72:04:f3:d4:e8:89:a0:0d:20:e4:a0 Fingerprint (SHA-256): 34:D6:70:D7:76:FE:4B:9F:FB:BB:A2:A1:41:86:2B:B2:6D:14:74:1D:61:B5:C0:29:07:9D:D8:80:78:B6:92:24 Fingerprint (SHA1): 69:31:53:BD:7F:4B:95:0E:5E:F9:0C:D0:B6:96:64:30:A0:C1:B9:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:81 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:27 2023 Not After : Thu Jan 18 14:37:27 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:66:34:00:ce:dd:2f:ce:cd:76:2a:1a:bc:4c:20:60: ea:a3:6a:85:ef:92:7c:34:c4:01:36:f9:33:8f:3d:40: 00:ee:df:46:40:46:0d:5a:8b:e8:97:36:3f:3c:8b:57: e5:eb:c5:4d:3f:a8:a4:f0:8d:76:5a:af:a9:65:35:ca: 82:c3:8e:f9:66:37:e2:53:c0:80:92:72:0e:0f:bd:e1: 4e:34:92:f0:d3:c0:4d:ab:49:30:6c:8c:48:04:1d:f0: db:0e:63:2f:19:78:1a:33:e2:5a:81:17:dd:cd:dd:3c: 8f:44:7b:5d:8f:c7:a3:47:26:8b:a3:2c:3a:5f:38:a5: d6:70:36:97:fd:56:a5:f4:63:c1:f1:af:65:79:9f:6b: df:e4:b1:8c:de:ce:21:cf:01:07:bf:ab:7d:bf:8c:60: 28:d3:c8:fe:b3:4f:51:60:33:c3:da:e7:9f:08:3e:bd: 38:ee:83:1d:76:90:60:66:11:c4:02:fc:2d:a0:83:a0: 3e:67:28:1f:51:09:ac:ab:e9:5e:c5:07:3b:f0:5e:89: 49:2d:65:a5:b9:92:6d:aa:f6:c7:0a:a0:f4:33:34:43: 08:f7:5c:9e:d6:5c:bb:0d:2e:a7:6b:0f:20:30:a8:21: 79:6d:f0:30:56:93:35:f6:08:1a:f7:43:de:fa:7e:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:05:cf:a8:c5:77:00:7d:71:28:ef:ff:d2:8f:a1:a5: 35:c9:ad:7f:b1:04:55:6a:ba:76:bb:3b:16:8b:65:ff: 87:84:ec:1d:a5:aa:91:43:fd:1f:ef:e8:5c:4d:db:51: a6:f4:50:b2:c1:b7:6f:9a:93:01:77:f8:06:71:d8:c8: 67:f5:6b:2b:41:de:f9:66:53:e5:57:6f:15:29:02:51: 8f:6e:ad:0e:0f:69:a1:a7:3f:41:1e:95:0f:67:d1:c4: 32:03:b4:61:64:96:78:82:81:d2:9e:c9:e7:56:41:1e: c2:67:45:00:4e:cb:fe:ef:5a:f0:34:28:83:fd:e6:24: 88:fc:b3:d3:92:7f:6f:d9:55:88:de:b4:a2:30:01:d9: 64:36:59:57:a8:d4:cc:0a:a7:75:87:4f:97:f2:64:02: a3:b3:ba:ba:e0:9d:44:90:a1:a0:46:ba:cf:77:92:42: 80:34:d8:52:f3:4b:2d:8b:ff:03:6a:52:08:73:60:72: 4d:c2:13:cb:7a:b6:47:a5:cc:43:ee:34:c0:78:8a:94: a3:75:5d:bc:d5:1e:e6:9e:b1:1a:84:46:bb:2f:48:ae: ad:1e:c4:ab:2a:ba:e9:94:5e:35:b0:70:76:38:85:e8: 98:0a:32:36:a7:13:4b:ce:b0:25:af:a1:23:60:5c:81 Fingerprint (SHA-256): 45:E8:57:82:21:CF:0C:AA:87:B1:9E:FE:8B:44:DC:BD:05:41:96:7B:92:4E:A6:44:3C:15:6F:DC:D2:A8:FA:77 Fingerprint (SHA1): 37:39:1D:99:48:8D:01:24:F6:6B:71:BD:16:70:D6:C8:B1:BF:0A:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:82 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:37:28 2023 Not After : Thu Jan 18 14:37:28 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:15:0a:ea:81:ce:ac:85:b8:05:8d:ae:0a:9a:3c:17: e7:fa:71:6b:4a:17:14:f3:8d:ab:9b:0d:55:1d:ed:39: 0a:a0:51:9d:77:12:2f:7c:e1:61:05:52:03:12:9b:10: b6:5c:e6:b5:e7:ea:4e:55:8e:7a:ca:78:f5:ef:b6:fb: 2c:13:7f:1d:8f:e9:5e:29:cb:d5:f9:f9:ca:c6:16:2e: 8c:f5:a5:a7:a8:bf:56:1d:a6:b4:4a:c4:14:36:38:54: d3:75:3b:87:f3:63:76:7f:cb:92:9b:fb:eb:bb:7d:6b: 67:81:5e:0d:8c:64:7b:22:4a:b4:c4:cc:17:8c:88:c2: 34:73:7c:90:7f:e3:13:10:3e:c9:d0:7e:ea:91:26:d6: 27:fe:10:62:56:83:ba:70:bb:ff:7b:68:a6:0f:1a:e2: 17:b8:f4:c5:ba:fc:7f:2b:6a:89:1a:3b:bc:41:b6:ce: e9:71:19:01:ae:46:a9:9a:a7:7d:da:ca:1d:fd:c9:af: 93:8f:88:a2:86:39:92:74:70:8e:b4:c9:0e:e1:6a:6a: 61:e3:7c:3e:3c:16:84:b6:dc:b1:61:87:a3:ab:42:d0: 63:ad:a9:a7:3e:1c:94:bf:a7:9d:17:7e:af:6d:4b:32: 88:0a:6c:9b:ac:56:b9:21:6b:0b:73:3d:bf:c2:b3:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:87:4c:38:85:12:4d:77:9c:b2:a8:3b:85:bb:99:4e: 3f:0e:69:53:aa:76:6f:e3:53:04:28:ae:db:97:68:23: 5e:91:35:77:c3:69:0a:5e:3e:71:95:68:08:f0:12:e6: 8c:18:00:c3:46:e7:8c:e8:77:a1:e6:b8:f4:36:89:3b: 5c:fa:26:ce:e4:1d:c0:b6:81:c6:cf:32:d7:55:5b:2e: dc:0d:5e:94:d7:20:0a:52:b3:fb:28:59:43:4a:de:fc: ab:bf:16:03:9c:15:cb:64:eb:2e:7f:70:b7:5e:2d:79: 86:a2:7a:89:27:6b:07:c1:c4:8f:21:a3:42:7e:79:e8: 71:53:02:44:4e:b3:1e:ed:f1:64:ae:a9:5e:89:45:4a: f4:9f:f3:9e:bf:08:5e:25:24:ff:6c:ef:e5:69:af:08: 69:4e:48:88:92:c5:c8:3d:98:d3:34:55:0b:be:f1:97: e1:d1:9c:3b:92:ab:bd:09:a3:d0:0f:54:94:e7:00:94: d0:7e:4b:6b:3d:ef:20:7f:36:bb:20:de:c5:8f:15:60: 03:79:5b:6b:7e:2a:fa:67:69:d0:7b:f3:8d:10:85:39: 97:de:42:7e:ea:14:64:e3:a8:40:5d:28:84:24:2c:24: bf:c2:fe:b1:e4:b7:d6:8a:02:02:b2:31:20:6d:37:87 Fingerprint (SHA-256): 10:11:82:AC:CB:8F:52:F0:00:D0:52:C2:02:F8:20:82:A6:35:B4:94:B0:5F:53:14:C6:A1:B8:B5:A8:C4:EE:BC Fingerprint (SHA1): 52:D6:4E:DA:3F:20:43:1A:8F:95:7A:17:44:0D:C3:05:45:75:65:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:87 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 14:37:31 2023 Not After : Thu Jan 18 14:37:31 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:e6:ae:0f:be:4e:b2:7f:79:cc:c6:7b:fa:af:fb:b9: 0f:fa:56:79:69:92:49:24:16:f3:03:e6:e2:9f:99:f6: 2a:7d:70:58:42:af:ab:7e:2f:d5:dc:73:b0:27:99:01: c8:28:7d:ae:44:69:b1:e8:20:64:9b:a0:6b:a7:a0:fb: ff:13:72:c6:9e:95:54:ba:48:b7:72:23:10:79:ba:d6: ee:85:ed:cc:4c:1f:6b:4e:88:50:9a:7f:be:a6:46:57: 3c:7e:00:a6:fe:0b:6e:a8:9c:a4:66:b0:45:86:47:d1: 9c:01:92:3d:7d:b5:1d:48:46:42:c0:e0:fb:dd:db:3f: e9:df:67:70:11:f2:c3:bf:c6:f8:98:d6:99:f8:74:d1: 6b:6c:7c:f8:e6:e4:6a:b8:77:c4:c7:da:73:60:d9:f5: 17:6e:48:d6:03:58:98:47:09:01:10:75:dc:b2:d3:af: f5:d8:f8:02:01:58:cb:d1:44:55:29:80:63:3d:a7:57: ac:ba:05:94:cc:6b:cc:63:32:21:77:45:cb:a3:df:aa: 6a:8b:fe:a1:67:b9:8e:6d:4e:93:96:59:ed:91:bf:76: cd:4e:87:59:72:cb:c7:7c:7d:3f:18:69:0f:68:69:65: ea:21:ee:8d:53:d2:78:0e:53:51:82:92:2e:fe:82:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:3f:68:08:86:9c:c4:82:64:3c:20:31:f2:a6:d9:9c: 3b:4c:a2:de:c1:1c:80:aa:3f:80:29:ff:92:b5:a8:11: 68:ec:7e:92:af:c5:27:a7:a0:5c:6f:4d:d6:6e:d1:71: 61:25:a4:96:29:e1:08:3a:cd:08:68:16:cf:0b:61:00: f5:b9:d8:b0:34:5e:7e:3c:6a:23:99:ab:5a:9f:ce:86: 87:2c:af:f7:b9:eb:8a:3c:16:23:12:44:fb:c5:96:83: 32:71:21:ed:18:95:c4:5b:42:6d:f9:61:0a:2f:6d:03: 6e:d9:42:88:67:ff:6b:1d:a5:d3:e2:96:15:31:13:30: 54:3b:82:01:fb:19:2e:bb:59:4d:87:1b:92:3b:14:d2: b5:65:2e:d1:b7:3e:c2:78:fa:56:f0:66:eb:82:46:50: 0b:f5:7d:19:c0:c4:de:83:02:83:b1:ba:e2:16:69:5d: 33:5d:4d:f4:a7:13:6e:9d:29:06:d6:f4:4f:c5:7c:11: 7c:d6:47:ff:bd:86:e4:75:8a:62:4d:0b:b5:69:0d:75: 1a:3d:41:33:d0:41:bb:06:ba:a5:45:fe:31:ca:89:ef: b6:da:64:2d:33:ec:14:98:75:3e:f1:6a:04:30:f3:70: 53:a3:54:89:85:90:5d:b4:51:cf:ef:8f:67:3b:14:59 Fingerprint (SHA-256): BC:AA:1B:E1:A7:F8:2C:18:B8:B3:40:77:9E:E0:89:DC:75:98:8E:C6:6E:92:D8:C0:5A:90:81:73:A9:D1:38:E2 Fingerprint (SHA1): 2C:24:51:8A:86:16:E6:92:01:E3:AF:F3:C0:55:14:9F:95:22:AA:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:d2:8f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 14:37:35 2023 Not After : Thu Jan 18 14:37:35 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:30:e5:e0:0a:24:4d:35:a0:8a:96:1a:39:dd:1c:fc: 8b:8f:32:1e:5c:9f:c6:da:12:12:75:54:c2:bb:fb:4c: 9e:db:14:58:07:9a:a3:f8:4c:78:9e:fe:fd:e9:fe:6c: 76:db:ec:0c:48:43:1a:8b:73:91:1c:37:f5:28:33:4d: 15:09:8e:c6:82:53:d2:05:3a:b4:e6:42:22:dd:8e:f3: 66:bc:f5:45:7d:b1:b6:29:dd:4e:bc:84:37:97:98:04: 63:81:04:25:dd:73:9b:72:c6:d2:33:2f:5e:7e:a7:56: af:84:75:49:bd:26:80:7c:4e:f8:b9:bc:f7:bd:46:d8: 6f:57:b1:86:92:23:0e:2b:12:8c:91:bb:04:69:4f:cc: 89:aa:99:45:5c:a0:e1:6f:38:0a:02:ae:79:1b:90:d8: 2d:2e:91:41:df:31:eb:e6:31:c7:30:35:37:60:c9:8e: 52:ce:83:c0:de:64:d0:5a:b4:7a:83:c6:d0:55:fa:8f: 2d:5f:66:5d:56:55:ae:c6:b0:f0:3e:b7:c7:c6:7b:19: 43:e1:6e:be:c5:b8:39:c5:50:fe:a2:cd:0f:cd:2e:01: ae:fb:63:11:21:f9:65:57:23:cd:5d:3a:ab:9d:56:a8: 2e:3e:78:d3:9f:71:df:61:58:40:43:4e:81:be:23:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:6f:8e:6e:10:32:bd:e4:ac:00:6d:da:b7:af:93:ca: 43:4f:d5:f9:db:1e:17:80:59:b6:10:df:ce:c4:b6:ef: 4a:c8:b7:e4:ee:42:12:7c:7f:55:62:ac:99:0a:30:72: d3:02:aa:6f:05:f7:6e:4e:97:b8:73:7d:18:08:14:4e: 73:84:e6:53:0c:b8:f8:5d:4e:63:0c:42:c9:c3:05:07: 26:45:8a:e4:26:05:07:59:2d:00:25:d0:87:8e:e1:68: 83:fe:41:27:30:3f:4f:a5:4b:03:ec:de:00:eb:d9:4f: de:73:05:b4:e3:aa:72:3f:e4:05:61:13:d6:46:e7:37: 63:f1:0b:49:4f:c4:f6:28:95:1c:73:bb:7c:04:12:00: 6a:6f:cd:7d:b8:2f:c3:09:1f:95:68:71:4b:b9:85:31: 55:e7:6e:a6:85:22:30:75:93:3d:c6:40:fc:77:5b:ac: 1c:b1:a6:31:7c:72:62:dd:52:ee:6c:14:09:26:77:67: 79:44:6d:9e:f4:a8:85:cd:c2:99:22:bc:af:ff:4a:29: e9:d4:08:09:c8:2b:1a:94:d4:2a:77:0a:16:53:b1:92: 6b:07:fa:d1:96:67:54:b8:bf:86:a1:8a:e5:23:02:26: bd:6a:e7:1c:3d:65:df:90:a9:aa:6a:6d:d8:80:e9:f0 Fingerprint (SHA-256): 4E:69:F2:CB:82:25:3E:5A:F5:48:DA:37:F5:59:6B:90:80:3B:CD:9B:FB:31:22:AF:3B:A5:EA:A4:DF:14:D7:98 Fingerprint (SHA1): C7:4F:8A:F8:6B:67:42:D8:CB:1C:22:23:FF:E7:10:B6:65:A4:6C:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa d3235b36fb605af5ad960aed27c3502ed4477aac NSS Certificate DB:localhost.localdomain-dsamixed < 1> dsa a46c1b2052279812c72fb3dbd732033d63fd0cad NSS Certificate DB:localhost-sni.localdomain-dsa < 2> dsa 48f7ad843a6af59784a611989bbd06832f0d1106 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 3> ec d2eeb684ee09d017f05b834690e3f1423858f245 NSS Certificate DB:localhost-sni.localdomain-ec < 4> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 5> rsa 248953688ebe15781e311f3d4936529b8f3f2511 NSS Certificate DB:localhost.localdomain < 6> dsa a7899d306e58adbaae57ccad4aad61e223fbce58 NSS Certificate DB:localhost.localdomain-dsa < 7> ec d32a522898ac91f96acc7ea2cc18574d4f54408d NSS Certificate DB:localhost.localdomain-ecmixed < 8> ec c46972ab289ec4a4447174c787fd5897abe7fb8a NSS Certificate DB:localhost-sni.localdomain-ecmixed < 9> rsa fea0172b6f0a424f05296b6778b67b9d717d887f (orphan) <10> ec 007d6e86e95793375af3891f411e228759274d22 NSS Certificate DB:localhost.localdomain-ec <11> rsa 904ad963848686645347cee9a752ef058dea7003 NSS Certificate DB:localhost-sni.localdomain cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=decodeECorDSASignature-testCase/taviso [Certificate Authority]: ERROR -8156: Issuer certificate is invalid. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. taviso@google.com [Certificate Authority]: ERROR -8156: Issuer certificate is invalid. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 14:38:58 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 14:38:58 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a3:5a:77:b1:a3:44:0e:1a:11:9e:0d:84:d0:0b:72:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:b7:27:a9:e0:1d:43:ce:c6:a7:ed:99:a8:b4:d1:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:36:23 2023 Not After : Wed Oct 18 14:36:23 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:e8:65:54:bd:b9:f9:45:0d:90:93:69:bb:9b:a4: 8b:ec:15:2b:c9:52:9a:32:fa:ac:5c:10:a8:9e:43:50: f9:82:4b:1b:ee:8d:d6:51:f1:c8:52:ed:eb:c2:5c:14: f0:33:4a:24:3a:e0:21:97:5e:51:50:35:2f:54:1f:a8: 83:d7:2f:01:19:40:9d:41:98:60:f5:81:10:f9:70:d5: c3:bb:a7:c1:8e:d4:4f:d2:29:44:b6:9d:be:35:a2:3d: 45:0c:54:42:67:65:0c:d8:3c:77:b9:4e:39:1f:3a:13: d4:4e:09:7a:e3:e8:1e:e4:d1:49:39:49:8c:05:40:49: 59:2c:9d:4b:13 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:a2:3e:01:2d:3c:5d:86:6a:cd:16: 01:ac:88:f3:0a:76:91:bf:cb:8b:5d:f5:45:fd:9e:8b: c7:45:79:e0:ba:82:9b:42:58:41:fa:a5:7b:9a:04:9e: c9:f0:c7:cd:27:c2:a6:3c:82:7f:03:f1:f2:7a:2c:d6: 32:de:1e:23:41:40:72:02:42:00:d9:28:b2:98:49:7a: a6:f9:a8:c6:13:74:f2:34:7f:97:75:19:26:85:50:9a: 24:cf:0a:56:d8:40:1a:2e:7d:13:04:8e:d3:87:ed:85: 73:c1:54:75:75:7b:59:03:e7:ea:d2:e2:56:a0:e4:bf: d6:fc:c6:58:68:25:ce:77:46:dd:51 Fingerprint (SHA-256): 8B:0C:8B:7E:BB:73:15:F2:8E:38:7A:13:83:8F:43:19:A2:98:A4:6F:42:6F:76:E3:0C:3E:DD:7C:DA:9F:69:C8 Fingerprint (SHA1): 84:82:A5:06:DD:EC:82:6C:31:9A:72:5F:F4:24:3D:16:A0:C1:36:01 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:36:55 2023 Not After : Wed Oct 18 14:36:55 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:14:c4:04:f0:85:b7:69:3a:f1:2d:2d:85:da:e2:dd: 35:06:70:23:aa:3b:2a:4d:66:c9:ba:00:64:90:43:19: 01:2d:e7:42:7b:0c:2e:c7:e1:d7:57:a5:fa:28:d9:03: 54:a3:31:70:3a:15:0d:02:66:34:29:8a:62:11:e5:99: e9:9b:62:e7:b4:96:7a:eb:9d:9e:e2:28:76:93:f1:9a: 2b:2a:16:f2:4d:ed:05:3c:25:ce:68:c3:43:27:03:76: ea Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:00:aa:40:ab:c0:5f:a6:fe:25:31:04: 48:b0:44:27:ce:44:ec:a4:b1:64:7b:c2:cb:a3:39:72: cf:e0:17:fe:a2:be:ec:2b:6f:04:57:73:10:23:0b:56: 7a:51:9b:ba:dc:65:a2:e2:a9:c2:20:da:2c:48:c0:9f: 3d:ec:b1:91:29:02:96:02:41:6c:db:da:f8:24:f8:fb: 97:68:21:a2:b8:3c:22:8b:37:96:15:dc:f3:37:69:88: a1:ec:4e:15:70:69:d8:33:21:82:fe:d1:7a:88:92:2c: 59:45:7f:55:bc:be:33:5a:c4:1f:fe:5c:26:4a:e2:49: 00:40:0e:6d:72:13:08:2e:aa:86 Fingerprint (SHA-256): 71:4A:1D:26:37:4B:8D:10:59:26:5A:7A:32:39:1C:ED:5E:20:CE:91:DF:64:3E:0D:2D:44:1D:76:D1:C2:FB:A8 Fingerprint (SHA1): C4:DD:F1:96:13:3C:12:37:DD:5B:8C:E7:F9:FB:52:35:76:DF:DE:B8 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:2f:f8:5f:92:92:6c:81:43:12:6c:97:f9:98:db:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:36:23 2023 Not After : Wed Oct 18 14:36:23 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:e8:65:54:bd:b9:f9:45:0d:90:93:69:bb:9b:a4: 8b:ec:15:2b:c9:52:9a:32:fa:ac:5c:10:a8:9e:43:50: f9:82:4b:1b:ee:8d:d6:51:f1:c8:52:ed:eb:c2:5c:14: f0:33:4a:24:3a:e0:21:97:5e:51:50:35:2f:54:1f:a8: 83:d7:2f:01:19:40:9d:41:98:60:f5:81:10:f9:70:d5: c3:bb:a7:c1:8e:d4:4f:d2:29:44:b6:9d:be:35:a2:3d: 45:0c:54:42:67:65:0c:d8:3c:77:b9:4e:39:1f:3a:13: d4:4e:09:7a:e3:e8:1e:e4:d1:49:39:49:8c:05:40:49: 59:2c:9d:4b:13 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:a2:3e:01:2d:3c:5d:86:6a:cd:16: 01:ac:88:f3:0a:76:91:bf:cb:8b:5d:f5:45:fd:9e:8b: c7:45:79:e0:ba:82:9b:42:58:41:fa:a5:7b:9a:04:9e: c9:f0:c7:cd:27:c2:a6:3c:82:7f:03:f1:f2:7a:2c:d6: 32:de:1e:23:41:40:72:02:42:00:d9:28:b2:98:49:7a: a6:f9:a8:c6:13:74:f2:34:7f:97:75:19:26:85:50:9a: 24:cf:0a:56:d8:40:1a:2e:7d:13:04:8e:d3:87:ed:85: 73:c1:54:75:75:7b:59:03:e7:ea:d2:e2:56:a0:e4:bf: d6:fc:c6:58:68:25:ce:77:46:dd:51 Fingerprint (SHA-256): 8B:0C:8B:7E:BB:73:15:F2:8E:38:7A:13:83:8F:43:19:A2:98:A4:6F:42:6F:76:E3:0C:3E:DD:7C:DA:9F:69:C8 Fingerprint (SHA1): 84:82:A5:06:DD:EC:82:6C:31:9A:72:5F:F4:24:3D:16:A0:C1:36:01 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:36:55 2023 Not After : Wed Oct 18 14:36:55 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:14:c4:04:f0:85:b7:69:3a:f1:2d:2d:85:da:e2:dd: 35:06:70:23:aa:3b:2a:4d:66:c9:ba:00:64:90:43:19: 01:2d:e7:42:7b:0c:2e:c7:e1:d7:57:a5:fa:28:d9:03: 54:a3:31:70:3a:15:0d:02:66:34:29:8a:62:11:e5:99: e9:9b:62:e7:b4:96:7a:eb:9d:9e:e2:28:76:93:f1:9a: 2b:2a:16:f2:4d:ed:05:3c:25:ce:68:c3:43:27:03:76: ea Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:00:aa:40:ab:c0:5f:a6:fe:25:31:04: 48:b0:44:27:ce:44:ec:a4:b1:64:7b:c2:cb:a3:39:72: cf:e0:17:fe:a2:be:ec:2b:6f:04:57:73:10:23:0b:56: 7a:51:9b:ba:dc:65:a2:e2:a9:c2:20:da:2c:48:c0:9f: 3d:ec:b1:91:29:02:96:02:41:6c:db:da:f8:24:f8:fb: 97:68:21:a2:b8:3c:22:8b:37:96:15:dc:f3:37:69:88: a1:ec:4e:15:70:69:d8:33:21:82:fe:d1:7a:88:92:2c: 59:45:7f:55:bc:be:33:5a:c4:1f:fe:5c:26:4a:e2:49: 00:40:0e:6d:72:13:08:2e:aa:86 Fingerprint (SHA-256): 71:4A:1D:26:37:4B:8D:10:59:26:5A:7A:32:39:1C:ED:5E:20:CE:91:DF:64:3E:0D:2D:44:1D:76:D1:C2:FB:A8 Fingerprint (SHA1): C4:DD:F1:96:13:3C:12:37:DD:5B:8C:E7:F9:FB:52:35:76:DF:DE:B8 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d4:5f:19:15:66:40:c8:53:7e:88:52:a1:c5:96:b7:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e7:57:a1:0d:e7:75:06:23:b0:c3:f0:47:fd:17:37:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:af:d4:55:b1:f3:89:5b:9e:4d:2e:6e:57:1b:30:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f6:2a:c3:15:16:f9:8b:03:f6:d6:64:41:de:da:13:f4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:a2:08:40:a0:bc:cd:ed:b0:57:09:29:b5:c4:ec:b6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:da:ae:cf:5a:2b:b7:0b:4c:5b:ff:01:ba:e3:cd: 5f:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 19:97:93:8c:33:4e:4d:18:6a:38:da:45:5d:18:28:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0e:91:77:10:dc:92:1a:13:ab:29:52:f7:68:83:39:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a0:e7:3f:18:55:ba:d1:f1:8a:aa:45:af:bd:05:b7:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 25:a2:8d:0b:1d:6f:1b:89:1a:0f:f9:6f:25:d8:d5:b0 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 9c:a1:26:cf:b4:78:59:51:29:e0:4f:74:16:c6:c8:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1f:53:29:34:53:26:15:39:cd:40:1b:9e:76:41:d7:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0c:35:18:7a:08:9a:92:39:92:92:0a:97:d6:fb:00:1c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:72:e5:1b:d8:cc:7a:7c:c9:44:31:c8:9d:c4:33:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 4d:93:16:72:07:b7:ed:ae:d2:64:27:ee:b8:46:f3:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:9c:c6:02:7d:ce:39:7f:0b:a6:39:77:24:55:3d:94 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b4:fc:c9:b0:50:ed:17:fb:14:39:59:19:54:63: 9a:f3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: da:02:68:1e:1a:90:a5:2b:9f:5f:a8:d8:57:6b:46:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:fb:4f:38:5e:91:09:aa:f5:71:a9:a7:ed:e0:82:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e3:fb:4c:2f:fd:b2:80:30:ff:56:46:12:30:58:9c:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 13:0a:d5:76:a0:cc:80:a3:0b:87:cd:0a:5b:5c:dc:a5 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 45:a0:14:96:f2:2f:38:a9:39:a6:51:0f:1c:7f:f4:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:3c:2a:f1:22:5f:52:16:2a:92:1a:25:e6:39:d7:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c1:2a:69:c5:b1:36:76:5c:68:08:ec:45:5f:45:0e:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:af:3a:02:59:4d:e6:91:f2:c2:85:d3:bc:e4:3f:f0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e2:e3:de:a1:39:4c:0f:85:4b:8f:39:73:f2:2c: ae:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 15:15:d8:ed:2e:fa:ad:33:ad:1d:33:c0:a3:0e:94:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 71:80:01:5f:bb:a5:b4:8d:28:bb:f1:6d:07:3e:48:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3e:cf:5a:e5:48:57:84:21:6d:41:05:92:ab:8c:9e:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0e:c6:85:af:23:72:ce:7b:d2:92:c1:37:0c:38:c2:b1 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1e:4c:35:d4:3e:6e:13:2b:27:b9:4f:7b:8d:db:45:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 46:4f:28:ac:aa:d7:3b:b0:9c:52:08:ec:d0:91:50:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 6e:06:86:e8:a4:c4:56:2e:01:b3:46:27:98:7c:1e:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1e:fb:03:8e:dc:c8:08:17:89:e4:13:95:34:77:b5:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 6e:b4:b6:3d:b4:b8:43:8f:6e:15:94:60:ee:76:51:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 04:3c:eb:c5:26:c8:d4:42:5b:5f:e3:e5:bd:4d:46:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:5d:e8:99:12:9a:6b:0b:36:ab:91:9d:60:0f: 23:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 30:a1:12:53:31:13:e1:db:76:7f:8a:b9:97:bc:40:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:8f:4a:95:91:cb:1a:df:45:9d:ec:69:16:cb:b5:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: cd:51:bc:8a:fd:b4:39:b8:b3:5f:aa:12:e4:dc:71:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 49:95:52:89:06:c6:77:68:72:66:9d:ef:73:9d:ba:10 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 94:6f:67:9d:8a:9a:6d:36:6d:54:4f:44:fe:1c:a6:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4f:79:b1:22:c2:dd:bf:07:1f:73:9e:b3:e2:cd:2e:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: e4:49:1d:9f:79:50:b7:bb:25:18:38:44:c4:a8:d3:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:56:2a:b6:98:7b:82:51:e7:30:76:5b:f1:e3:54:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 8c:51:c0:60:bb:49:62:6c:45:b6:30:c5:92:61:2e:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bd:bf:7d:7a:d5:2e:e7:b5:3f:04:a3:85:ad:52:4a:6c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:59:09:fa:71:d6:9c:e1:39:56:2b:a9:07:2f:05: da:ae Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: da:53:70:1b:3c:c7:34:a8:d7:eb:ec:43:a5:13:5e:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:4f:1d:98:f6:06:a9:1a:75:76:4f:42:63:5c:b6:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 7e:e8:99:86:d0:2f:4e:38:11:f1:49:80:ec:a6:66:40 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 8b:88:e0:cb:1e:22:f3:e9:1d:b7:53:40:7b:ee:52:b5 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 83:f7:06:54:77:8f:9e:c3:d1:9c:ef:eb:ec:61:39:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 44:0a:88:53:5d:87:b9:a9:23:26:73:eb:ae:64:15:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fd:9c:08:26:4c:15:e5:46:2a:b3:03:27:3a:f0:59:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e4:dd:67:b2:d3:be:63:df:15:4a:ce:2f:9e:6c:4d:d1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:be:82:31:a2:91:b2:16:9f:f7:3d:db:ae:45:8e: 27:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:0b:22:ae:05:e7:19:17:92:f9:bc:04:05:ee:f2:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d3:a5:e7:04:30:fd:36:61:89:f0:be:ff:1b:24:8e:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:73:cf:4e:ec:fe:94:c0:f7:41:fb:09:67:a6:9d:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:e2:2e:76:bd:ab:dd:c3:8a:35:14:88:73:38:fa:d8 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:b0:3d:a4:c8:00:1f:dc:08:98:2d:90:0e:00:70:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ee:98:4a:d3:51:3c:23:a3:2a:79:a9:4a:eb:c7:82:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bd:46:eb:39:50:8c:13:67:2b:a9:67:02:38:f8:61:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4e:ee:5c:b4:4d:3f:43:79:97:89:f7:7b:e4:f8:0d:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ab:30:4b:26:2b:a7:2b:0b:cd:05:9f:54:16:f0:80:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:47:83:eb:69:ca:bd:12:90:a6:ce:a1:ac:a2:57:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:95:12:1e:b0:91:84:19:b0:1e:05:d4:fe:a4:6f: 78:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b8:15:98:4c:61:60:6c:d4:09:e4:fa:98:8c:99:d2:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:dd:82:b0:ff:5a:52:84:e0:f2:b6:7a:a1:61:87:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 3b:38:d0:4b:64:0c:ba:45:44:44:7a:33:f9:05:6f:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 39:ed:23:a8:2a:f8:80:96:5e:25:91:01:6b:74:bb:ae Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bc:58:d5:b0:34:c3:56:bc:a4:e2:b4:c3:e4:74:39:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 13:8a:b1:dd:97:ad:f8:9c:4b:05:41:1d:0e:a7:62:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: f5:66:9f:74:15:40:d7:ae:67:84:d2:35:54:ad:cb:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:e9:12:91:d6:74:98:01:a4:ec:1f:ba:a8:00:0c:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 9a:ed:05:64:6a:8e:fe:ea:11:4b:31:c8:b0:dd:a4:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d7:4d:37:27:1d:48:11:1d:2c:98:0b:00:bd:35:af:42 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:07:0a:87:fc:b9:26:16:46:13:be:b9:bc:53: c2:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: c8:20:ab:32:bc:b5:b8:39:7f:99:63:df:4f:4e:f4:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:78:34:23:02:74:8b:67:8c:89:c5:cb:45:32:e7:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 3c:12:15:d3:ff:0f:51:32:af:ab:e8:b6:a1:14:91:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 31:41:36:07:a5:4f:7b:47:dc:9a:a9:e1:e8:89:5f:5d Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 7e:4d:b2:ef:94:87:46:9d:a7:34:b3:20:0b:a6:2f:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 87:3e:51:b7:3a:6d:22:29:d4:cd:c4:1e:a2:a1:a6:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 87:93:1d:9f:0f:9e:db:00:fc:9a:b6:71:bd:44:e9:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:fc:df:6c:05:c1:22:b0:aa:d8:e9:5e:ae:5a:ac:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c3:e8:20:ca:9c:b3:21:64:63:2a:93:5f:99:c0:82:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:76:6b:be:1b:c2:5b:ee:03:cb:63:fe:34:6c:c9:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:53:23:3a:e8:4d:b6:3a:de:e5:82:26:4b:dc:f4: fb:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 34:55:d1:48:c5:f4:4a:e1:3a:30:19:83:79:cf:15:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:10:b1:b4:8a:cb:fd:75:53:27:a9:b1:1d:bd:9b:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: aa:39:14:6a:20:6e:ff:1d:14:f8:f8:1f:8c:1b:ad:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 40:ee:26:e5:39:cd:9d:0d:5e:72:8d:ef:ae:67:f7:ce Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 23:00:b2:58:36:7e:65:7a:99:d1:6b:6b:80:32:aa:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 99:00:98:65:5f:22:fa:63:81:b7:66:d8:14:35:8f:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9b:77:eb:e1:9e:66:ea:2e:94:15:3b:ce:2f:58:5c:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:23:5b:26:cb:b0:fb:f0:f6:a8:87:96:b7:a2:06:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:53:e8:01:26:76:6e:5a:01:ac:b4:09:c4:30:87:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:9e:e2:09:75:97:53:7f:14:c4:1d:89:44:85:be:d3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:da:a7:e0:3c:5f:e9:01:c5:47:de:9f:cd:6d:e5: bf:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1f:29:f0:90:a4:14:48:ae:28:82:f5:1e:d4:30:2e:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cc:42:9a:fb:38:68:77:5c:0d:3e:9d:2c:ef:83:b1:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:b3:7b:dd:8c:0d:fd:b4:bb:39:c3:d2:18:40:2e:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:cc:d4:28:8a:64:41:48:df:ad:25:e1:22:f3:a3:88 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2a:64:0d:93:6a:29:42:cc:b1:25:46:18:b4:d0:50:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cd:69:c2:47:f0:ab:e3:cd:8b:bd:78:8b:d9:ac:df:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 06:bd:f9:ff:8a:3e:e8:34:6d:20:7b:ed:c0:65:2d:a9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:6c:6a:83:2a:95:e5:c0:75:e5:ed:d1:d1:81:ef: 4a:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:86:3c:39:6a:bd:53:5e:fe:e5:b6:08:aa:95:cb:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:aa:b2:0c:cf:69:32:71:0e:3c:31:bd:17:61:cc:f1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:e6:d5:f2:47:68:ee:1b:94:78:6a:78:03:cf:70: 90:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0b:91:ab:7d:ff:c7:33:58:52:59:01:ae:c6:eb:e3:9b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d1:a9:66:b8:4d:c6:7a:9d:00:7a:2b:9c:2e:9e: c3:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: de:55:eb:db:f0:c9:86:bb:7e:73:f0:e0:4a:6a:f2:5f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:77:7d:39:12:03:83:41:08:77:44:96:23:f4:12: 39:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:b8:86:e7:67:06:aa:a8:45:56:27:90:22:39:3f:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ae:5c:ff:64:e7:60:ea:69:bf:b5:d3:f5:87:22:88:5c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:6e:6c:7b:1e:d4:80:e3:2a:ea:3f:96:69:70:69: c4:5a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1f:b9:2d:65:2f:de:55:dc:b5:05:04:48:50:a8:e9:ba Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:77:1e:5a:82:5a:06:12:9e:4d:6f:b7:02:c4:56: 64:65 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:df:d5:d4:fb:f1:e8:c4:54:1f:04:92:b8:4b:00:18 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:fd:ff:12:1c:18:10:d9:28:8c:16:43:23:79:5c: 6d:8b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0a:8e:a1:4c:42:0a:06:e1:33:30:06:87:d3:05:fd:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:c5:d7:0b:a4:7c:48:c9:88:d3:a6:ab:7e:14:06:84 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:17:a2:51:96:31:0e:6d:26:93:92:9b:21:0e:0e: 55:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 89:58:51:95:14:7e:54:42:e8:7f:e4:8c:cd:7a:f4:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a0:ba:17:c2:1c:5d:b8:cb:b0:59:a3:94:b5:9d:20:86 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:12:5e:2c:12:c4:ab:a5:10:d4:58:15:f6:e6:42: 55:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bf:f3:43:c8:a1:63:02:77:37:9d:f7:f3:9f:33:03:d2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cb:d4:8c:68:07:8c:43:99:e6:60:23:8d:07:2e: ae:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:4f:bf:29:f1:f0:a8:f4:2f:94:06:c7:a3:b0:4f:8f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:14:fa:cb:7b:c6:d2:78:de:c3:6a:8d:98:c4:91: e2:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 67:e6:cc:fb:62:69:66:a6:88:61:fb:48:04:30:f1:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:84:f9:00:e0:b2:ca:e6:03:07:f2:6f:eb:0b:02:31 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:3e:fe:68:15:09:b6:f2:ac:16:72:b0:df:17:d6: 73:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bb:de:75:73:07:22:06:e6:4b:54:bd:5f:af:d7:68:bd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:fd:71:c8:fe:ff:4e:e1:00:9a:8f:a6:19:8d:4b: cc:b0 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:89:b2:63:a0:b0:be:cf:98:06:a9:ac:50:c3:e7:77 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:a6:01:85:8f:ad:3f:c9:81:0c:c3:46:e8:28:a8: b2:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bb:17:2d:3c:2d:0c:d5:cb:05:50:bc:1f:72:44:73:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:c8:7f:43:e1:ee:01:fa:b5:1e:01:81:a8:50:f6:ce Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:fe:e7:d7:ce:01:9b:90:a7:a9:4e:12:8f:2a:56: d0:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:1e:62:bd:9c:b8:40:53:42:cd:e8:62:5d:b0:d5:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 12:e8:6c:0b:e0:63:9e:c4:fd:18:15:68:59:7f:41:51 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:32:12:06:db:c1:78:69:f8:b7:61:aa:82:9a:43: 14:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 15:78:c4:8e:34:30:54:d7:e8:1d:8d:b6:28:b8:03:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:4e:27:72:26:cb:d8:11:de:95:dd:d8:b0:8f:5a:e7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:75:74:63:28:92:53:f5:27:d2:e3:94:20:b8:6a: 15:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 31:2c:25:89:50:1e:df:65:7f:9a:c5:4a:e5:77:db:5e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:2f:98:f8:96:93:3f:7c:74:de:f3:00:d8:c6:f5: fa:ff tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e2:3b:ff:c9:48:44:fa:6e:7f:ca:c1:14:e5:ad:3a:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:76:2d:4d:8f:16:ad:40:98:64:4b:90:d6:64:df: dc:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 22:e2:5c:2e:03:5e:ee:ed:69:69:eb:0e:71:66:ec:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:7d:6a:b8:1a:73:74:a8:11:f5:63:43:b4:40:b7:36 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:24:86:b5:88:a3:a7:ec:da:ae:f9:cc:1f:39:61: dd:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:8a:fe:3c:93:b1:a9:9b:59:91:cc:64:cf:c2:f0:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:55:6a:9a:08:39:3a:f9:c3:7b:21:c7:3e:80:97:55 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:55:69:46:5b:b7:56:29:ab:1f:4b:65:ef:8b:91: dc:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:9c:72:42:c8:04:1e:67:82:fb:58:4e:65:7c:bc:15 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:86:11:49:53:60:54:a0:28:46:49:70:1b:4d:f5: 3b:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:b7:f4:88:09:cf:55:a1:d6:e3:59:10:23:62:79:92 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:93:65:c6:3b:3b:79:a4:02:1c:f1:50:d7:ec:68: 62:9e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:a6:3f:da:2b:58:24:f5:f9:7a:08:36:f4:05:bf:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 82:95:89:c5:63:69:ac:ff:f6:a4:0e:78:40:01:5a:d8 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:1c:eb:8e:33:f0:af:5b:14:9a:55:fb:d2:12:4c: da:10 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:39:5a:a4:cd:0a:1e:fc:55:81:64:54:6a:ba:13:d1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:1a:89:b9:3c:78:54:2d:e1:a8:1c:02:ce:4d:eb: 00:00 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:73:ad:35:39:49:00:1c:5c:64:c5:1c:30:03:c1:a1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:a3:77:07:e4:4a:01:9a:42:c8:35:27:a3:f8:51: 5d:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a8:4e:95:01:32:3b:6b:61:a3:ac:7c:7f:0e:3c:1d:33 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:5c:1f:16:c4:e2:dc:81:ba:a4:53:e5:36:9f:a7:61 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:f2:ea:2d:cc:fb:e2:47:8b:21:4d:96:58:a5:8a: 25:91 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:29:75:aa:2b:d4:6d:17:cd:80:7c:bd:20:29:9c:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:d1:c1:33:76:e6:17:11:a0:14:d8:74:4b:46:c1:7d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7e:72:a9:a4:9f:86:08:60:54:f0:bc:ad:2a:93: 09:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:88:be:b2:04:73:d9:76:9d:91:0d:51:24:ad:d0:3a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:60:b7:3f:af:03:87:82:91:d8:4d:b9:fd:5c:6b: da:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:df:1f:37:d0:ad:28:03:45:3c:02:92:fc:18:28:40 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:69:84:1f:53:71:a9:4b:a8:c0:7b:0d:6d:78:16: 6a:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 53:8c:cc:8d:d0:dd:68:8e:11:a1:8b:ba:01:43:88:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:fd:ef:43:43:c4:11:48:39:7f:ed:64:bc:b1:62:8e Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:41:cb:7d:31:4e:7b:24:d8:e8:22:f7:38:16:a0: ee:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d9:79:3d:54:6f:e8:b1:36:36:d9:9f:68:94:d9:b2:e8 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:d8:3c:82:3d:c0:15:4b:0f:22:c9:35:d7:93:6a: 8a:7e tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8a:df:2b:b7:d1:12:5f:6f:e7:de:1d:81:67:8d:fd:40 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:22:f4:f0:fc:82:ef:72:bd:52:42:7c:c0:3a:81: ab:cf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 91:24:cb:40:f4:14:b2:f5:1e:d8:27:fc:48:94:a3:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:a8:a6:86:5d:9c:6d:30:14:19:be:5c:59:b9:7b:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:ba:d3:81:0b:d1:39:01:fe:b9:11:46:11:8c:e8: ed:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:c7:b9:4b:5d:31:0c:b5:37:95:37:bb:9d:c9:ac:7c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:e0:d6:f9:fb:52:bf:e5:fa:62:8d:c1:49:00:fa:27 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d9:df:e6:5c:d1:38:24:5c:3d:ec:e7:bc:1c:e0: 3f:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:12:63:47:09:41:ac:8f:ba:41:c2:78:fb:e1:b1:60 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c5:3e:19:e9:1e:1a:6a:1b:c9:1c:b1:cc:cb:12: a3:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:07:c4:1f:0d:80:15:bb:5a:39:99:7f:ad:a6:06:b5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:c2:b1:28:4d:04:37:96:e3:d4:95:f5:7c:1e:75: f5:b8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cb:7d:c6:03:c7:20:7e:a2:37:84:20:cf:f5:f3:6c:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 14:c4:27:e4:84:5d:91:f3:2a:87:c0:e5:4e:ff:3e:14 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:1f:f3:fd:99:42:3f:7b:b1:3d:d7:98:10:27:b3: c3:5c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: eb:17:8a:df:6a:00:3d:6c:90:90:1e:ce:1f:e4:12:b1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:a8:ce:2f:91:28:ee:0c:f7:c8:87:64:65:e3:f7: 1c:cb tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:95:e2:4e:0c:01:4c:d6:0b:85:0a:e8:c5:b0:14:3d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:0e:cb:6b:f2:af:6c:bc:fa:10:7b:64:aa:c7:b0: 2a:7a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6a:bd:55:c6:c7:50:3b:f9:00:f0:ab:02:e3:b0:7e:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6f:b5:c7:19:c0:c2:42:42:69:83:7f:a2:61:e5:23:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9c:3f:49:01:5f:ea:68:23:44:5b:d5:f5:5a:9d:ce:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:3d:be:25:44:99:58:dd:fd:7a:1c:20:54:88:ed:3f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 69:43:9b:26:b6:82:dd:6d:d3:74:df:15:79:07:2a:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d0:5d:7d:c6:13:68:42:e6:1b:f6:9d:91:e1:32:30:d9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:db:4b:08:98:86:94:7e:1b:97:98:e1:96:6b:37:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 78:3a:37:cd:ca:f7:e3:5d:da:f2:49:d7:30:41:11:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:75:46:9a:91:46:f0:53:1d:db:83:cd:bd:27:cf:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:27:ab:c5:1d:f1:94:86:8b:bb:3c:93:01:8b:c0:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:34:a8:74:67:09:6e:20:f7:8d:cd:02:43:2e:38:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:6c:33:69:02:45:dd:14:7b:cc:3c:a2:a9:05:b3:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:1d:88:02:23:2b:07:a4:68:e6:f3:1d:64:da:36:5e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c8:06:a1:4c:e5:0f:a8:b3:90:71:b2:16:18:58: 1d:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:e4:67:1c:2c:70:ae:03:be:e1:2b:aa:f9:4c:79:d8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:9f:a4:52:1d:da:16:cd:0f:67:22:59:8a:ea:22: b2:40 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:3d:02:7e:91:77:09:20:6b:68:34:0f:01:4b:d5:d4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:0e:97:4d:91:0c:1a:8e:e4:ad:35:b0:87:c9:ac: b9:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:e4:70:17:c6:e6:de:ac:a5:49:a3:7d:71:a2:ea:ad Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:6d:a7:4b:90:b7:f1:c8:66:48:9f:dc:89:6e:fd: dc:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:84:df:a1:be:a3:e5:29:c4:bd:e7:4f:b8:33:8a:2b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:b0:88:6d:95:c8:6b:af:8c:3a:4f:01:d5:35:20: 1d:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:77:b2:e6:5e:37:44:2d:84:40:de:f5:37:01:4b:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e9:0d:1d:a2:50:8a:6e:c0:ab:01:9f:10:80:a5: ae:7a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 76:f1:42:80:11:1f:eb:a6:af:33:81:76:50:56:94:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3f:b3:e4:df:eb:ab:52:24:a2:cc:01:df:31:64:1f:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:16:1b:fa:2c:2c:6c:89:d1:da:49:73:09:14:59:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:32:05:c6:be:6b:b9:2a:d4:76:ae:40:e3:51:16:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:d7:7d:ee:4f:a8:df:88:09:76:c5:87:0c:60:99:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f6:63:09:e6:a5:f8:27:46:21:27:02:e2:b3:67:c1:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:13 2023 Not After : Wed Oct 18 14:36:13 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:75:ae:c1:4d:0b:f3:43:01:f5:e6:d2:ad:3a:2f: 77:e8:02:43:34:36:61:79:bd:dd:8e:ac:a2:e5:95:5f: 79:23:07:1f:b7:f7:32:aa:19:14:d3:df:09:5e:71:f5: b9:02:cd:84:c9:4e:3c:ef:a1:f2:27:68:8d:66:92:b6: 65:38:73:15:8b:03:92:a8:cb:f9:24:d1:ff:a5:e3:94: bf:f7:15:c1:be:ad:bd:0e:75:5b:8f:77:06:40:6d:81: 31:c6:8f:ed:55:47:0d:6f:56:4e:b0:3c:21:70:82:84: 60:fd:fc:83:44:24:1c:3c:04:1f:13:26:b6:4e:0b:9a: 35:0f:44:27:5a:ed:38:a6:05:48:62:89:a9:da:7b:bb: d6:75:14:dc:ef:0d:89:11:14:dc:1d:96:80:3c:51:90: 47:2c:db:ef:a7:59:e8:af:6c:35:86:05:0c:35:d6:da: 74:35:50:05:12:72:dc:63:ce:98:42:4e:99:49:c0:92: dd:fc:7f:3f:f2:05:6b:ef:d7:58:6f:91:01:57:60:10: 2c:f3:de:27:0c:d6:f0:0e:af:ae:91:21:d9:6c:9d:3b: 0a:41:01:3c:bb:69:5e:c5:17:f5:d6:25:01:c7:56:45: 66:1a:85:ea:32:ae:15:f8:3c:d2:32:94:37:2d:ce:89 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:e6:94:1c:4a:0d:5e:09:50:ba:65:ef:88:65:b3:0c: c3:d3:50:5f:a3:c3:aa:b4:9a:72:5c:18:81:20:5e:f6: bb:22:0e:3e:da:a8:06:d4:5c:ad:f2:ff:14:76:dc:ee: aa:75:3c:20:e8:fa:14:00:ef:7f:a3:b2:f0:e7:0f:65: 2e:78:52:72:a3:09:33:5f:9d:cb:cd:95:53:82:d2:71: 51:70:6d:9f:63:a8:ff:fe:96:20:c8:ba:f9:8c:40:f8: 4f:5f:87:a6:70:cb:30:cb:62:7d:e2:36:08:47:d4:ba: 73:06:44:71:dd:7f:b7:9a:25:3f:88:75:26:aa:5a:09: 9f:44:fa:80:0f:a7:73:ea:4b:54:c1:9b:db:54:42:61: 6b:2c:a1:fd:b6:9f:07:1d:a8:a8:e7:47:85:a8:82:2c: 15:1e:09:f9:7f:92:bf:20:ac:90:13:2a:4b:d3:d4:ee: 1c:97:6c:c5:32:06:af:39:ab:ef:ed:66:59:c3:ec:1d: 68:5d:af:d3:f8:28:10:f5:3f:b9:cd:da:99:a1:1a:eb: 09:02:55:b6:57:e8:0e:f3:86:f3:db:15:6a:ed:bd:ce: 94:90:7e:ce:36:33:fd:4a:0f:ec:39:7f:42:c1:c7:74: 16:75:74:f6:1a:19:12:10:e6:62:a8:70:e1:d1:43:fe Fingerprint (SHA-256): 3C:B7:C9:14:A9:33:1B:04:DF:21:FD:D3:8D:A5:9F:E3:16:A3:5C:90:E2:B0:66:3A:26:E6:5B:9B:4C:03:AC:F2 Fingerprint (SHA1): BE:8F:C8:EA:89:A1:05:93:AD:FC:C8:44:4F:99:D6:52:53:13:F6:88 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:36:54 2023 Not After : Wed Oct 18 14:36:54 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b6:11:96:50:b1:c1:24:f0:5a:74:48:05:3e:ac:0f: b1:71:1b:9e:50:13:f3:81:71:8a:20:ad:0c:93:a4:3f: 02:e7:8c:ea:bd:53:d3:1b:d5:56:71:d0:3e:02:9f:08: 00:a7:da:ac:f8:97:c6:77:56:22:bd:ed:9d:e7:bf:6e: 7d:5f:15:28:99:51:34:4c:e8:8c:89:9b:af:bc:d3:91: 42:cd:e0:a6:67:1d:0e:e3:29:d0:46:8a:50:0f:ff:77: e8:1b:a1:b5:54:43:ef:08:f9:35:75:c1:05:6e:cd:eb: bc:c8:70:08:66:ba:b8:6b:5b:c0:95:66:dc:f3:bd:75: 21:19:6d:d0:64:b4:67:e5:91:35:2d:14:a1:d1:5e:26: f3:b9:c2:d5:ee:12:38:06:39:04:c3:7f:39:09:db:03: 7e:86:23:0f:1b:19:6e:8b:20:77:c3:f4:68:1e:41:f8: 8b:37:17:26:40:03:94:f1:ac:cf:5e:82:3c:2e:29:aa: 2f:bb:71:48:6f:c2:9e:1a:b6:3d:bc:eb:8b:db:51:56: f0:da:5e:8a:28:40:74:09:1d:23:ed:fe:11:28:39:d1: 4d:98:d8:2b:b2:63:11:11:e7:0a:30:4f:56:59:d8:bd: 09:46:35:68:79:8d:27:2e:83:52:b7:d7:e9:8c:74:05 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:02:0e:77:c8:35:56:c3:6d:55:0f:ad:ee:01:24:e1: d7:74:18:46:da:fa:66:a8:da:5e:3b:b6:6d:bf:ab:07: 09:74:d0:79:81:d4:dc:4b:c3:9a:22:0a:e7:44:54:65: 96:25:4a:a8:21:1d:82:45:b5:3e:42:d8:3d:ab:31:cc: fb:da:70:b3:3d:97:c8:50:11:fb:53:0f:9d:51:8b:e9: a7:5b:90:f1:82:20:ce:77:e9:7b:3c:27:ea:a5:43:41: 01:61:a3:9c:43:43:ea:b8:da:26:61:d5:98:ba:45:16: 95:7d:8f:94:f7:d5:b3:98:d4:2f:16:d9:f2:4c:0a:dd: a6:c7:0b:f7:41:64:99:09:f1:66:77:12:63:c2:4a:e3: 19:d2:96:de:ea:25:c0:a4:b9:a5:f4:2b:8d:46:90:fa: 90:00:b0:6c:e1:ad:db:26:c8:0a:54:c3:bd:79:33:7c: d0:76:d1:88:74:fb:32:e3:70:c1:39:6a:c2:dd:57:56: 93:85:30:ba:8a:64:95:a9:2e:c4:8a:9d:ef:f3:87:7e: d6:eb:8e:bd:e8:e4:1b:f7:16:05:31:de:9a:2c:cf:fa: 9b:7b:b3:3a:aa:1a:96:7b:e4:fd:ff:f2:25:ef:ac:67: 9f:a0:bf:0a:53:4d:66:01:41:fc:2e:96:6e:c6:56:fd Fingerprint (SHA-256): F3:E6:85:34:2C:1E:06:3D:F2:32:BB:3C:41:D3:E3:BD:75:66:E3:92:C8:2D:A7:12:D6:14:6F:1D:5D:9D:AE:CD Fingerprint (SHA1): C3:5F:F2:1E:ED:F2:9A:A9:5B:59:15:1B:1E:E8:5C:00:9D:16:63:BE Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 14:58:34 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 14:58:34 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa f5ceda891f8a405d70569b6c054f18e83be69d80 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa f5ceda891f8a405d70569b6c054f18e83be69d80 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa f5ceda891f8a405d70569b6c054f18e83be69d80 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00042d80 (273792): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 14:59:14 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 14:59:14 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10660 found at Wed Oct 18 14:59:14 UTC 2023 selfserv_9355 with PID 10660 started at Wed Oct 18 14:59:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10660 at Wed Oct 18 14:59:14 UTC 2023 kill -USR1 10660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10660 killed at Wed Oct 18 14:59:14 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10712 found at Wed Oct 18 14:59:15 UTC 2023 selfserv_9355 with PID 10712 started at Wed Oct 18 14:59:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10712 at Wed Oct 18 14:59:15 UTC 2023 kill -USR1 10712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10712 killed at Wed Oct 18 14:59:15 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10764 found at Wed Oct 18 14:59:15 UTC 2023 selfserv_9355 with PID 10764 started at Wed Oct 18 14:59:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10764 at Wed Oct 18 14:59:16 UTC 2023 kill -USR1 10764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10764 killed at Wed Oct 18 14:59:16 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10833 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10833 found at Wed Oct 18 14:59:16 UTC 2023 selfserv_9355 with PID 10833 started at Wed Oct 18 14:59:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10833 at Wed Oct 18 14:59:17 UTC 2023 kill -USR1 10833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10833 killed at Wed Oct 18 14:59:17 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10886 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10886 found at Wed Oct 18 14:59:17 UTC 2023 selfserv_9355 with PID 10886 started at Wed Oct 18 14:59:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10886 at Wed Oct 18 14:59:17 UTC 2023 kill -USR1 10886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10886 killed at Wed Oct 18 14:59:17 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10938 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10938 found at Wed Oct 18 14:59:17 UTC 2023 selfserv_9355 with PID 10938 started at Wed Oct 18 14:59:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10938 at Wed Oct 18 14:59:18 UTC 2023 kill -USR1 10938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10938 killed at Wed Oct 18 14:59:18 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11005 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11005 found at Wed Oct 18 14:59:18 UTC 2023 selfserv_9355 with PID 11005 started at Wed Oct 18 14:59:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11005 at Wed Oct 18 14:59:18 UTC 2023 kill -USR1 11005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11005 killed at Wed Oct 18 14:59:19 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11057 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11057 found at Wed Oct 18 14:59:19 UTC 2023 selfserv_9355 with PID 11057 started at Wed Oct 18 14:59:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11057 at Wed Oct 18 14:59:19 UTC 2023 kill -USR1 11057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11057 killed at Wed Oct 18 14:59:19 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11109 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11109 found at Wed Oct 18 14:59:19 UTC 2023 selfserv_9355 with PID 11109 started at Wed Oct 18 14:59:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11109 at Wed Oct 18 14:59:20 UTC 2023 kill -USR1 11109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11109 killed at Wed Oct 18 14:59:20 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11175 found at Wed Oct 18 14:59:20 UTC 2023 selfserv_9355 with PID 11175 started at Wed Oct 18 14:59:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11175 at Wed Oct 18 14:59:20 UTC 2023 kill -USR1 11175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11175 killed at Wed Oct 18 14:59:20 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11227 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11227 found at Wed Oct 18 14:59:21 UTC 2023 selfserv_9355 with PID 11227 started at Wed Oct 18 14:59:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11227 at Wed Oct 18 14:59:21 UTC 2023 kill -USR1 11227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11227 killed at Wed Oct 18 14:59:21 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11281 found at Wed Oct 18 14:59:21 UTC 2023 selfserv_9355 with PID 11281 started at Wed Oct 18 14:59:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11281 at Wed Oct 18 14:59:22 UTC 2023 kill -USR1 11281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11281 killed at Wed Oct 18 14:59:22 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11349 found at Wed Oct 18 14:59:22 UTC 2023 selfserv_9355 with PID 11349 started at Wed Oct 18 14:59:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11349 at Wed Oct 18 14:59:22 UTC 2023 kill -USR1 11349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11349 killed at Wed Oct 18 14:59:22 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11401 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11401 found at Wed Oct 18 14:59:22 UTC 2023 selfserv_9355 with PID 11401 started at Wed Oct 18 14:59:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11401 at Wed Oct 18 14:59:23 UTC 2023 kill -USR1 11401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11401 killed at Wed Oct 18 14:59:23 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11453 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11453 found at Wed Oct 18 14:59:23 UTC 2023 selfserv_9355 with PID 11453 started at Wed Oct 18 14:59:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11453 at Wed Oct 18 14:59:23 UTC 2023 kill -USR1 11453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11453 killed at Wed Oct 18 14:59:23 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11519 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11519 found at Wed Oct 18 14:59:24 UTC 2023 selfserv_9355 with PID 11519 started at Wed Oct 18 14:59:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11519 at Wed Oct 18 14:59:24 UTC 2023 kill -USR1 11519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11519 killed at Wed Oct 18 14:59:24 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11573 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11573 found at Wed Oct 18 14:59:24 UTC 2023 selfserv_9355 with PID 11573 started at Wed Oct 18 14:59:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11573 at Wed Oct 18 14:59:25 UTC 2023 kill -USR1 11573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11573 killed at Wed Oct 18 14:59:25 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11625 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11625 found at Wed Oct 18 14:59:25 UTC 2023 selfserv_9355 with PID 11625 started at Wed Oct 18 14:59:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11625 at Wed Oct 18 14:59:25 UTC 2023 kill -USR1 11625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11625 killed at Wed Oct 18 14:59:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11691 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11691 found at Wed Oct 18 14:59:25 UTC 2023 selfserv_9355 with PID 11691 started at Wed Oct 18 14:59:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11691 at Wed Oct 18 14:59:26 UTC 2023 kill -USR1 11691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11691 killed at Wed Oct 18 14:59:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11743 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11743 found at Wed Oct 18 14:59:26 UTC 2023 selfserv_9355 with PID 11743 started at Wed Oct 18 14:59:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11743 at Wed Oct 18 14:59:26 UTC 2023 kill -USR1 11743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11743 killed at Wed Oct 18 14:59:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11795 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11795 found at Wed Oct 18 14:59:27 UTC 2023 selfserv_9355 with PID 11795 started at Wed Oct 18 14:59:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11795 at Wed Oct 18 14:59:27 UTC 2023 kill -USR1 11795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11795 killed at Wed Oct 18 14:59:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11861 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11861 found at Wed Oct 18 14:59:27 UTC 2023 selfserv_9355 with PID 11861 started at Wed Oct 18 14:59:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11861 at Wed Oct 18 14:59:28 UTC 2023 kill -USR1 11861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11861 killed at Wed Oct 18 14:59:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11913 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11913 found at Wed Oct 18 14:59:28 UTC 2023 selfserv_9355 with PID 11913 started at Wed Oct 18 14:59:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11913 at Wed Oct 18 14:59:28 UTC 2023 kill -USR1 11913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11913 killed at Wed Oct 18 14:59:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11965 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11965 found at Wed Oct 18 14:59:29 UTC 2023 selfserv_9355 with PID 11965 started at Wed Oct 18 14:59:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11965 at Wed Oct 18 14:59:29 UTC 2023 kill -USR1 11965 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11965 killed at Wed Oct 18 14:59:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12031 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12031 found at Wed Oct 18 14:59:29 UTC 2023 selfserv_9355 with PID 12031 started at Wed Oct 18 14:59:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12031 at Wed Oct 18 14:59:29 UTC 2023 kill -USR1 12031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12031 killed at Wed Oct 18 14:59:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12083 found at Wed Oct 18 14:59:30 UTC 2023 selfserv_9355 with PID 12083 started at Wed Oct 18 14:59:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12083 at Wed Oct 18 14:59:30 UTC 2023 kill -USR1 12083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12083 killed at Wed Oct 18 14:59:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12135 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12135 found at Wed Oct 18 14:59:30 UTC 2023 selfserv_9355 with PID 12135 started at Wed Oct 18 14:59:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12135 at Wed Oct 18 14:59:30 UTC 2023 kill -USR1 12135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12135 killed at Wed Oct 18 14:59:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12201 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12201 found at Wed Oct 18 14:59:31 UTC 2023 selfserv_9355 with PID 12201 started at Wed Oct 18 14:59:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12201 at Wed Oct 18 14:59:31 UTC 2023 kill -USR1 12201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12201 killed at Wed Oct 18 14:59:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12253 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12253 found at Wed Oct 18 14:59:32 UTC 2023 selfserv_9355 with PID 12253 started at Wed Oct 18 14:59:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12253 at Wed Oct 18 14:59:32 UTC 2023 kill -USR1 12253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12253 killed at Wed Oct 18 14:59:32 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12305 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12305 found at Wed Oct 18 14:59:32 UTC 2023 selfserv_9355 with PID 12305 started at Wed Oct 18 14:59:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12305 at Wed Oct 18 14:59:33 UTC 2023 kill -USR1 12305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12305 killed at Wed Oct 18 14:59:33 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12371 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12371 found at Wed Oct 18 14:59:33 UTC 2023 selfserv_9355 with PID 12371 started at Wed Oct 18 14:59:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12371 at Wed Oct 18 14:59:33 UTC 2023 kill -USR1 12371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12371 killed at Wed Oct 18 14:59:33 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12423 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12423 found at Wed Oct 18 14:59:33 UTC 2023 selfserv_9355 with PID 12423 started at Wed Oct 18 14:59:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12423 at Wed Oct 18 14:59:34 UTC 2023 kill -USR1 12423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12423 killed at Wed Oct 18 14:59:34 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12475 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12475 found at Wed Oct 18 14:59:34 UTC 2023 selfserv_9355 with PID 12475 started at Wed Oct 18 14:59:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12475 at Wed Oct 18 14:59:34 UTC 2023 kill -USR1 12475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12475 killed at Wed Oct 18 14:59:34 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12541 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12541 found at Wed Oct 18 14:59:34 UTC 2023 selfserv_9355 with PID 12541 started at Wed Oct 18 14:59:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12541 at Wed Oct 18 14:59:35 UTC 2023 kill -USR1 12541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12541 killed at Wed Oct 18 14:59:35 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12593 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12593 found at Wed Oct 18 14:59:35 UTC 2023 selfserv_9355 with PID 12593 started at Wed Oct 18 14:59:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12593 at Wed Oct 18 14:59:35 UTC 2023 kill -USR1 12593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12593 killed at Wed Oct 18 14:59:35 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12645 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12645 found at Wed Oct 18 14:59:35 UTC 2023 selfserv_9355 with PID 12645 started at Wed Oct 18 14:59:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12645 at Wed Oct 18 14:59:36 UTC 2023 kill -USR1 12645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12645 killed at Wed Oct 18 14:59:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12711 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12711 found at Wed Oct 18 14:59:36 UTC 2023 selfserv_9355 with PID 12711 started at Wed Oct 18 14:59:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12711 at Wed Oct 18 14:59:37 UTC 2023 kill -USR1 12711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12711 killed at Wed Oct 18 14:59:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12763 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12763 found at Wed Oct 18 14:59:37 UTC 2023 selfserv_9355 with PID 12763 started at Wed Oct 18 14:59:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12763 at Wed Oct 18 14:59:37 UTC 2023 kill -USR1 12763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12763 killed at Wed Oct 18 14:59:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12815 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12815 found at Wed Oct 18 14:59:38 UTC 2023 selfserv_9355 with PID 12815 started at Wed Oct 18 14:59:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12815 at Wed Oct 18 14:59:38 UTC 2023 kill -USR1 12815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12815 killed at Wed Oct 18 14:59:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12881 found at Wed Oct 18 14:59:39 UTC 2023 selfserv_9355 with PID 12881 started at Wed Oct 18 14:59:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12881 at Wed Oct 18 14:59:39 UTC 2023 kill -USR1 12881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12881 killed at Wed Oct 18 14:59:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12933 found at Wed Oct 18 14:59:39 UTC 2023 selfserv_9355 with PID 12933 started at Wed Oct 18 14:59:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12933 at Wed Oct 18 14:59:40 UTC 2023 kill -USR1 12933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12933 killed at Wed Oct 18 14:59:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12985 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12985 found at Wed Oct 18 14:59:40 UTC 2023 selfserv_9355 with PID 12985 started at Wed Oct 18 14:59:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12985 at Wed Oct 18 14:59:40 UTC 2023 kill -USR1 12985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12985 killed at Wed Oct 18 14:59:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13051 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13051 found at Wed Oct 18 14:59:41 UTC 2023 selfserv_9355 with PID 13051 started at Wed Oct 18 14:59:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13051 at Wed Oct 18 14:59:41 UTC 2023 kill -USR1 13051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13051 killed at Wed Oct 18 14:59:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13103 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13103 found at Wed Oct 18 14:59:42 UTC 2023 selfserv_9355 with PID 13103 started at Wed Oct 18 14:59:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13103 at Wed Oct 18 14:59:42 UTC 2023 kill -USR1 13103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13103 killed at Wed Oct 18 14:59:42 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13155 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13155 found at Wed Oct 18 14:59:42 UTC 2023 selfserv_9355 with PID 13155 started at Wed Oct 18 14:59:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13155 at Wed Oct 18 14:59:43 UTC 2023 kill -USR1 13155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13155 killed at Wed Oct 18 14:59:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13221 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13221 found at Wed Oct 18 14:59:43 UTC 2023 selfserv_9355 with PID 13221 started at Wed Oct 18 14:59:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13221 at Wed Oct 18 14:59:44 UTC 2023 kill -USR1 13221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13221 killed at Wed Oct 18 14:59:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13273 found at Wed Oct 18 14:59:44 UTC 2023 selfserv_9355 with PID 13273 started at Wed Oct 18 14:59:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13273 at Wed Oct 18 14:59:45 UTC 2023 kill -USR1 13273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13273 killed at Wed Oct 18 14:59:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13325 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13325 found at Wed Oct 18 14:59:45 UTC 2023 selfserv_9355 with PID 13325 started at Wed Oct 18 14:59:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13325 at Wed Oct 18 14:59:45 UTC 2023 kill -USR1 13325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13325 killed at Wed Oct 18 14:59:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13391 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13391 found at Wed Oct 18 14:59:46 UTC 2023 selfserv_9355 with PID 13391 started at Wed Oct 18 14:59:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13391 at Wed Oct 18 14:59:46 UTC 2023 kill -USR1 13391 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13391 killed at Wed Oct 18 14:59:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13443 found at Wed Oct 18 14:59:46 UTC 2023 selfserv_9355 with PID 13443 started at Wed Oct 18 14:59:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13443 at Wed Oct 18 14:59:47 UTC 2023 kill -USR1 13443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13443 killed at Wed Oct 18 14:59:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13495 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13495 found at Wed Oct 18 14:59:47 UTC 2023 selfserv_9355 with PID 13495 started at Wed Oct 18 14:59:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13495 at Wed Oct 18 14:59:48 UTC 2023 kill -USR1 13495 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13495 killed at Wed Oct 18 14:59:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13561 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13561 found at Wed Oct 18 14:59:48 UTC 2023 selfserv_9355 with PID 13561 started at Wed Oct 18 14:59:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13561 at Wed Oct 18 14:59:48 UTC 2023 kill -USR1 13561 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13561 killed at Wed Oct 18 14:59:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13613 found at Wed Oct 18 14:59:49 UTC 2023 selfserv_9355 with PID 13613 started at Wed Oct 18 14:59:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13613 at Wed Oct 18 14:59:49 UTC 2023 kill -USR1 13613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13613 killed at Wed Oct 18 14:59:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13665 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13665 found at Wed Oct 18 14:59:49 UTC 2023 selfserv_9355 with PID 13665 started at Wed Oct 18 14:59:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13665 at Wed Oct 18 14:59:50 UTC 2023 kill -USR1 13665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13665 killed at Wed Oct 18 14:59:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13731 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13731 found at Wed Oct 18 14:59:50 UTC 2023 selfserv_9355 with PID 13731 started at Wed Oct 18 14:59:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13731 at Wed Oct 18 14:59:51 UTC 2023 kill -USR1 13731 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13731 killed at Wed Oct 18 14:59:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13783 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13783 found at Wed Oct 18 14:59:51 UTC 2023 selfserv_9355 with PID 13783 started at Wed Oct 18 14:59:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13783 at Wed Oct 18 14:59:52 UTC 2023 kill -USR1 13783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13783 killed at Wed Oct 18 14:59:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13835 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13835 found at Wed Oct 18 14:59:52 UTC 2023 selfserv_9355 with PID 13835 started at Wed Oct 18 14:59:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13835 at Wed Oct 18 14:59:52 UTC 2023 kill -USR1 13835 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13835 killed at Wed Oct 18 14:59:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13901 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13901 found at Wed Oct 18 14:59:53 UTC 2023 selfserv_9355 with PID 13901 started at Wed Oct 18 14:59:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13901 at Wed Oct 18 14:59:53 UTC 2023 kill -USR1 13901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13901 killed at Wed Oct 18 14:59:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13953 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13953 found at Wed Oct 18 14:59:53 UTC 2023 selfserv_9355 with PID 13953 started at Wed Oct 18 14:59:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13953 at Wed Oct 18 14:59:54 UTC 2023 kill -USR1 13953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13953 killed at Wed Oct 18 14:59:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 14:59:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14005 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14005 found at Wed Oct 18 14:59:54 UTC 2023 selfserv_9355 with PID 14005 started at Wed Oct 18 14:59:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14005 at Wed Oct 18 14:59:55 UTC 2023 kill -USR1 14005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14005 killed at Wed Oct 18 14:59:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14071 found at Wed Oct 18 14:59:55 UTC 2023 selfserv_9355 with PID 14071 started at Wed Oct 18 14:59:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14071 at Wed Oct 18 14:59:55 UTC 2023 kill -USR1 14071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14071 killed at Wed Oct 18 14:59:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14123 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14123 found at Wed Oct 18 14:59:56 UTC 2023 selfserv_9355 with PID 14123 started at Wed Oct 18 14:59:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14123 at Wed Oct 18 14:59:56 UTC 2023 kill -USR1 14123 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14123 killed at Wed Oct 18 14:59:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14175 found at Wed Oct 18 14:59:56 UTC 2023 selfserv_9355 with PID 14175 started at Wed Oct 18 14:59:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14175 at Wed Oct 18 14:59:57 UTC 2023 kill -USR1 14175 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14175 killed at Wed Oct 18 14:59:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14241 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14241 found at Wed Oct 18 14:59:57 UTC 2023 selfserv_9355 with PID 14241 started at Wed Oct 18 14:59:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14241 at Wed Oct 18 14:59:58 UTC 2023 kill -USR1 14241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14241 killed at Wed Oct 18 14:59:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14293 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14293 found at Wed Oct 18 14:59:58 UTC 2023 selfserv_9355 with PID 14293 started at Wed Oct 18 14:59:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14293 at Wed Oct 18 14:59:59 UTC 2023 kill -USR1 14293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14293 killed at Wed Oct 18 14:59:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 14:59:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 14:59:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14345 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14345 found at Wed Oct 18 14:59:59 UTC 2023 selfserv_9355 with PID 14345 started at Wed Oct 18 14:59:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14345 at Wed Oct 18 14:59:59 UTC 2023 kill -USR1 14345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14345 killed at Wed Oct 18 15:00:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14411 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14411 found at Wed Oct 18 15:00:00 UTC 2023 selfserv_9355 with PID 14411 started at Wed Oct 18 15:00:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14411 at Wed Oct 18 15:00:00 UTC 2023 kill -USR1 14411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14411 killed at Wed Oct 18 15:00:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14463 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14463 found at Wed Oct 18 15:00:01 UTC 2023 selfserv_9355 with PID 14463 started at Wed Oct 18 15:00:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14463 at Wed Oct 18 15:00:01 UTC 2023 kill -USR1 14463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14463 killed at Wed Oct 18 15:00:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14515 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14515 found at Wed Oct 18 15:00:01 UTC 2023 selfserv_9355 with PID 14515 started at Wed Oct 18 15:00:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14515 at Wed Oct 18 15:00:02 UTC 2023 kill -USR1 14515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14515 killed at Wed Oct 18 15:00:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14642 found at Wed Oct 18 15:00:02 UTC 2023 selfserv_9355 with PID 14642 started at Wed Oct 18 15:00:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14642 at Wed Oct 18 15:00:03 UTC 2023 kill -USR1 14642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14642 killed at Wed Oct 18 15:00:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14694 found at Wed Oct 18 15:00:03 UTC 2023 selfserv_9355 with PID 14694 started at Wed Oct 18 15:00:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14694 at Wed Oct 18 15:00:03 UTC 2023 kill -USR1 14694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14694 killed at Wed Oct 18 15:00:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14746 found at Wed Oct 18 15:00:04 UTC 2023 selfserv_9355 with PID 14746 started at Wed Oct 18 15:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14746 at Wed Oct 18 15:00:04 UTC 2023 kill -USR1 14746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14746 killed at Wed Oct 18 15:00:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14812 found at Wed Oct 18 15:00:04 UTC 2023 selfserv_9355 with PID 14812 started at Wed Oct 18 15:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14812 at Wed Oct 18 15:00:05 UTC 2023 kill -USR1 14812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14812 killed at Wed Oct 18 15:00:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14864 found at Wed Oct 18 15:00:05 UTC 2023 selfserv_9355 with PID 14864 started at Wed Oct 18 15:00:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14864 at Wed Oct 18 15:00:06 UTC 2023 kill -USR1 14864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14864 killed at Wed Oct 18 15:00:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14916 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14916 found at Wed Oct 18 15:00:06 UTC 2023 selfserv_9355 with PID 14916 started at Wed Oct 18 15:00:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14916 at Wed Oct 18 15:00:06 UTC 2023 kill -USR1 14916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14916 killed at Wed Oct 18 15:00:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14982 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14982 found at Wed Oct 18 15:00:07 UTC 2023 selfserv_9355 with PID 14982 started at Wed Oct 18 15:00:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14982 at Wed Oct 18 15:00:07 UTC 2023 kill -USR1 14982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14982 killed at Wed Oct 18 15:00:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15034 found at Wed Oct 18 15:00:07 UTC 2023 selfserv_9355 with PID 15034 started at Wed Oct 18 15:00:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15034 at Wed Oct 18 15:00:08 UTC 2023 kill -USR1 15034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15034 killed at Wed Oct 18 15:00:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15086 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15086 found at Wed Oct 18 15:00:08 UTC 2023 selfserv_9355 with PID 15086 started at Wed Oct 18 15:00:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15086 at Wed Oct 18 15:00:08 UTC 2023 kill -USR1 15086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15086 killed at Wed Oct 18 15:00:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15152 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15152 found at Wed Oct 18 15:00:09 UTC 2023 selfserv_9355 with PID 15152 started at Wed Oct 18 15:00:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15152 at Wed Oct 18 15:00:09 UTC 2023 kill -USR1 15152 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15152 killed at Wed Oct 18 15:00:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15204 found at Wed Oct 18 15:00:09 UTC 2023 selfserv_9355 with PID 15204 started at Wed Oct 18 15:00:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15204 at Wed Oct 18 15:00:10 UTC 2023 kill -USR1 15204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15204 killed at Wed Oct 18 15:00:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15256 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15256 found at Wed Oct 18 15:00:10 UTC 2023 selfserv_9355 with PID 15256 started at Wed Oct 18 15:00:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15256 at Wed Oct 18 15:00:10 UTC 2023 kill -USR1 15256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15256 killed at Wed Oct 18 15:00:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15322 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15322 found at Wed Oct 18 15:00:10 UTC 2023 selfserv_9355 with PID 15322 started at Wed Oct 18 15:00:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15322 at Wed Oct 18 15:00:11 UTC 2023 kill -USR1 15322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15322 killed at Wed Oct 18 15:00:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15374 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15374 found at Wed Oct 18 15:00:11 UTC 2023 selfserv_9355 with PID 15374 started at Wed Oct 18 15:00:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15374 at Wed Oct 18 15:00:12 UTC 2023 kill -USR1 15374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15374 killed at Wed Oct 18 15:00:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15426 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15426 found at Wed Oct 18 15:00:12 UTC 2023 selfserv_9355 with PID 15426 started at Wed Oct 18 15:00:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15426 at Wed Oct 18 15:00:12 UTC 2023 kill -USR1 15426 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15426 killed at Wed Oct 18 15:00:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15492 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15492 found at Wed Oct 18 15:00:13 UTC 2023 selfserv_9355 with PID 15492 started at Wed Oct 18 15:00:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15492 at Wed Oct 18 15:00:13 UTC 2023 kill -USR1 15492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15492 killed at Wed Oct 18 15:00:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15544 found at Wed Oct 18 15:00:13 UTC 2023 selfserv_9355 with PID 15544 started at Wed Oct 18 15:00:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15544 at Wed Oct 18 15:00:14 UTC 2023 kill -USR1 15544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15544 killed at Wed Oct 18 15:00:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15596 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15596 found at Wed Oct 18 15:00:14 UTC 2023 selfserv_9355 with PID 15596 started at Wed Oct 18 15:00:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15596 at Wed Oct 18 15:00:14 UTC 2023 kill -USR1 15596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15596 killed at Wed Oct 18 15:00:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15662 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15662 found at Wed Oct 18 15:00:15 UTC 2023 selfserv_9355 with PID 15662 started at Wed Oct 18 15:00:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15662 at Wed Oct 18 15:00:15 UTC 2023 kill -USR1 15662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15662 killed at Wed Oct 18 15:00:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15714 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15714 found at Wed Oct 18 15:00:15 UTC 2023 selfserv_9355 with PID 15714 started at Wed Oct 18 15:00:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15714 at Wed Oct 18 15:00:15 UTC 2023 kill -USR1 15714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15714 killed at Wed Oct 18 15:00:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15766 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15766 found at Wed Oct 18 15:00:16 UTC 2023 selfserv_9355 with PID 15766 started at Wed Oct 18 15:00:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15766 at Wed Oct 18 15:00:16 UTC 2023 kill -USR1 15766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15766 killed at Wed Oct 18 15:00:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15835 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15835 found at Wed Oct 18 15:00:16 UTC 2023 selfserv_9355 with PID 15835 started at Wed Oct 18 15:00:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15835 at Wed Oct 18 15:00:17 UTC 2023 kill -USR1 15835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15835 killed at Wed Oct 18 15:00:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15888 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15888 found at Wed Oct 18 15:00:17 UTC 2023 selfserv_9355 with PID 15888 started at Wed Oct 18 15:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15888 at Wed Oct 18 15:00:17 UTC 2023 kill -USR1 15888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15888 killed at Wed Oct 18 15:00:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15940 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15940 found at Wed Oct 18 15:00:17 UTC 2023 selfserv_9355 with PID 15940 started at Wed Oct 18 15:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15940 at Wed Oct 18 15:00:18 UTC 2023 kill -USR1 15940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15940 killed at Wed Oct 18 15:00:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16007 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16007 found at Wed Oct 18 15:00:18 UTC 2023 selfserv_9355 with PID 16007 started at Wed Oct 18 15:00:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16007 at Wed Oct 18 15:00:18 UTC 2023 kill -USR1 16007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16007 killed at Wed Oct 18 15:00:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16059 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16059 found at Wed Oct 18 15:00:18 UTC 2023 selfserv_9355 with PID 16059 started at Wed Oct 18 15:00:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16059 at Wed Oct 18 15:00:19 UTC 2023 kill -USR1 16059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16059 killed at Wed Oct 18 15:00:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16111 found at Wed Oct 18 15:00:19 UTC 2023 selfserv_9355 with PID 16111 started at Wed Oct 18 15:00:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16111 at Wed Oct 18 15:00:19 UTC 2023 kill -USR1 16111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16111 killed at Wed Oct 18 15:00:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16177 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16177 found at Wed Oct 18 15:00:20 UTC 2023 selfserv_9355 with PID 16177 started at Wed Oct 18 15:00:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16177 at Wed Oct 18 15:00:20 UTC 2023 kill -USR1 16177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16177 killed at Wed Oct 18 15:00:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16229 found at Wed Oct 18 15:00:20 UTC 2023 selfserv_9355 with PID 16229 started at Wed Oct 18 15:00:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16229 at Wed Oct 18 15:00:21 UTC 2023 kill -USR1 16229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16229 killed at Wed Oct 18 15:00:21 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16281 found at Wed Oct 18 15:00:21 UTC 2023 selfserv_9355 with PID 16281 started at Wed Oct 18 15:00:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16281 at Wed Oct 18 15:00:21 UTC 2023 kill -USR1 16281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16281 killed at Wed Oct 18 15:00:21 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16349 found at Wed Oct 18 15:00:22 UTC 2023 selfserv_9355 with PID 16349 started at Wed Oct 18 15:00:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16349 at Wed Oct 18 15:00:22 UTC 2023 kill -USR1 16349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16349 killed at Wed Oct 18 15:00:22 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16403 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16403 found at Wed Oct 18 15:00:22 UTC 2023 selfserv_9355 with PID 16403 started at Wed Oct 18 15:00:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16403 at Wed Oct 18 15:00:23 UTC 2023 kill -USR1 16403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16403 killed at Wed Oct 18 15:00:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16455 found at Wed Oct 18 15:00:23 UTC 2023 selfserv_9355 with PID 16455 started at Wed Oct 18 15:00:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16455 at Wed Oct 18 15:00:23 UTC 2023 kill -USR1 16455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16455 killed at Wed Oct 18 15:00:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16521 found at Wed Oct 18 15:00:23 UTC 2023 selfserv_9355 with PID 16521 started at Wed Oct 18 15:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16521 at Wed Oct 18 15:00:24 UTC 2023 kill -USR1 16521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16521 killed at Wed Oct 18 15:00:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16575 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16575 found at Wed Oct 18 15:00:24 UTC 2023 selfserv_9355 with PID 16575 started at Wed Oct 18 15:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16575 at Wed Oct 18 15:00:24 UTC 2023 kill -USR1 16575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16575 killed at Wed Oct 18 15:00:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16627 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16627 found at Wed Oct 18 15:00:24 UTC 2023 selfserv_9355 with PID 16627 started at Wed Oct 18 15:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16627 at Wed Oct 18 15:00:25 UTC 2023 kill -USR1 16627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16627 killed at Wed Oct 18 15:00:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16693 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16693 found at Wed Oct 18 15:00:25 UTC 2023 selfserv_9355 with PID 16693 started at Wed Oct 18 15:00:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16693 at Wed Oct 18 15:00:25 UTC 2023 kill -USR1 16693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16693 killed at Wed Oct 18 15:00:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16746 found at Wed Oct 18 15:00:26 UTC 2023 selfserv_9355 with PID 16746 started at Wed Oct 18 15:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16746 at Wed Oct 18 15:00:26 UTC 2023 kill -USR1 16746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16746 killed at Wed Oct 18 15:00:26 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16798 found at Wed Oct 18 15:00:26 UTC 2023 selfserv_9355 with PID 16798 started at Wed Oct 18 15:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16798 at Wed Oct 18 15:00:27 UTC 2023 kill -USR1 16798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16798 killed at Wed Oct 18 15:00:27 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16864 found at Wed Oct 18 15:00:27 UTC 2023 selfserv_9355 with PID 16864 started at Wed Oct 18 15:00:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16864 at Wed Oct 18 15:00:27 UTC 2023 kill -USR1 16864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16864 killed at Wed Oct 18 15:00:27 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16916 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16916 found at Wed Oct 18 15:00:28 UTC 2023 selfserv_9355 with PID 16916 started at Wed Oct 18 15:00:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16916 at Wed Oct 18 15:00:28 UTC 2023 kill -USR1 16916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16916 killed at Wed Oct 18 15:00:28 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16968 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16968 found at Wed Oct 18 15:00:28 UTC 2023 selfserv_9355 with PID 16968 started at Wed Oct 18 15:00:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16968 at Wed Oct 18 15:00:29 UTC 2023 kill -USR1 16968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16968 killed at Wed Oct 18 15:00:29 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17034 found at Wed Oct 18 15:00:29 UTC 2023 selfserv_9355 with PID 17034 started at Wed Oct 18 15:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17034 at Wed Oct 18 15:00:29 UTC 2023 kill -USR1 17034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17034 killed at Wed Oct 18 15:00:29 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17086 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17086 found at Wed Oct 18 15:00:29 UTC 2023 selfserv_9355 with PID 17086 started at Wed Oct 18 15:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17086 at Wed Oct 18 15:00:30 UTC 2023 kill -USR1 17086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17086 killed at Wed Oct 18 15:00:30 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17138 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17138 found at Wed Oct 18 15:00:30 UTC 2023 selfserv_9355 with PID 17138 started at Wed Oct 18 15:00:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17138 at Wed Oct 18 15:00:30 UTC 2023 kill -USR1 17138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17138 killed at Wed Oct 18 15:00:30 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17204 found at Wed Oct 18 15:00:31 UTC 2023 selfserv_9355 with PID 17204 started at Wed Oct 18 15:00:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17204 at Wed Oct 18 15:00:31 UTC 2023 kill -USR1 17204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17204 killed at Wed Oct 18 15:00:31 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17256 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17256 found at Wed Oct 18 15:00:31 UTC 2023 selfserv_9355 with PID 17256 started at Wed Oct 18 15:00:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17256 at Wed Oct 18 15:00:31 UTC 2023 kill -USR1 17256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17256 killed at Wed Oct 18 15:00:32 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17308 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17308 found at Wed Oct 18 15:00:32 UTC 2023 selfserv_9355 with PID 17308 started at Wed Oct 18 15:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17308 at Wed Oct 18 15:00:32 UTC 2023 kill -USR1 17308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17308 killed at Wed Oct 18 15:00:32 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17374 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17374 found at Wed Oct 18 15:00:32 UTC 2023 selfserv_9355 with PID 17374 started at Wed Oct 18 15:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17374 at Wed Oct 18 15:00:33 UTC 2023 kill -USR1 17374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17374 killed at Wed Oct 18 15:00:33 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17426 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17426 found at Wed Oct 18 15:00:33 UTC 2023 selfserv_9355 with PID 17426 started at Wed Oct 18 15:00:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17426 at Wed Oct 18 15:00:33 UTC 2023 kill -USR1 17426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17426 killed at Wed Oct 18 15:00:33 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17478 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17478 found at Wed Oct 18 15:00:34 UTC 2023 selfserv_9355 with PID 17478 started at Wed Oct 18 15:00:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17478 at Wed Oct 18 15:00:34 UTC 2023 kill -USR1 17478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17478 killed at Wed Oct 18 15:00:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17544 found at Wed Oct 18 15:00:34 UTC 2023 selfserv_9355 with PID 17544 started at Wed Oct 18 15:00:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17544 at Wed Oct 18 15:00:34 UTC 2023 kill -USR1 17544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17544 killed at Wed Oct 18 15:00:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17596 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17596 found at Wed Oct 18 15:00:35 UTC 2023 selfserv_9355 with PID 17596 started at Wed Oct 18 15:00:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17596 at Wed Oct 18 15:00:35 UTC 2023 kill -USR1 17596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17596 killed at Wed Oct 18 15:00:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17648 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17648 found at Wed Oct 18 15:00:35 UTC 2023 selfserv_9355 with PID 17648 started at Wed Oct 18 15:00:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17648 at Wed Oct 18 15:00:35 UTC 2023 kill -USR1 17648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17648 killed at Wed Oct 18 15:00:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17714 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17714 found at Wed Oct 18 15:00:36 UTC 2023 selfserv_9355 with PID 17714 started at Wed Oct 18 15:00:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17714 at Wed Oct 18 15:00:36 UTC 2023 kill -USR1 17714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17714 killed at Wed Oct 18 15:00:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17766 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17766 found at Wed Oct 18 15:00:36 UTC 2023 selfserv_9355 with PID 17766 started at Wed Oct 18 15:00:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17766 at Wed Oct 18 15:00:37 UTC 2023 kill -USR1 17766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17766 killed at Wed Oct 18 15:00:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17818 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17818 found at Wed Oct 18 15:00:37 UTC 2023 selfserv_9355 with PID 17818 started at Wed Oct 18 15:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17818 at Wed Oct 18 15:00:37 UTC 2023 kill -USR1 17818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17818 killed at Wed Oct 18 15:00:37 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17884 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17884 found at Wed Oct 18 15:00:37 UTC 2023 selfserv_9355 with PID 17884 started at Wed Oct 18 15:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17884 at Wed Oct 18 15:00:38 UTC 2023 kill -USR1 17884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17884 killed at Wed Oct 18 15:00:38 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17936 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17936 found at Wed Oct 18 15:00:38 UTC 2023 selfserv_9355 with PID 17936 started at Wed Oct 18 15:00:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17936 at Wed Oct 18 15:00:38 UTC 2023 kill -USR1 17936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17936 killed at Wed Oct 18 15:00:38 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17988 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17988 found at Wed Oct 18 15:00:38 UTC 2023 selfserv_9355 with PID 17988 started at Wed Oct 18 15:00:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17988 at Wed Oct 18 15:00:39 UTC 2023 kill -USR1 17988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17988 killed at Wed Oct 18 15:00:39 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18054 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18054 found at Wed Oct 18 15:00:39 UTC 2023 selfserv_9355 with PID 18054 started at Wed Oct 18 15:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18054 at Wed Oct 18 15:00:39 UTC 2023 kill -USR1 18054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18054 killed at Wed Oct 18 15:00:39 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18106 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18106 found at Wed Oct 18 15:00:39 UTC 2023 selfserv_9355 with PID 18106 started at Wed Oct 18 15:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18106 at Wed Oct 18 15:00:40 UTC 2023 kill -USR1 18106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18106 killed at Wed Oct 18 15:00:40 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18158 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18158 found at Wed Oct 18 15:00:40 UTC 2023 selfserv_9355 with PID 18158 started at Wed Oct 18 15:00:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18158 at Wed Oct 18 15:00:40 UTC 2023 kill -USR1 18158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18158 killed at Wed Oct 18 15:00:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18224 found at Wed Oct 18 15:00:40 UTC 2023 selfserv_9355 with PID 18224 started at Wed Oct 18 15:00:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18224 at Wed Oct 18 15:00:41 UTC 2023 kill -USR1 18224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18224 killed at Wed Oct 18 15:00:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18276 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18276 found at Wed Oct 18 15:00:41 UTC 2023 selfserv_9355 with PID 18276 started at Wed Oct 18 15:00:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18276 at Wed Oct 18 15:00:42 UTC 2023 kill -USR1 18276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18276 killed at Wed Oct 18 15:00:42 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18328 found at Wed Oct 18 15:00:42 UTC 2023 selfserv_9355 with PID 18328 started at Wed Oct 18 15:00:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18328 at Wed Oct 18 15:00:42 UTC 2023 kill -USR1 18328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18328 killed at Wed Oct 18 15:00:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18394 found at Wed Oct 18 15:00:43 UTC 2023 selfserv_9355 with PID 18394 started at Wed Oct 18 15:00:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18394 at Wed Oct 18 15:00:43 UTC 2023 kill -USR1 18394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18394 killed at Wed Oct 18 15:00:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18446 found at Wed Oct 18 15:00:43 UTC 2023 selfserv_9355 with PID 18446 started at Wed Oct 18 15:00:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18446 at Wed Oct 18 15:00:44 UTC 2023 kill -USR1 18446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18446 killed at Wed Oct 18 15:00:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18500 found at Wed Oct 18 15:00:44 UTC 2023 selfserv_9355 with PID 18500 started at Wed Oct 18 15:00:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18500 at Wed Oct 18 15:00:45 UTC 2023 kill -USR1 18500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18500 killed at Wed Oct 18 15:00:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18567 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18567 found at Wed Oct 18 15:00:45 UTC 2023 selfserv_9355 with PID 18567 started at Wed Oct 18 15:00:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18567 at Wed Oct 18 15:00:45 UTC 2023 kill -USR1 18567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18567 killed at Wed Oct 18 15:00:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18620 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18620 found at Wed Oct 18 15:00:46 UTC 2023 selfserv_9355 with PID 18620 started at Wed Oct 18 15:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18620 at Wed Oct 18 15:00:46 UTC 2023 kill -USR1 18620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18620 killed at Wed Oct 18 15:00:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18672 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18672 found at Wed Oct 18 15:00:46 UTC 2023 selfserv_9355 with PID 18672 started at Wed Oct 18 15:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18672 at Wed Oct 18 15:00:47 UTC 2023 kill -USR1 18672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18672 killed at Wed Oct 18 15:00:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18738 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18738 found at Wed Oct 18 15:00:47 UTC 2023 selfserv_9355 with PID 18738 started at Wed Oct 18 15:00:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18738 at Wed Oct 18 15:00:48 UTC 2023 kill -USR1 18738 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18738 killed at Wed Oct 18 15:00:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18790 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18790 found at Wed Oct 18 15:00:48 UTC 2023 selfserv_9355 with PID 18790 started at Wed Oct 18 15:00:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18790 at Wed Oct 18 15:00:48 UTC 2023 kill -USR1 18790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18790 killed at Wed Oct 18 15:00:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18842 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18842 found at Wed Oct 18 15:00:49 UTC 2023 selfserv_9355 with PID 18842 started at Wed Oct 18 15:00:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18842 at Wed Oct 18 15:00:49 UTC 2023 kill -USR1 18842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18842 killed at Wed Oct 18 15:00:49 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18908 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18908 found at Wed Oct 18 15:00:49 UTC 2023 selfserv_9355 with PID 18908 started at Wed Oct 18 15:00:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18908 at Wed Oct 18 15:00:50 UTC 2023 kill -USR1 18908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18908 killed at Wed Oct 18 15:00:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18960 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18960 found at Wed Oct 18 15:00:50 UTC 2023 selfserv_9355 with PID 18960 started at Wed Oct 18 15:00:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18960 at Wed Oct 18 15:00:51 UTC 2023 kill -USR1 18960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18960 killed at Wed Oct 18 15:00:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19012 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19012 found at Wed Oct 18 15:00:51 UTC 2023 selfserv_9355 with PID 19012 started at Wed Oct 18 15:00:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19012 at Wed Oct 18 15:00:51 UTC 2023 kill -USR1 19012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19012 killed at Wed Oct 18 15:00:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19078 found at Wed Oct 18 15:00:52 UTC 2023 selfserv_9355 with PID 19078 started at Wed Oct 18 15:00:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19078 at Wed Oct 18 15:00:52 UTC 2023 kill -USR1 19078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19078 killed at Wed Oct 18 15:00:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19130 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19130 found at Wed Oct 18 15:00:52 UTC 2023 selfserv_9355 with PID 19130 started at Wed Oct 18 15:00:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19130 at Wed Oct 18 15:00:53 UTC 2023 kill -USR1 19130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19130 killed at Wed Oct 18 15:00:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19182 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19182 found at Wed Oct 18 15:00:53 UTC 2023 selfserv_9355 with PID 19182 started at Wed Oct 18 15:00:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19182 at Wed Oct 18 15:00:54 UTC 2023 kill -USR1 19182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19182 killed at Wed Oct 18 15:00:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19248 found at Wed Oct 18 15:00:54 UTC 2023 selfserv_9355 with PID 19248 started at Wed Oct 18 15:00:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19248 at Wed Oct 18 15:00:54 UTC 2023 kill -USR1 19248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19248 killed at Wed Oct 18 15:00:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19300 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19300 found at Wed Oct 18 15:00:54 UTC 2023 selfserv_9355 with PID 19300 started at Wed Oct 18 15:00:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19300 at Wed Oct 18 15:00:55 UTC 2023 kill -USR1 19300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19300 killed at Wed Oct 18 15:00:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19354 found at Wed Oct 18 15:00:55 UTC 2023 selfserv_9355 with PID 19354 started at Wed Oct 18 15:00:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19354 at Wed Oct 18 15:00:56 UTC 2023 kill -USR1 19354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19354 killed at Wed Oct 18 15:00:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19420 found at Wed Oct 18 15:00:56 UTC 2023 selfserv_9355 with PID 19420 started at Wed Oct 18 15:00:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19420 at Wed Oct 18 15:00:56 UTC 2023 kill -USR1 19420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19420 killed at Wed Oct 18 15:00:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19472 found at Wed Oct 18 15:00:57 UTC 2023 selfserv_9355 with PID 19472 started at Wed Oct 18 15:00:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19472 at Wed Oct 18 15:00:57 UTC 2023 kill -USR1 19472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19472 killed at Wed Oct 18 15:00:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:00:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19524 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19524 found at Wed Oct 18 15:00:57 UTC 2023 selfserv_9355 with PID 19524 started at Wed Oct 18 15:00:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19524 at Wed Oct 18 15:00:58 UTC 2023 kill -USR1 19524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19524 killed at Wed Oct 18 15:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19590 found at Wed Oct 18 15:00:58 UTC 2023 selfserv_9355 with PID 19590 started at Wed Oct 18 15:00:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19590 at Wed Oct 18 15:00:58 UTC 2023 kill -USR1 19590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19590 killed at Wed Oct 18 15:00:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19642 found at Wed Oct 18 15:00:59 UTC 2023 selfserv_9355 with PID 19642 started at Wed Oct 18 15:00:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19642 at Wed Oct 18 15:00:59 UTC 2023 kill -USR1 19642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19642 killed at Wed Oct 18 15:00:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:00:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:00:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19694 found at Wed Oct 18 15:00:59 UTC 2023 selfserv_9355 with PID 19694 started at Wed Oct 18 15:00:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19694 at Wed Oct 18 15:01:00 UTC 2023 kill -USR1 19694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19694 killed at Wed Oct 18 15:01:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19760 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19760 found at Wed Oct 18 15:01:00 UTC 2023 selfserv_9355 with PID 19760 started at Wed Oct 18 15:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19760 at Wed Oct 18 15:01:00 UTC 2023 kill -USR1 19760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19760 killed at Wed Oct 18 15:01:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19812 found at Wed Oct 18 15:01:00 UTC 2023 selfserv_9355 with PID 19812 started at Wed Oct 18 15:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19812 at Wed Oct 18 15:01:01 UTC 2023 kill -USR1 19812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19812 killed at Wed Oct 18 15:01:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19878 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19878 found at Wed Oct 18 15:01:01 UTC 2023 selfserv_9355 with PID 19878 started at Wed Oct 18 15:01:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19878 at Wed Oct 18 15:01:01 UTC 2023 kill -USR1 19878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19878 killed at Wed Oct 18 15:01:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:01:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19944 found at Wed Oct 18 15:01:02 UTC 2023 selfserv_9355 with PID 19944 started at Wed Oct 18 15:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19944 at Wed Oct 18 15:01:02 UTC 2023 kill -USR1 19944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19944 killed at Wed Oct 18 15:01:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:01:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19996 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19996 found at Wed Oct 18 15:01:02 UTC 2023 selfserv_9355 with PID 19996 started at Wed Oct 18 15:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19996 at Wed Oct 18 15:01:03 UTC 2023 kill -USR1 19996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19996 killed at Wed Oct 18 15:01:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:01:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20048 found at Wed Oct 18 15:01:03 UTC 2023 selfserv_9355 with PID 20048 started at Wed Oct 18 15:01:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20048 at Wed Oct 18 15:01:03 UTC 2023 kill -USR1 20048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20048 killed at Wed Oct 18 15:01:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20114 found at Wed Oct 18 15:01:03 UTC 2023 selfserv_9355 with PID 20114 started at Wed Oct 18 15:01:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20114 at Wed Oct 18 15:01:04 UTC 2023 kill -USR1 20114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20114 killed at Wed Oct 18 15:01:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20166 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20166 found at Wed Oct 18 15:01:04 UTC 2023 selfserv_9355 with PID 20166 started at Wed Oct 18 15:01:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20166 at Wed Oct 18 15:01:04 UTC 2023 kill -USR1 20166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20166 killed at Wed Oct 18 15:01:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20218 found at Wed Oct 18 15:01:05 UTC 2023 selfserv_9355 with PID 20218 started at Wed Oct 18 15:01:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20218 at Wed Oct 18 15:01:05 UTC 2023 kill -USR1 20218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20218 killed at Wed Oct 18 15:01:05 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20284 found at Wed Oct 18 15:01:05 UTC 2023 selfserv_9355 with PID 20284 started at Wed Oct 18 15:01:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20284 at Wed Oct 18 15:01:06 UTC 2023 kill -USR1 20284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20284 killed at Wed Oct 18 15:01:06 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20336 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20336 found at Wed Oct 18 15:01:06 UTC 2023 selfserv_9355 with PID 20336 started at Wed Oct 18 15:01:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20336 at Wed Oct 18 15:01:07 UTC 2023 kill -USR1 20336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20336 killed at Wed Oct 18 15:01:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20388 found at Wed Oct 18 15:01:07 UTC 2023 selfserv_9355 with PID 20388 started at Wed Oct 18 15:01:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20388 at Wed Oct 18 15:01:08 UTC 2023 kill -USR1 20388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20388 killed at Wed Oct 18 15:01:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20454 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20454 found at Wed Oct 18 15:01:08 UTC 2023 selfserv_9355 with PID 20454 started at Wed Oct 18 15:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20454 at Wed Oct 18 15:01:08 UTC 2023 kill -USR1 20454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20454 killed at Wed Oct 18 15:01:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20506 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20506 found at Wed Oct 18 15:01:08 UTC 2023 selfserv_9355 with PID 20506 started at Wed Oct 18 15:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20506 at Wed Oct 18 15:01:09 UTC 2023 kill -USR1 20506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20506 killed at Wed Oct 18 15:01:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20558 found at Wed Oct 18 15:01:09 UTC 2023 selfserv_9355 with PID 20558 started at Wed Oct 18 15:01:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20558 at Wed Oct 18 15:01:10 UTC 2023 kill -USR1 20558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20558 killed at Wed Oct 18 15:01:10 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9355 starting at Wed Oct 18 15:01:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:10 UTC 2023 selfserv_9355 with PID 20629 started at Wed Oct 18 15:01:10 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:10 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:11 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:11 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:11 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:12 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:12 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:12 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:12 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:13 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:13 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:13 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:14 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:14 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:15 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:15 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:15 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:16 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:16 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:16 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:16 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:17 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:17 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:17 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:18 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:18 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:18 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:19 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:19 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:20 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:20 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:20 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:20 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:21 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:21 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:21 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:22 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:22 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:22 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20629 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20629 found at Wed Oct 18 15:01:23 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20629 at Wed Oct 18 15:01:23 UTC 2023 kill -USR1 20629 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20629 killed at Wed Oct 18 15:01:23 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:23 UTC 2023 selfserv_9355 with PID 21896 started at Wed Oct 18 15:01:23 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:23 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:23 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:24 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:24 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:24 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:24 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:25 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:25 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:25 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:25 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:26 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:26 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:26 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:27 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:27 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:27 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:28 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:28 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:28 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:28 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:29 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:29 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:29 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:29 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:30 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:30 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:30 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:31 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:31 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:31 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:31 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:32 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:32 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:32 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:32 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:33 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:33 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:33 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21896 found at Wed Oct 18 15:01:33 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 21896 at Wed Oct 18 15:01:33 UTC 2023 kill -USR1 21896 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21896 killed at Wed Oct 18 15:01:33 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:34 UTC 2023 selfserv_9355 with PID 23157 started at Wed Oct 18 15:01:34 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:34 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:34 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:35 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:35 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:35 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:36 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:36 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:36 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:37 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:37 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:37 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:38 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:38 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:39 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:39 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:39 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:40 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:40 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:40 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:40 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:41 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:41 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:41 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:42 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:42 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:42 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:43 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:43 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:44 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:44 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:44 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:44 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:45 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:45 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:45 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:46 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:46 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:46 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23157 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23157 found at Wed Oct 18 15:01:47 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 23157 at Wed Oct 18 15:01:47 UTC 2023 kill -USR1 23157 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23157 killed at Wed Oct 18 15:01:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:47 UTC 2023 selfserv_9355 with PID 24415 started at Wed Oct 18 15:01:47 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:47 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:47 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:48 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:48 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:48 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:48 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:49 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:49 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:49 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:49 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:50 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:50 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:50 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:51 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:51 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:51 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:51 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:52 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:52 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:52 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:52 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:53 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:53 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:53 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:53 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:54 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:54 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:54 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:55 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:55 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:55 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:55 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:56 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:56 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:56 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:56 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:56 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:57 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24415 found at Wed Oct 18 15:01:57 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24415 at Wed Oct 18 15:01:57 UTC 2023 kill -USR1 24415 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24415 killed at Wed Oct 18 15:01:57 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:01:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25673 found at Wed Oct 18 15:01:57 UTC 2023 selfserv_9355 with PID 25673 started at Wed Oct 18 15:01:57 UTC 2023 trying to kill selfserv_9355 with PID 25673 at Wed Oct 18 15:01:57 UTC 2023 kill -USR1 25673 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25673 killed at Wed Oct 18 15:01:57 UTC 2023 selfserv_9355 starting at Wed Oct 18 15:01:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:01:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:01:57 UTC 2023 selfserv_9355 with PID 25715 started at Wed Oct 18 15:01:57 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:01:58 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:01:58 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:01:59 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:01:59 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:00 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:00 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:00 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:01 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:01 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:02 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:02 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:03 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:03 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:04 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:04 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:05 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:05 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:05 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:06 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:06 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:07 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:07 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:08 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:08 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:08 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:09 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:10 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:10 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:10 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:11 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:11 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:12 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:12 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:13 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:13 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:13 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:14 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:14 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 15:02:15 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25715 at Wed Oct 18 15:02:15 UTC 2023 kill -USR1 25715 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25715 killed at Wed Oct 18 15:02:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:02:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:15 UTC 2023 selfserv_9355 with PID 26974 started at Wed Oct 18 15:02:15 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:15 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:16 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:16 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:17 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:17 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:18 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:18 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:19 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:19 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:20 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:20 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:20 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:21 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:22 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:22 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:23 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:23 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:24 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:24 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:25 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:25 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:25 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:26 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:26 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:27 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:27 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:28 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:29 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:29 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:30 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:30 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:30 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:31 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:31 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:32 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:32 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:33 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:33 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26974 found at Wed Oct 18 15:02:34 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26974 at Wed Oct 18 15:02:34 UTC 2023 kill -USR1 26974 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26974 killed at Wed Oct 18 15:02:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:02:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:02:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:34 UTC 2023 selfserv_9355 with PID 28248 started at Wed Oct 18 15:02:34 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:34 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:35 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:35 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:35 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:35 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:36 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:36 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:36 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:37 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:37 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:37 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:38 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:38 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:39 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:39 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:39 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:40 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:40 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:40 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:41 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:41 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:41 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:42 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:42 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:42 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:43 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:43 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:44 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:44 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:44 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:45 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:45 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:45 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:46 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:46 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:46 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:47 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:47 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28248 found at Wed Oct 18 15:02:47 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28248 at Wed Oct 18 15:02:47 UTC 2023 kill -USR1 28248 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28248 killed at Wed Oct 18 15:02:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:02:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:02:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:48 UTC 2023 selfserv_9355 with PID 29507 started at Wed Oct 18 15:02:48 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:48 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:48 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:49 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:49 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:50 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:50 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:51 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:51 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:52 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:52 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:52 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:53 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:53 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:54 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:55 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:55 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:55 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:56 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:56 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:57 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:57 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:57 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:58 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:58 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:59 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:02:59 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:00 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:01 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:01 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:01 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:02 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:02 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:03 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:03 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:03 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:04 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:04 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:05 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29507 found at Wed Oct 18 15:03:05 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29507 at Wed Oct 18 15:03:05 UTC 2023 kill -USR1 29507 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29507 killed at Wed Oct 18 15:03:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:03:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:05 UTC 2023 selfserv_9355 with PID 30765 started at Wed Oct 18 15:03:05 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:06 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:06 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:07 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:07 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:08 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:08 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:09 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:09 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:10 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:10 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:11 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:11 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:12 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:12 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:13 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:13 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:14 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:14 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:15 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:15 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:16 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:16 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:17 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:17 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:18 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:18 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:19 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:19 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:20 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:20 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:21 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:21 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:22 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:22 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:22 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:23 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:23 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:24 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30765 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30765 found at Wed Oct 18 15:03:24 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30765 at Wed Oct 18 15:03:24 UTC 2023 kill -USR1 30765 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30765 killed at Wed Oct 18 15:03:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:03:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:25 UTC 2023 selfserv_9355 with PID 32034 started at Wed Oct 18 15:03:25 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:25 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:25 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:26 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:26 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:26 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:27 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:27 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:27 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:28 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:28 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:28 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:29 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:29 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:30 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:30 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:30 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:31 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:31 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:31 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:32 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:32 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:32 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:33 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:33 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:33 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:34 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:34 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:35 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:35 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:35 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:36 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:36 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:36 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:37 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:37 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:37 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:38 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:38 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32034 found at Wed Oct 18 15:03:38 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32034 at Wed Oct 18 15:03:38 UTC 2023 kill -USR1 32034 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32034 killed at Wed Oct 18 15:03:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:03:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 866 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 866 found at Wed Oct 18 15:03:39 UTC 2023 selfserv_9355 with PID 866 started at Wed Oct 18 15:03:39 UTC 2023 trying to kill selfserv_9355 with PID 866 at Wed Oct 18 15:03:39 UTC 2023 kill -USR1 866 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 866 killed at Wed Oct 18 15:03:39 UTC 2023 selfserv_9355 starting at Wed Oct 18 15:03:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:39 UTC 2023 selfserv_9355 with PID 921 started at Wed Oct 18 15:03:39 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:39 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:40 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:40 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:41 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:41 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:41 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:42 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:42 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:43 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:43 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:44 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:44 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:44 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:45 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:45 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:46 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:46 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:46 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:47 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:47 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:48 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:48 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:49 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:49 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:49 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:50 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:50 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:51 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:51 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:52 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:52 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:52 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:53 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:53 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:54 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:54 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:54 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:55 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:55 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:56 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 921 found at Wed Oct 18 15:03:56 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 921 at Wed Oct 18 15:03:56 UTC 2023 kill -USR1 921 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 921 killed at Wed Oct 18 15:03:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:03:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:03:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:56 UTC 2023 selfserv_9355 with PID 2185 started at Wed Oct 18 15:03:56 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:57 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:57 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:58 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:58 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:59 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:03:59 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:00 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:00 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:01 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:01 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:01 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:02 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:02 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:03 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:04 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:04 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:05 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:05 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:06 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:06 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:06 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:07 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:07 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:08 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:08 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:09 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:10 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:10 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:11 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:11 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:11 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:12 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:12 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:13 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:13 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:14 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:14 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:15 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2185 found at Wed Oct 18 15:04:15 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2185 at Wed Oct 18 15:04:15 UTC 2023 kill -USR1 2185 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2185 killed at Wed Oct 18 15:04:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:04:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:04:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:15 UTC 2023 selfserv_9355 with PID 3443 started at Wed Oct 18 15:04:15 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:16 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:16 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:16 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:17 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:17 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:17 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:18 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:18 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:18 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:19 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:19 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:19 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:20 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:20 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:21 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:21 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:21 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:22 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:22 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:22 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:23 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:23 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:23 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:24 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:24 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:24 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:25 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:25 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:26 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:26 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:26 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:27 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:27 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:27 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:28 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:28 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:28 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:29 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3443 found at Wed Oct 18 15:04:29 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3443 at Wed Oct 18 15:04:29 UTC 2023 kill -USR1 3443 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3443 killed at Wed Oct 18 15:04:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:04:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:04:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:29 UTC 2023 selfserv_9355 with PID 4712 started at Wed Oct 18 15:04:29 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:30 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:30 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:30 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:31 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:31 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:32 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:32 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:33 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:33 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:34 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:34 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:34 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:35 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:36 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:36 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:37 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:37 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:37 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:38 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:38 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:39 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:39 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:39 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:40 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:40 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:41 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:42 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:42 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:42 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:43 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:43 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:44 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:44 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:45 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:45 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:45 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:46 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:46 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4712 found at Wed Oct 18 15:04:47 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4712 at Wed Oct 18 15:04:47 UTC 2023 kill -USR1 4712 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4712 killed at Wed Oct 18 15:04:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:04:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:04:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:47 UTC 2023 selfserv_9355 with PID 5970 started at Wed Oct 18 15:04:47 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:47 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:48 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:48 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:49 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:49 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:50 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:50 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:51 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:51 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:52 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:52 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:53 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:53 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:54 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:55 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:55 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:55 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:56 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:56 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:57 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:57 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:58 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:58 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:59 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:04:59 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:00 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:01 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:01 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:01 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:02 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:02 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:03 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:03 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:04 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:04 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:05 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:05 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:06 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5970 found at Wed Oct 18 15:05:06 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5970 at Wed Oct 18 15:05:06 UTC 2023 kill -USR1 5970 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5970 killed at Wed Oct 18 15:05:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:06 UTC 2023 selfserv_9355 with PID 7228 started at Wed Oct 18 15:05:06 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:07 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:07 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:07 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:08 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:08 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:08 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:09 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:09 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:09 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:10 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:10 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:10 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:11 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:11 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:12 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:12 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:12 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:13 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:13 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:13 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:14 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:14 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:14 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:15 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:15 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:15 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:16 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:16 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:17 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:17 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:17 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:18 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:18 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:18 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:19 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:19 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:19 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:20 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7228 found at Wed Oct 18 15:05:20 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7228 at Wed Oct 18 15:05:20 UTC 2023 kill -USR1 7228 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7228 killed at Wed Oct 18 15:05:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8493 found at Wed Oct 18 15:05:20 UTC 2023 selfserv_9355 with PID 8493 started at Wed Oct 18 15:05:20 UTC 2023 trying to kill selfserv_9355 with PID 8493 at Wed Oct 18 15:05:20 UTC 2023 kill -USR1 8493 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8493 killed at Wed Oct 18 15:05:20 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 8538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8538 found at Wed Oct 18 15:05:21 UTC 2023 selfserv_9355 with PID 8538 started at Wed Oct 18 15:05:21 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 8538 at Wed Oct 18 15:05:29 UTC 2023 kill -USR1 8538 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8538 killed at Wed Oct 18 15:05:29 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:05:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 9093 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9093 found at Wed Oct 18 15:05:29 UTC 2023 selfserv_9355 with PID 9093 started at Wed Oct 18 15:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9093 at Wed Oct 18 15:05:44 UTC 2023 kill -USR1 9093 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9093 killed at Wed Oct 18 15:05:44 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:05:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9892 found at Wed Oct 18 15:05:44 UTC 2023 selfserv_9355 with PID 9892 started at Wed Oct 18 15:05:44 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9892 at Wed Oct 18 15:05:44 UTC 2023 kill -USR1 9892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9892 killed at Wed Oct 18 15:05:44 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9958 found at Wed Oct 18 15:05:45 UTC 2023 selfserv_9355 with PID 9958 started at Wed Oct 18 15:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9958 at Wed Oct 18 15:05:45 UTC 2023 kill -USR1 9958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9958 killed at Wed Oct 18 15:05:45 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10011 found at Wed Oct 18 15:05:45 UTC 2023 selfserv_9355 with PID 10011 started at Wed Oct 18 15:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10011 at Wed Oct 18 15:05:46 UTC 2023 kill -USR1 10011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10011 killed at Wed Oct 18 15:05:46 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10063 found at Wed Oct 18 15:05:46 UTC 2023 selfserv_9355 with PID 10063 started at Wed Oct 18 15:05:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10063 at Wed Oct 18 15:05:46 UTC 2023 kill -USR1 10063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10063 killed at Wed Oct 18 15:05:46 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10115 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10115 found at Wed Oct 18 15:05:47 UTC 2023 selfserv_9355 with PID 10115 started at Wed Oct 18 15:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10115 at Wed Oct 18 15:05:47 UTC 2023 kill -USR1 10115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10115 killed at Wed Oct 18 15:05:47 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10167 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10167 found at Wed Oct 18 15:05:47 UTC 2023 selfserv_9355 with PID 10167 started at Wed Oct 18 15:05:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10167 at Wed Oct 18 15:05:48 UTC 2023 kill -USR1 10167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10167 killed at Wed Oct 18 15:05:48 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10219 found at Wed Oct 18 15:05:48 UTC 2023 selfserv_9355 with PID 10219 started at Wed Oct 18 15:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10219 at Wed Oct 18 15:05:48 UTC 2023 kill -USR1 10219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10219 killed at Wed Oct 18 15:05:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10271 found at Wed Oct 18 15:05:49 UTC 2023 selfserv_9355 with PID 10271 started at Wed Oct 18 15:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10271 at Wed Oct 18 15:05:49 UTC 2023 kill -USR1 10271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10271 killed at Wed Oct 18 15:05:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10323 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10323 found at Wed Oct 18 15:05:49 UTC 2023 selfserv_9355 with PID 10323 started at Wed Oct 18 15:05:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10323 at Wed Oct 18 15:05:50 UTC 2023 kill -USR1 10323 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10323 killed at Wed Oct 18 15:05:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10375 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10375 found at Wed Oct 18 15:05:50 UTC 2023 selfserv_9355 with PID 10375 started at Wed Oct 18 15:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10375 at Wed Oct 18 15:05:50 UTC 2023 kill -USR1 10375 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10375 killed at Wed Oct 18 15:05:50 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10427 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10427 found at Wed Oct 18 15:05:50 UTC 2023 selfserv_9355 with PID 10427 started at Wed Oct 18 15:05:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10427 at Wed Oct 18 15:05:51 UTC 2023 kill -USR1 10427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10427 killed at Wed Oct 18 15:05:51 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10479 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10479 found at Wed Oct 18 15:05:51 UTC 2023 selfserv_9355 with PID 10479 started at Wed Oct 18 15:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10479 at Wed Oct 18 15:05:51 UTC 2023 kill -USR1 10479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10479 killed at Wed Oct 18 15:05:51 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10533 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10533 found at Wed Oct 18 15:05:51 UTC 2023 selfserv_9355 with PID 10533 started at Wed Oct 18 15:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10533 at Wed Oct 18 15:05:52 UTC 2023 kill -USR1 10533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10533 killed at Wed Oct 18 15:05:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10585 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10585 found at Wed Oct 18 15:05:52 UTC 2023 selfserv_9355 with PID 10585 started at Wed Oct 18 15:05:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10585 at Wed Oct 18 15:05:53 UTC 2023 kill -USR1 10585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10585 killed at Wed Oct 18 15:05:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10638 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10638 found at Wed Oct 18 15:05:53 UTC 2023 selfserv_9355 with PID 10638 started at Wed Oct 18 15:05:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10638 at Wed Oct 18 15:05:53 UTC 2023 kill -USR1 10638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10638 killed at Wed Oct 18 15:05:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10690 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10690 found at Wed Oct 18 15:05:54 UTC 2023 selfserv_9355 with PID 10690 started at Wed Oct 18 15:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10690 at Wed Oct 18 15:05:54 UTC 2023 kill -USR1 10690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10690 killed at Wed Oct 18 15:05:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10742 found at Wed Oct 18 15:05:54 UTC 2023 selfserv_9355 with PID 10742 started at Wed Oct 18 15:05:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10742 at Wed Oct 18 15:05:55 UTC 2023 kill -USR1 10742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10742 killed at Wed Oct 18 15:05:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10794 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10794 found at Wed Oct 18 15:05:55 UTC 2023 selfserv_9355 with PID 10794 started at Wed Oct 18 15:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10794 at Wed Oct 18 15:05:56 UTC 2023 kill -USR1 10794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10794 killed at Wed Oct 18 15:05:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10846 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10846 found at Wed Oct 18 15:05:56 UTC 2023 selfserv_9355 with PID 10846 started at Wed Oct 18 15:05:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10846 at Wed Oct 18 15:05:56 UTC 2023 kill -USR1 10846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10846 killed at Wed Oct 18 15:05:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10898 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10898 found at Wed Oct 18 15:05:57 UTC 2023 selfserv_9355 with PID 10898 started at Wed Oct 18 15:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10898 at Wed Oct 18 15:05:57 UTC 2023 kill -USR1 10898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10898 killed at Wed Oct 18 15:05:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:05:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10950 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10950 found at Wed Oct 18 15:05:58 UTC 2023 selfserv_9355 with PID 10950 started at Wed Oct 18 15:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10950 at Wed Oct 18 15:05:58 UTC 2023 kill -USR1 10950 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10950 killed at Wed Oct 18 15:05:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11002 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11002 found at Wed Oct 18 15:05:58 UTC 2023 selfserv_9355 with PID 11002 started at Wed Oct 18 15:05:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11002 at Wed Oct 18 15:05:59 UTC 2023 kill -USR1 11002 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11002 killed at Wed Oct 18 15:05:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:05:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:05:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11054 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11054 found at Wed Oct 18 15:05:59 UTC 2023 selfserv_9355 with PID 11054 started at Wed Oct 18 15:05:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11054 at Wed Oct 18 15:06:00 UTC 2023 kill -USR1 11054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11054 killed at Wed Oct 18 15:06:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11106 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11106 found at Wed Oct 18 15:06:00 UTC 2023 selfserv_9355 with PID 11106 started at Wed Oct 18 15:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11106 at Wed Oct 18 15:06:00 UTC 2023 kill -USR1 11106 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11106 killed at Wed Oct 18 15:06:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11158 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11158 found at Wed Oct 18 15:06:01 UTC 2023 selfserv_9355 with PID 11158 started at Wed Oct 18 15:06:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11158 at Wed Oct 18 15:06:01 UTC 2023 kill -USR1 11158 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11158 killed at Wed Oct 18 15:06:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11210 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11210 found at Wed Oct 18 15:06:01 UTC 2023 selfserv_9355 with PID 11210 started at Wed Oct 18 15:06:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11210 at Wed Oct 18 15:06:02 UTC 2023 kill -USR1 11210 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11210 killed at Wed Oct 18 15:06:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11262 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11262 found at Wed Oct 18 15:06:02 UTC 2023 selfserv_9355 with PID 11262 started at Wed Oct 18 15:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11262 at Wed Oct 18 15:06:02 UTC 2023 kill -USR1 11262 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11262 killed at Wed Oct 18 15:06:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11314 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11314 found at Wed Oct 18 15:06:03 UTC 2023 selfserv_9355 with PID 11314 started at Wed Oct 18 15:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11314 at Wed Oct 18 15:06:03 UTC 2023 kill -USR1 11314 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11314 killed at Wed Oct 18 15:06:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11366 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11366 found at Wed Oct 18 15:06:03 UTC 2023 selfserv_9355 with PID 11366 started at Wed Oct 18 15:06:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11366 at Wed Oct 18 15:06:04 UTC 2023 kill -USR1 11366 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11366 killed at Wed Oct 18 15:06:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11418 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11418 found at Wed Oct 18 15:06:04 UTC 2023 selfserv_9355 with PID 11418 started at Wed Oct 18 15:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11418 at Wed Oct 18 15:06:04 UTC 2023 kill -USR1 11418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11418 killed at Wed Oct 18 15:06:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11470 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11470 found at Wed Oct 18 15:06:04 UTC 2023 selfserv_9355 with PID 11470 started at Wed Oct 18 15:06:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11470 at Wed Oct 18 15:06:05 UTC 2023 kill -USR1 11470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11470 killed at Wed Oct 18 15:06:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11522 found at Wed Oct 18 15:06:05 UTC 2023 selfserv_9355 with PID 11522 started at Wed Oct 18 15:06:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11522 at Wed Oct 18 15:06:05 UTC 2023 kill -USR1 11522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11522 killed at Wed Oct 18 15:06:05 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11574 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11574 found at Wed Oct 18 15:06:06 UTC 2023 selfserv_9355 with PID 11574 started at Wed Oct 18 15:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11574 at Wed Oct 18 15:06:06 UTC 2023 kill -USR1 11574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11574 killed at Wed Oct 18 15:06:06 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11626 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11626 found at Wed Oct 18 15:06:06 UTC 2023 selfserv_9355 with PID 11626 started at Wed Oct 18 15:06:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11626 at Wed Oct 18 15:06:07 UTC 2023 kill -USR1 11626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11626 killed at Wed Oct 18 15:06:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11678 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11678 found at Wed Oct 18 15:06:07 UTC 2023 selfserv_9355 with PID 11678 started at Wed Oct 18 15:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11678 at Wed Oct 18 15:06:07 UTC 2023 kill -USR1 11678 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11678 killed at Wed Oct 18 15:06:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11730 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11730 found at Wed Oct 18 15:06:07 UTC 2023 selfserv_9355 with PID 11730 started at Wed Oct 18 15:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11730 at Wed Oct 18 15:06:08 UTC 2023 kill -USR1 11730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11730 killed at Wed Oct 18 15:06:08 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11782 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11782 found at Wed Oct 18 15:06:08 UTC 2023 selfserv_9355 with PID 11782 started at Wed Oct 18 15:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11782 at Wed Oct 18 15:06:08 UTC 2023 kill -USR1 11782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11782 killed at Wed Oct 18 15:06:08 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11834 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11834 found at Wed Oct 18 15:06:09 UTC 2023 selfserv_9355 with PID 11834 started at Wed Oct 18 15:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11834 at Wed Oct 18 15:06:09 UTC 2023 kill -USR1 11834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11834 killed at Wed Oct 18 15:06:09 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11886 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11886 found at Wed Oct 18 15:06:09 UTC 2023 selfserv_9355 with PID 11886 started at Wed Oct 18 15:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11886 at Wed Oct 18 15:06:10 UTC 2023 kill -USR1 11886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11886 killed at Wed Oct 18 15:06:10 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11938 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11938 found at Wed Oct 18 15:06:10 UTC 2023 selfserv_9355 with PID 11938 started at Wed Oct 18 15:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11938 at Wed Oct 18 15:06:10 UTC 2023 kill -USR1 11938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11938 killed at Wed Oct 18 15:06:10 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11990 found at Wed Oct 18 15:06:10 UTC 2023 selfserv_9355 with PID 11990 started at Wed Oct 18 15:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11990 at Wed Oct 18 15:06:11 UTC 2023 kill -USR1 11990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11990 killed at Wed Oct 18 15:06:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12042 found at Wed Oct 18 15:06:11 UTC 2023 selfserv_9355 with PID 12042 started at Wed Oct 18 15:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12042 at Wed Oct 18 15:06:11 UTC 2023 kill -USR1 12042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12042 killed at Wed Oct 18 15:06:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12094 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12094 found at Wed Oct 18 15:06:12 UTC 2023 selfserv_9355 with PID 12094 started at Wed Oct 18 15:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12094 at Wed Oct 18 15:06:12 UTC 2023 kill -USR1 12094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12094 killed at Wed Oct 18 15:06:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12146 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12146 found at Wed Oct 18 15:06:12 UTC 2023 selfserv_9355 with PID 12146 started at Wed Oct 18 15:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12146 at Wed Oct 18 15:06:12 UTC 2023 kill -USR1 12146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12146 killed at Wed Oct 18 15:06:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12198 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12198 found at Wed Oct 18 15:06:13 UTC 2023 selfserv_9355 with PID 12198 started at Wed Oct 18 15:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12198 at Wed Oct 18 15:06:13 UTC 2023 kill -USR1 12198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12198 killed at Wed Oct 18 15:06:13 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12250 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12250 found at Wed Oct 18 15:06:13 UTC 2023 selfserv_9355 with PID 12250 started at Wed Oct 18 15:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12250 at Wed Oct 18 15:06:14 UTC 2023 kill -USR1 12250 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12250 killed at Wed Oct 18 15:06:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12302 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12302 found at Wed Oct 18 15:06:14 UTC 2023 selfserv_9355 with PID 12302 started at Wed Oct 18 15:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12302 at Wed Oct 18 15:06:14 UTC 2023 kill -USR1 12302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12302 killed at Wed Oct 18 15:06:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12354 found at Wed Oct 18 15:06:15 UTC 2023 selfserv_9355 with PID 12354 started at Wed Oct 18 15:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12354 at Wed Oct 18 15:06:15 UTC 2023 kill -USR1 12354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12354 killed at Wed Oct 18 15:06:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12406 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12406 found at Wed Oct 18 15:06:15 UTC 2023 selfserv_9355 with PID 12406 started at Wed Oct 18 15:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12406 at Wed Oct 18 15:06:16 UTC 2023 kill -USR1 12406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12406 killed at Wed Oct 18 15:06:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12458 found at Wed Oct 18 15:06:16 UTC 2023 selfserv_9355 with PID 12458 started at Wed Oct 18 15:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12458 at Wed Oct 18 15:06:17 UTC 2023 kill -USR1 12458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12458 killed at Wed Oct 18 15:06:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12513 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12513 found at Wed Oct 18 15:06:17 UTC 2023 selfserv_9355 with PID 12513 started at Wed Oct 18 15:06:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12513 at Wed Oct 18 15:06:17 UTC 2023 kill -USR1 12513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12513 killed at Wed Oct 18 15:06:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12566 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12566 found at Wed Oct 18 15:06:18 UTC 2023 selfserv_9355 with PID 12566 started at Wed Oct 18 15:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12566 at Wed Oct 18 15:06:18 UTC 2023 kill -USR1 12566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12566 killed at Wed Oct 18 15:06:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12618 found at Wed Oct 18 15:06:18 UTC 2023 selfserv_9355 with PID 12618 started at Wed Oct 18 15:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12618 at Wed Oct 18 15:06:19 UTC 2023 kill -USR1 12618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12618 killed at Wed Oct 18 15:06:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12671 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12671 found at Wed Oct 18 15:06:19 UTC 2023 selfserv_9355 with PID 12671 started at Wed Oct 18 15:06:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12671 at Wed Oct 18 15:06:20 UTC 2023 kill -USR1 12671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12671 killed at Wed Oct 18 15:06:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12723 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12723 found at Wed Oct 18 15:06:20 UTC 2023 selfserv_9355 with PID 12723 started at Wed Oct 18 15:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12723 at Wed Oct 18 15:06:20 UTC 2023 kill -USR1 12723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12723 killed at Wed Oct 18 15:06:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:06:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12775 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12775 found at Wed Oct 18 15:06:20 UTC 2023 selfserv_9355 with PID 12775 started at Wed Oct 18 15:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12775 at Wed Oct 18 15:06:21 UTC 2023 kill -USR1 12775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12775 killed at Wed Oct 18 15:06:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12827 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12827 found at Wed Oct 18 15:06:21 UTC 2023 selfserv_9355 with PID 12827 started at Wed Oct 18 15:06:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12827 at Wed Oct 18 15:06:21 UTC 2023 kill -USR1 12827 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12827 killed at Wed Oct 18 15:06:21 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12881 found at Wed Oct 18 15:06:22 UTC 2023 selfserv_9355 with PID 12881 started at Wed Oct 18 15:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12881 at Wed Oct 18 15:06:22 UTC 2023 kill -USR1 12881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12881 killed at Wed Oct 18 15:06:22 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:06:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12933 found at Wed Oct 18 15:06:22 UTC 2023 selfserv_9355 with PID 12933 started at Wed Oct 18 15:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12933 at Wed Oct 18 15:06:23 UTC 2023 kill -USR1 12933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12933 killed at Wed Oct 18 15:06:23 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:06:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12993 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12993 found at Wed Oct 18 15:06:23 UTC 2023 selfserv_9355 with PID 12993 started at Wed Oct 18 15:06:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12993 at Wed Oct 18 15:06:23 UTC 2023 kill -USR1 12993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12993 killed at Wed Oct 18 15:06:23 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:06:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13051 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13051 found at Wed Oct 18 15:06:24 UTC 2023 selfserv_9355 with PID 13051 started at Wed Oct 18 15:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13051 at Wed Oct 18 15:06:24 UTC 2023 kill -USR1 13051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13051 killed at Wed Oct 18 15:06:24 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:06:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13109 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13109 found at Wed Oct 18 15:06:24 UTC 2023 selfserv_9355 with PID 13109 started at Wed Oct 18 15:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13109 at Wed Oct 18 15:06:24 UTC 2023 kill -USR1 13109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13109 killed at Wed Oct 18 15:06:24 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:06:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13169 found at Wed Oct 18 15:06:25 UTC 2023 selfserv_9355 with PID 13169 started at Wed Oct 18 15:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13169 at Wed Oct 18 15:06:25 UTC 2023 kill -USR1 13169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13169 killed at Wed Oct 18 15:06:25 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 15:06:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13227 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13227 found at Wed Oct 18 15:06:25 UTC 2023 selfserv_9355 with PID 13227 started at Wed Oct 18 15:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13227 at Wed Oct 18 15:06:25 UTC 2023 kill -USR1 13227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13227 killed at Wed Oct 18 15:06:25 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:06:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13285 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13285 found at Wed Oct 18 15:06:26 UTC 2023 selfserv_9355 with PID 13285 started at Wed Oct 18 15:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13285 at Wed Oct 18 15:06:26 UTC 2023 kill -USR1 13285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13285 killed at Wed Oct 18 15:06:26 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:06:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13343 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13343 found at Wed Oct 18 15:06:26 UTC 2023 selfserv_9355 with PID 13343 started at Wed Oct 18 15:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13343 at Wed Oct 18 15:06:26 UTC 2023 kill -USR1 13343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13343 killed at Wed Oct 18 15:06:26 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:06:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13401 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13401 found at Wed Oct 18 15:06:27 UTC 2023 selfserv_9355 with PID 13401 started at Wed Oct 18 15:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13401 at Wed Oct 18 15:06:27 UTC 2023 kill -USR1 13401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13401 killed at Wed Oct 18 15:06:27 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:06:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13459 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13459 found at Wed Oct 18 15:06:27 UTC 2023 selfserv_9355 with PID 13459 started at Wed Oct 18 15:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13459 at Wed Oct 18 15:06:27 UTC 2023 kill -USR1 13459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13459 killed at Wed Oct 18 15:06:27 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:06:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13517 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13517 found at Wed Oct 18 15:06:27 UTC 2023 selfserv_9355 with PID 13517 started at Wed Oct 18 15:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13517 at Wed Oct 18 15:06:28 UTC 2023 kill -USR1 13517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13517 killed at Wed Oct 18 15:06:28 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 15:06:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13559 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13559 found at Wed Oct 18 15:06:28 UTC 2023 selfserv_9355 with PID 13559 started at Wed Oct 18 15:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13559 at Wed Oct 18 15:06:28 UTC 2023 kill -USR1 13559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13559 killed at Wed Oct 18 15:06:28 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 15:06:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13601 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13601 found at Wed Oct 18 15:06:28 UTC 2023 selfserv_9355 with PID 13601 started at Wed Oct 18 15:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 13601 at Wed Oct 18 15:06:29 UTC 2023 kill -USR1 13601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13601 killed at Wed Oct 18 15:06:29 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 15:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13643 found at Wed Oct 18 15:06:29 UTC 2023 selfserv_9355 with PID 13643 started at Wed Oct 18 15:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 13643 at Wed Oct 18 15:06:29 UTC 2023 kill -USR1 13643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13643 killed at Wed Oct 18 15:06:29 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 15:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13685 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13685 found at Wed Oct 18 15:06:29 UTC 2023 selfserv_9355 with PID 13685 started at Wed Oct 18 15:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 13685 at Wed Oct 18 15:06:29 UTC 2023 kill -USR1 13685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13685 killed at Wed Oct 18 15:06:29 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 15:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13727 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13727 found at Wed Oct 18 15:06:30 UTC 2023 selfserv_9355 with PID 13727 started at Wed Oct 18 15:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 13727 at Wed Oct 18 15:06:30 UTC 2023 kill -USR1 13727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13727 killed at Wed Oct 18 15:06:30 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 15:06:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13769 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13769 found at Wed Oct 18 15:06:30 UTC 2023 selfserv_9355 with PID 13769 started at Wed Oct 18 15:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 13769 at Wed Oct 18 15:06:30 UTC 2023 kill -USR1 13769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13769 killed at Wed Oct 18 15:06:30 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 15:06:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13811 found at Wed Oct 18 15:06:30 UTC 2023 selfserv_9355 with PID 13811 started at Wed Oct 18 15:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 13811 at Wed Oct 18 15:06:30 UTC 2023 kill -USR1 13811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13811 killed at Wed Oct 18 15:06:31 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 15:06:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:06:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13853 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13853 found at Wed Oct 18 15:06:31 UTC 2023 selfserv_9355 with PID 13853 started at Wed Oct 18 15:06:31 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:06:31 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:07:08 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 13853 at Wed Oct 18 15:07:08 UTC 2023 kill -USR1 13853 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13853 killed at Wed Oct 18 15:07:08 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:07:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13904 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13904 found at Wed Oct 18 15:07:08 UTC 2023 selfserv_9355 with PID 13904 started at Wed Oct 18 15:07:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13904 at Wed Oct 18 15:07:08 UTC 2023 kill -USR1 13904 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13904 killed at Wed Oct 18 15:07:09 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13946 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13946 found at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 with PID 13946 started at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13946 at Wed Oct 18 15:07:09 UTC 2023 kill -USR1 13946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13946 killed at Wed Oct 18 15:07:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13985 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13985 found at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 with PID 13985 started at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13985 at Wed Oct 18 15:07:09 UTC 2023 kill -USR1 13985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13985 killed at Wed Oct 18 15:07:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14024 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14024 found at Wed Oct 18 15:07:09 UTC 2023 selfserv_9355 with PID 14024 started at Wed Oct 18 15:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14024 at Wed Oct 18 15:07:10 UTC 2023 kill -USR1 14024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14024 killed at Wed Oct 18 15:07:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14063 found at Wed Oct 18 15:07:10 UTC 2023 selfserv_9355 with PID 14063 started at Wed Oct 18 15:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14063 at Wed Oct 18 15:07:10 UTC 2023 kill -USR1 14063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14063 killed at Wed Oct 18 15:07:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14102 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14102 found at Wed Oct 18 15:07:10 UTC 2023 selfserv_9355 with PID 14102 started at Wed Oct 18 15:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14102 at Wed Oct 18 15:07:10 UTC 2023 kill -USR1 14102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14102 killed at Wed Oct 18 15:07:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14141 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14141 found at Wed Oct 18 15:07:11 UTC 2023 selfserv_9355 with PID 14141 started at Wed Oct 18 15:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14141 at Wed Oct 18 15:07:11 UTC 2023 kill -USR1 14141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14141 killed at Wed Oct 18 15:07:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14180 found at Wed Oct 18 15:07:11 UTC 2023 selfserv_9355 with PID 14180 started at Wed Oct 18 15:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14180 at Wed Oct 18 15:07:11 UTC 2023 kill -USR1 14180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14180 killed at Wed Oct 18 15:07:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14219 found at Wed Oct 18 15:07:11 UTC 2023 selfserv_9355 with PID 14219 started at Wed Oct 18 15:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14219 at Wed Oct 18 15:07:12 UTC 2023 kill -USR1 14219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14219 killed at Wed Oct 18 15:07:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14258 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14258 found at Wed Oct 18 15:07:12 UTC 2023 selfserv_9355 with PID 14258 started at Wed Oct 18 15:07:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14258 at Wed Oct 18 15:07:12 UTC 2023 kill -USR1 14258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14258 killed at Wed Oct 18 15:07:12 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14297 found at Wed Oct 18 15:07:12 UTC 2023 selfserv_9355 with PID 14297 started at Wed Oct 18 15:07:12 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14297 at Wed Oct 18 15:07:12 UTC 2023 kill -USR1 14297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14297 killed at Wed Oct 18 15:07:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14337 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14337 found at Wed Oct 18 15:07:13 UTC 2023 selfserv_9355 with PID 14337 started at Wed Oct 18 15:07:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14337 at Wed Oct 18 15:07:13 UTC 2023 kill -USR1 14337 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14337 killed at Wed Oct 18 15:07:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14377 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14377 found at Wed Oct 18 15:07:13 UTC 2023 selfserv_9355 with PID 14377 started at Wed Oct 18 15:07:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14377 at Wed Oct 18 15:07:13 UTC 2023 kill -USR1 14377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14377 killed at Wed Oct 18 15:07:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14417 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14417 found at Wed Oct 18 15:07:13 UTC 2023 selfserv_9355 with PID 14417 started at Wed Oct 18 15:07:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14417 at Wed Oct 18 15:07:13 UTC 2023 kill -USR1 14417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14417 killed at Wed Oct 18 15:07:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14457 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14457 found at Wed Oct 18 15:07:14 UTC 2023 selfserv_9355 with PID 14457 started at Wed Oct 18 15:07:14 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14457 at Wed Oct 18 15:07:14 UTC 2023 kill -USR1 14457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14457 killed at Wed Oct 18 15:07:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14497 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14497 found at Wed Oct 18 15:07:14 UTC 2023 selfserv_9355 with PID 14497 started at Wed Oct 18 15:07:14 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14497 at Wed Oct 18 15:07:14 UTC 2023 kill -USR1 14497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14497 killed at Wed Oct 18 15:07:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14537 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14537 found at Wed Oct 18 15:07:15 UTC 2023 selfserv_9355 with PID 14537 started at Wed Oct 18 15:07:15 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14537 at Wed Oct 18 15:07:15 UTC 2023 kill -USR1 14537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14537 killed at Wed Oct 18 15:07:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14577 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14577 found at Wed Oct 18 15:07:15 UTC 2023 selfserv_9355 with PID 14577 started at Wed Oct 18 15:07:15 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14577 at Wed Oct 18 15:07:15 UTC 2023 kill -USR1 14577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14577 killed at Wed Oct 18 15:07:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:07:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14620 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14620 found at Wed Oct 18 15:07:15 UTC 2023 selfserv_9355 with PID 14620 started at Wed Oct 18 15:07:15 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14620 at Wed Oct 18 15:07:16 UTC 2023 kill -USR1 14620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14620 killed at Wed Oct 18 15:07:16 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:07:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 14660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14660 found at Wed Oct 18 15:07:16 UTC 2023 selfserv: About to call accept. selfserv_9355 with PID 14660 started at Wed Oct 18 15:07:16 UTC 2023 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 14660 at Wed Oct 18 15:07:24 UTC 2023 kill -USR1 14660 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14660 killed at Wed Oct 18 15:07:24 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:07:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 15218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15218 found at Wed Oct 18 15:07:24 UTC 2023 selfserv_9355 with PID 15218 started at Wed Oct 18 15:07:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15218 at Wed Oct 18 15:07:37 UTC 2023 kill -USR1 15218 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15218 killed at Wed Oct 18 15:07:37 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16030 found at Wed Oct 18 15:07:37 UTC 2023 selfserv_9355 with PID 16030 started at Wed Oct 18 15:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16030 at Wed Oct 18 15:07:37 UTC 2023 kill -USR1 16030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16030 killed at Wed Oct 18 15:07:37 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16082 found at Wed Oct 18 15:07:38 UTC 2023 selfserv_9355 with PID 16082 started at Wed Oct 18 15:07:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16082 at Wed Oct 18 15:07:38 UTC 2023 kill -USR1 16082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16082 killed at Wed Oct 18 15:07:38 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16134 found at Wed Oct 18 15:07:38 UTC 2023 selfserv_9355 with PID 16134 started at Wed Oct 18 15:07:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16134 at Wed Oct 18 15:07:38 UTC 2023 kill -USR1 16134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16134 killed at Wed Oct 18 15:07:38 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16186 found at Wed Oct 18 15:07:39 UTC 2023 selfserv_9355 with PID 16186 started at Wed Oct 18 15:07:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16186 at Wed Oct 18 15:07:39 UTC 2023 kill -USR1 16186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16186 killed at Wed Oct 18 15:07:39 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16238 found at Wed Oct 18 15:07:39 UTC 2023 selfserv_9355 with PID 16238 started at Wed Oct 18 15:07:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16238 at Wed Oct 18 15:07:39 UTC 2023 kill -USR1 16238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16238 killed at Wed Oct 18 15:07:39 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16290 found at Wed Oct 18 15:07:40 UTC 2023 selfserv_9355 with PID 16290 started at Wed Oct 18 15:07:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16290 at Wed Oct 18 15:07:40 UTC 2023 kill -USR1 16290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16290 killed at Wed Oct 18 15:07:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16342 found at Wed Oct 18 15:07:40 UTC 2023 selfserv_9355 with PID 16342 started at Wed Oct 18 15:07:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16342 at Wed Oct 18 15:07:40 UTC 2023 kill -USR1 16342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16342 killed at Wed Oct 18 15:07:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16394 found at Wed Oct 18 15:07:41 UTC 2023 selfserv_9355 with PID 16394 started at Wed Oct 18 15:07:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16394 at Wed Oct 18 15:07:41 UTC 2023 kill -USR1 16394 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16394 killed at Wed Oct 18 15:07:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16446 found at Wed Oct 18 15:07:41 UTC 2023 selfserv_9355 with PID 16446 started at Wed Oct 18 15:07:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16446 at Wed Oct 18 15:07:41 UTC 2023 kill -USR1 16446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16446 killed at Wed Oct 18 15:07:42 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16498 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16498 found at Wed Oct 18 15:07:42 UTC 2023 selfserv_9355 with PID 16498 started at Wed Oct 18 15:07:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16498 at Wed Oct 18 15:07:42 UTC 2023 kill -USR1 16498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16498 killed at Wed Oct 18 15:07:42 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16550 found at Wed Oct 18 15:07:42 UTC 2023 selfserv_9355 with PID 16550 started at Wed Oct 18 15:07:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16550 at Wed Oct 18 15:07:42 UTC 2023 kill -USR1 16550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16550 killed at Wed Oct 18 15:07:43 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16602 found at Wed Oct 18 15:07:43 UTC 2023 selfserv_9355 with PID 16602 started at Wed Oct 18 15:07:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16602 at Wed Oct 18 15:07:43 UTC 2023 kill -USR1 16602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16602 killed at Wed Oct 18 15:07:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16654 found at Wed Oct 18 15:07:43 UTC 2023 selfserv_9355 with PID 16654 started at Wed Oct 18 15:07:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16654 at Wed Oct 18 15:07:44 UTC 2023 kill -USR1 16654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16654 killed at Wed Oct 18 15:07:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16707 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16707 found at Wed Oct 18 15:07:44 UTC 2023 selfserv_9355 with PID 16707 started at Wed Oct 18 15:07:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16707 at Wed Oct 18 15:07:44 UTC 2023 kill -USR1 16707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16707 killed at Wed Oct 18 15:07:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16759 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16759 found at Wed Oct 18 15:07:44 UTC 2023 selfserv_9355 with PID 16759 started at Wed Oct 18 15:07:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16759 at Wed Oct 18 15:07:45 UTC 2023 kill -USR1 16759 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16759 killed at Wed Oct 18 15:07:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16811 found at Wed Oct 18 15:07:45 UTC 2023 selfserv_9355 with PID 16811 started at Wed Oct 18 15:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16811 at Wed Oct 18 15:07:45 UTC 2023 kill -USR1 16811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16811 killed at Wed Oct 18 15:07:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16863 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16863 found at Wed Oct 18 15:07:45 UTC 2023 selfserv_9355 with PID 16863 started at Wed Oct 18 15:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16863 at Wed Oct 18 15:07:46 UTC 2023 kill -USR1 16863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16863 killed at Wed Oct 18 15:07:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16915 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16915 found at Wed Oct 18 15:07:46 UTC 2023 selfserv_9355 with PID 16915 started at Wed Oct 18 15:07:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16915 at Wed Oct 18 15:07:46 UTC 2023 kill -USR1 16915 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16915 killed at Wed Oct 18 15:07:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16967 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16967 found at Wed Oct 18 15:07:46 UTC 2023 selfserv_9355 with PID 16967 started at Wed Oct 18 15:07:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16967 at Wed Oct 18 15:07:47 UTC 2023 kill -USR1 16967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16967 killed at Wed Oct 18 15:07:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17019 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17019 found at Wed Oct 18 15:07:47 UTC 2023 selfserv_9355 with PID 17019 started at Wed Oct 18 15:07:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17019 at Wed Oct 18 15:07:47 UTC 2023 kill -USR1 17019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17019 killed at Wed Oct 18 15:07:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17071 found at Wed Oct 18 15:07:48 UTC 2023 selfserv_9355 with PID 17071 started at Wed Oct 18 15:07:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17071 at Wed Oct 18 15:07:48 UTC 2023 kill -USR1 17071 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17071 killed at Wed Oct 18 15:07:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17123 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17123 found at Wed Oct 18 15:07:48 UTC 2023 selfserv_9355 with PID 17123 started at Wed Oct 18 15:07:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17123 at Wed Oct 18 15:07:48 UTC 2023 kill -USR1 17123 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17123 killed at Wed Oct 18 15:07:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17175 found at Wed Oct 18 15:07:49 UTC 2023 selfserv_9355 with PID 17175 started at Wed Oct 18 15:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17175 at Wed Oct 18 15:07:49 UTC 2023 kill -USR1 17175 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17175 killed at Wed Oct 18 15:07:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17227 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17227 found at Wed Oct 18 15:07:49 UTC 2023 selfserv_9355 with PID 17227 started at Wed Oct 18 15:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17227 at Wed Oct 18 15:07:49 UTC 2023 kill -USR1 17227 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17227 killed at Wed Oct 18 15:07:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17279 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17279 found at Wed Oct 18 15:07:50 UTC 2023 selfserv_9355 with PID 17279 started at Wed Oct 18 15:07:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17279 at Wed Oct 18 15:07:50 UTC 2023 kill -USR1 17279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17279 killed at Wed Oct 18 15:07:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17331 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17331 found at Wed Oct 18 15:07:50 UTC 2023 selfserv_9355 with PID 17331 started at Wed Oct 18 15:07:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17331 at Wed Oct 18 15:07:51 UTC 2023 kill -USR1 17331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17331 killed at Wed Oct 18 15:07:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17383 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17383 found at Wed Oct 18 15:07:51 UTC 2023 selfserv_9355 with PID 17383 started at Wed Oct 18 15:07:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17383 at Wed Oct 18 15:07:51 UTC 2023 kill -USR1 17383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17383 killed at Wed Oct 18 15:07:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17435 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17435 found at Wed Oct 18 15:07:52 UTC 2023 selfserv_9355 with PID 17435 started at Wed Oct 18 15:07:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17435 at Wed Oct 18 15:07:52 UTC 2023 kill -USR1 17435 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17435 killed at Wed Oct 18 15:07:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17487 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17487 found at Wed Oct 18 15:07:52 UTC 2023 selfserv_9355 with PID 17487 started at Wed Oct 18 15:07:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17487 at Wed Oct 18 15:07:52 UTC 2023 kill -USR1 17487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17487 killed at Wed Oct 18 15:07:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17539 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17539 found at Wed Oct 18 15:07:53 UTC 2023 selfserv_9355 with PID 17539 started at Wed Oct 18 15:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17539 at Wed Oct 18 15:07:53 UTC 2023 kill -USR1 17539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17539 killed at Wed Oct 18 15:07:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17591 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17591 found at Wed Oct 18 15:07:53 UTC 2023 selfserv_9355 with PID 17591 started at Wed Oct 18 15:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17591 at Wed Oct 18 15:07:54 UTC 2023 kill -USR1 17591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17591 killed at Wed Oct 18 15:07:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17643 found at Wed Oct 18 15:07:54 UTC 2023 selfserv_9355 with PID 17643 started at Wed Oct 18 15:07:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17643 at Wed Oct 18 15:07:54 UTC 2023 kill -USR1 17643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17643 killed at Wed Oct 18 15:07:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17695 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17695 found at Wed Oct 18 15:07:55 UTC 2023 selfserv_9355 with PID 17695 started at Wed Oct 18 15:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17695 at Wed Oct 18 15:07:55 UTC 2023 kill -USR1 17695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17695 killed at Wed Oct 18 15:07:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17747 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17747 found at Wed Oct 18 15:07:55 UTC 2023 selfserv_9355 with PID 17747 started at Wed Oct 18 15:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17747 at Wed Oct 18 15:07:55 UTC 2023 kill -USR1 17747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17747 killed at Wed Oct 18 15:07:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17799 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17799 found at Wed Oct 18 15:07:56 UTC 2023 selfserv_9355 with PID 17799 started at Wed Oct 18 15:07:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17799 at Wed Oct 18 15:07:56 UTC 2023 kill -USR1 17799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17799 killed at Wed Oct 18 15:07:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17851 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17851 found at Wed Oct 18 15:07:56 UTC 2023 selfserv_9355 with PID 17851 started at Wed Oct 18 15:07:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17851 at Wed Oct 18 15:07:56 UTC 2023 kill -USR1 17851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17851 killed at Wed Oct 18 15:07:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17903 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17903 found at Wed Oct 18 15:07:57 UTC 2023 selfserv_9355 with PID 17903 started at Wed Oct 18 15:07:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17903 at Wed Oct 18 15:07:57 UTC 2023 kill -USR1 17903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17903 killed at Wed Oct 18 15:07:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17955 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17955 found at Wed Oct 18 15:07:57 UTC 2023 selfserv_9355 with PID 17955 started at Wed Oct 18 15:07:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17955 at Wed Oct 18 15:07:57 UTC 2023 kill -USR1 17955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17955 killed at Wed Oct 18 15:07:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18007 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18007 found at Wed Oct 18 15:07:58 UTC 2023 selfserv_9355 with PID 18007 started at Wed Oct 18 15:07:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18007 at Wed Oct 18 15:07:58 UTC 2023 kill -USR1 18007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18007 killed at Wed Oct 18 15:07:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18059 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18059 found at Wed Oct 18 15:07:58 UTC 2023 selfserv_9355 with PID 18059 started at Wed Oct 18 15:07:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18059 at Wed Oct 18 15:07:58 UTC 2023 kill -USR1 18059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18059 killed at Wed Oct 18 15:07:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:07:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18111 found at Wed Oct 18 15:07:59 UTC 2023 selfserv_9355 with PID 18111 started at Wed Oct 18 15:07:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18111 at Wed Oct 18 15:07:59 UTC 2023 kill -USR1 18111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18111 killed at Wed Oct 18 15:07:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:07:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:07:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18163 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18163 found at Wed Oct 18 15:07:59 UTC 2023 selfserv_9355 with PID 18163 started at Wed Oct 18 15:07:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18163 at Wed Oct 18 15:07:59 UTC 2023 kill -USR1 18163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18163 killed at Wed Oct 18 15:08:00 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18215 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18215 found at Wed Oct 18 15:08:00 UTC 2023 selfserv_9355 with PID 18215 started at Wed Oct 18 15:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18215 at Wed Oct 18 15:08:00 UTC 2023 kill -USR1 18215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18215 killed at Wed Oct 18 15:08:00 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18267 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18267 found at Wed Oct 18 15:08:00 UTC 2023 selfserv_9355 with PID 18267 started at Wed Oct 18 15:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18267 at Wed Oct 18 15:08:00 UTC 2023 kill -USR1 18267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18267 killed at Wed Oct 18 15:08:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18319 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18319 found at Wed Oct 18 15:08:01 UTC 2023 selfserv_9355 with PID 18319 started at Wed Oct 18 15:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18319 at Wed Oct 18 15:08:01 UTC 2023 kill -USR1 18319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18319 killed at Wed Oct 18 15:08:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18371 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18371 found at Wed Oct 18 15:08:01 UTC 2023 selfserv_9355 with PID 18371 started at Wed Oct 18 15:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18371 at Wed Oct 18 15:08:01 UTC 2023 kill -USR1 18371 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18371 killed at Wed Oct 18 15:08:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18423 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18423 found at Wed Oct 18 15:08:02 UTC 2023 selfserv_9355 with PID 18423 started at Wed Oct 18 15:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18423 at Wed Oct 18 15:08:02 UTC 2023 kill -USR1 18423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18423 killed at Wed Oct 18 15:08:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18475 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18475 found at Wed Oct 18 15:08:02 UTC 2023 selfserv_9355 with PID 18475 started at Wed Oct 18 15:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18475 at Wed Oct 18 15:08:02 UTC 2023 kill -USR1 18475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18475 killed at Wed Oct 18 15:08:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18528 found at Wed Oct 18 15:08:03 UTC 2023 selfserv_9355 with PID 18528 started at Wed Oct 18 15:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18528 at Wed Oct 18 15:08:03 UTC 2023 kill -USR1 18528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18528 killed at Wed Oct 18 15:08:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18581 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18581 found at Wed Oct 18 15:08:03 UTC 2023 selfserv_9355 with PID 18581 started at Wed Oct 18 15:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18581 at Wed Oct 18 15:08:04 UTC 2023 kill -USR1 18581 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18581 killed at Wed Oct 18 15:08:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18634 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18634 found at Wed Oct 18 15:08:04 UTC 2023 selfserv_9355 with PID 18634 started at Wed Oct 18 15:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18634 at Wed Oct 18 15:08:04 UTC 2023 kill -USR1 18634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18634 killed at Wed Oct 18 15:08:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18686 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18686 found at Wed Oct 18 15:08:04 UTC 2023 selfserv_9355 with PID 18686 started at Wed Oct 18 15:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18686 at Wed Oct 18 15:08:05 UTC 2023 kill -USR1 18686 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18686 killed at Wed Oct 18 15:08:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18738 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18738 found at Wed Oct 18 15:08:05 UTC 2023 selfserv_9355 with PID 18738 started at Wed Oct 18 15:08:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18738 at Wed Oct 18 15:08:05 UTC 2023 kill -USR1 18738 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18738 killed at Wed Oct 18 15:08:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18790 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18790 found at Wed Oct 18 15:08:05 UTC 2023 selfserv_9355 with PID 18790 started at Wed Oct 18 15:08:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18790 at Wed Oct 18 15:08:06 UTC 2023 kill -USR1 18790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18790 killed at Wed Oct 18 15:08:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18842 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18842 found at Wed Oct 18 15:08:06 UTC 2023 selfserv_9355 with PID 18842 started at Wed Oct 18 15:08:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18842 at Wed Oct 18 15:08:06 UTC 2023 kill -USR1 18842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18842 killed at Wed Oct 18 15:08:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18894 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18894 found at Wed Oct 18 15:08:07 UTC 2023 selfserv_9355 with PID 18894 started at Wed Oct 18 15:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18894 at Wed Oct 18 15:08:07 UTC 2023 kill -USR1 18894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18894 killed at Wed Oct 18 15:08:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18946 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18946 found at Wed Oct 18 15:08:07 UTC 2023 selfserv_9355 with PID 18946 started at Wed Oct 18 15:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18946 at Wed Oct 18 15:08:08 UTC 2023 kill -USR1 18946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18946 killed at Wed Oct 18 15:08:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18998 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18998 found at Wed Oct 18 15:08:08 UTC 2023 selfserv_9355 with PID 18998 started at Wed Oct 18 15:08:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18998 at Wed Oct 18 15:08:08 UTC 2023 kill -USR1 18998 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18998 killed at Wed Oct 18 15:08:08 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:08:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19080 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19080 found at Wed Oct 18 15:08:09 UTC 2023 selfserv_9355 with PID 19080 started at Wed Oct 18 15:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19080 at Wed Oct 18 15:08:09 UTC 2023 kill -USR1 19080 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19080 killed at Wed Oct 18 15:08:09 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19122 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19122 found at Wed Oct 18 15:08:09 UTC 2023 selfserv_9355 with PID 19122 started at Wed Oct 18 15:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19122 at Wed Oct 18 15:08:09 UTC 2023 kill -USR1 19122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19122 killed at Wed Oct 18 15:08:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19161 found at Wed Oct 18 15:08:09 UTC 2023 selfserv_9355 with PID 19161 started at Wed Oct 18 15:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19161 at Wed Oct 18 15:08:09 UTC 2023 kill -USR1 19161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19161 killed at Wed Oct 18 15:08:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19200 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19200 found at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 with PID 19200 started at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19200 at Wed Oct 18 15:08:10 UTC 2023 kill -USR1 19200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19200 killed at Wed Oct 18 15:08:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19239 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19239 found at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 with PID 19239 started at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19239 at Wed Oct 18 15:08:10 UTC 2023 kill -USR1 19239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19239 killed at Wed Oct 18 15:08:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19278 found at Wed Oct 18 15:08:10 UTC 2023 selfserv_9355 with PID 19278 started at Wed Oct 18 15:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19278 at Wed Oct 18 15:08:11 UTC 2023 kill -USR1 19278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19278 killed at Wed Oct 18 15:08:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19318 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19318 found at Wed Oct 18 15:08:11 UTC 2023 selfserv_9355 with PID 19318 started at Wed Oct 18 15:08:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19318 at Wed Oct 18 15:08:11 UTC 2023 kill -USR1 19318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19318 killed at Wed Oct 18 15:08:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19358 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19358 found at Wed Oct 18 15:08:11 UTC 2023 selfserv_9355 with PID 19358 started at Wed Oct 18 15:08:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19358 at Wed Oct 18 15:08:11 UTC 2023 kill -USR1 19358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19358 killed at Wed Oct 18 15:08:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19397 found at Wed Oct 18 15:08:12 UTC 2023 selfserv_9355 with PID 19397 started at Wed Oct 18 15:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19397 at Wed Oct 18 15:08:12 UTC 2023 kill -USR1 19397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19397 killed at Wed Oct 18 15:08:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19436 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19436 found at Wed Oct 18 15:08:12 UTC 2023 selfserv_9355 with PID 19436 started at Wed Oct 18 15:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19436 at Wed Oct 18 15:08:12 UTC 2023 kill -USR1 19436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19436 killed at Wed Oct 18 15:08:12 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19475 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19475 found at Wed Oct 18 15:08:12 UTC 2023 selfserv_9355 with PID 19475 started at Wed Oct 18 15:08:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19475 at Wed Oct 18 15:08:13 UTC 2023 kill -USR1 19475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19475 killed at Wed Oct 18 15:08:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19515 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19515 found at Wed Oct 18 15:08:13 UTC 2023 selfserv_9355 with PID 19515 started at Wed Oct 18 15:08:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19515 at Wed Oct 18 15:08:13 UTC 2023 kill -USR1 19515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19515 killed at Wed Oct 18 15:08:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19555 found at Wed Oct 18 15:08:13 UTC 2023 selfserv_9355 with PID 19555 started at Wed Oct 18 15:08:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19555 at Wed Oct 18 15:08:13 UTC 2023 kill -USR1 19555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19555 killed at Wed Oct 18 15:08:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19595 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19595 found at Wed Oct 18 15:08:14 UTC 2023 selfserv_9355 with PID 19595 started at Wed Oct 18 15:08:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19595 at Wed Oct 18 15:08:14 UTC 2023 kill -USR1 19595 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19595 killed at Wed Oct 18 15:08:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19635 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19635 found at Wed Oct 18 15:08:14 UTC 2023 selfserv_9355 with PID 19635 started at Wed Oct 18 15:08:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19635 at Wed Oct 18 15:08:14 UTC 2023 kill -USR1 19635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19635 killed at Wed Oct 18 15:08:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19675 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19675 found at Wed Oct 18 15:08:14 UTC 2023 selfserv_9355 with PID 19675 started at Wed Oct 18 15:08:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19675 at Wed Oct 18 15:08:15 UTC 2023 kill -USR1 19675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19675 killed at Wed Oct 18 15:08:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19715 found at Wed Oct 18 15:08:15 UTC 2023 selfserv_9355 with PID 19715 started at Wed Oct 18 15:08:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19715 at Wed Oct 18 15:08:15 UTC 2023 kill -USR1 19715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19715 killed at Wed Oct 18 15:08:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19755 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19755 found at Wed Oct 18 15:08:15 UTC 2023 selfserv_9355 with PID 19755 started at Wed Oct 18 15:08:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19755 at Wed Oct 18 15:08:15 UTC 2023 kill -USR1 19755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19755 killed at Wed Oct 18 15:08:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:08:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19798 found at Wed Oct 18 15:08:16 UTC 2023 selfserv_9355 with PID 19798 started at Wed Oct 18 15:08:16 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19798 at Wed Oct 18 15:08:16 UTC 2023 kill -USR1 19798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19798 killed at Wed Oct 18 15:08:16 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:08:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 19882 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19882 found at Wed Oct 18 15:08:17 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 19882 started at Wed Oct 18 15:08:17 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 19882 at Wed Oct 18 15:08:25 UTC 2023 kill -USR1 19882 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19882 killed at Wed Oct 18 15:08:25 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:08:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 20439 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20439 found at Wed Oct 18 15:08:26 UTC 2023 selfserv_9355 with PID 20439 started at Wed Oct 18 15:08:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20439 at Wed Oct 18 15:08:41 UTC 2023 kill -USR1 20439 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20439 killed at Wed Oct 18 15:08:41 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:08:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21236 found at Wed Oct 18 15:08:41 UTC 2023 selfserv_9355 with PID 21236 started at Wed Oct 18 15:08:41 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21236 at Wed Oct 18 15:08:41 UTC 2023 kill -USR1 21236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21236 killed at Wed Oct 18 15:08:41 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21302 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21302 found at Wed Oct 18 15:08:41 UTC 2023 selfserv_9355 with PID 21302 started at Wed Oct 18 15:08:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21302 at Wed Oct 18 15:08:42 UTC 2023 kill -USR1 21302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21302 killed at Wed Oct 18 15:08:42 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21354 found at Wed Oct 18 15:08:42 UTC 2023 selfserv_9355 with PID 21354 started at Wed Oct 18 15:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21354 at Wed Oct 18 15:08:42 UTC 2023 kill -USR1 21354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21354 killed at Wed Oct 18 15:08:43 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21406 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21406 found at Wed Oct 18 15:08:43 UTC 2023 selfserv_9355 with PID 21406 started at Wed Oct 18 15:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21406 at Wed Oct 18 15:08:43 UTC 2023 kill -USR1 21406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21406 killed at Wed Oct 18 15:08:43 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21458 found at Wed Oct 18 15:08:43 UTC 2023 selfserv_9355 with PID 21458 started at Wed Oct 18 15:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21458 at Wed Oct 18 15:08:44 UTC 2023 kill -USR1 21458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21458 killed at Wed Oct 18 15:08:44 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21510 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21510 found at Wed Oct 18 15:08:44 UTC 2023 selfserv_9355 with PID 21510 started at Wed Oct 18 15:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21510 at Wed Oct 18 15:08:44 UTC 2023 kill -USR1 21510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21510 killed at Wed Oct 18 15:08:44 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21562 found at Wed Oct 18 15:08:45 UTC 2023 selfserv_9355 with PID 21562 started at Wed Oct 18 15:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21562 at Wed Oct 18 15:08:45 UTC 2023 kill -USR1 21562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21562 killed at Wed Oct 18 15:08:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21614 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21614 found at Wed Oct 18 15:08:45 UTC 2023 selfserv_9355 with PID 21614 started at Wed Oct 18 15:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21614 at Wed Oct 18 15:08:46 UTC 2023 kill -USR1 21614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21614 killed at Wed Oct 18 15:08:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21666 found at Wed Oct 18 15:08:46 UTC 2023 selfserv_9355 with PID 21666 started at Wed Oct 18 15:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21666 at Wed Oct 18 15:08:46 UTC 2023 kill -USR1 21666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21666 killed at Wed Oct 18 15:08:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21718 found at Wed Oct 18 15:08:47 UTC 2023 selfserv_9355 with PID 21718 started at Wed Oct 18 15:08:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21718 at Wed Oct 18 15:08:47 UTC 2023 kill -USR1 21718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21718 killed at Wed Oct 18 15:08:47 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21770 found at Wed Oct 18 15:08:47 UTC 2023 selfserv_9355 with PID 21770 started at Wed Oct 18 15:08:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21770 at Wed Oct 18 15:08:48 UTC 2023 kill -USR1 21770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21770 killed at Wed Oct 18 15:08:48 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21822 found at Wed Oct 18 15:08:48 UTC 2023 selfserv_9355 with PID 21822 started at Wed Oct 18 15:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21822 at Wed Oct 18 15:08:48 UTC 2023 kill -USR1 21822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21822 killed at Wed Oct 18 15:08:48 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21874 found at Wed Oct 18 15:08:48 UTC 2023 selfserv_9355 with PID 21874 started at Wed Oct 18 15:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21874 at Wed Oct 18 15:08:49 UTC 2023 kill -USR1 21874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21874 killed at Wed Oct 18 15:08:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21926 found at Wed Oct 18 15:08:49 UTC 2023 selfserv_9355 with PID 21926 started at Wed Oct 18 15:08:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21926 at Wed Oct 18 15:08:50 UTC 2023 kill -USR1 21926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21926 killed at Wed Oct 18 15:08:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21978 found at Wed Oct 18 15:08:50 UTC 2023 selfserv_9355 with PID 21978 started at Wed Oct 18 15:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21978 at Wed Oct 18 15:08:50 UTC 2023 kill -USR1 21978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21978 killed at Wed Oct 18 15:08:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22030 found at Wed Oct 18 15:08:51 UTC 2023 selfserv_9355 with PID 22030 started at Wed Oct 18 15:08:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22030 at Wed Oct 18 15:08:51 UTC 2023 kill -USR1 22030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22030 killed at Wed Oct 18 15:08:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22082 found at Wed Oct 18 15:08:51 UTC 2023 selfserv_9355 with PID 22082 started at Wed Oct 18 15:08:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22082 at Wed Oct 18 15:08:52 UTC 2023 kill -USR1 22082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22082 killed at Wed Oct 18 15:08:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22134 found at Wed Oct 18 15:08:52 UTC 2023 selfserv_9355 with PID 22134 started at Wed Oct 18 15:08:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22134 at Wed Oct 18 15:08:53 UTC 2023 kill -USR1 22134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22134 killed at Wed Oct 18 15:08:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22186 found at Wed Oct 18 15:08:53 UTC 2023 selfserv_9355 with PID 22186 started at Wed Oct 18 15:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22186 at Wed Oct 18 15:08:53 UTC 2023 kill -USR1 22186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22186 killed at Wed Oct 18 15:08:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22238 found at Wed Oct 18 15:08:54 UTC 2023 selfserv_9355 with PID 22238 started at Wed Oct 18 15:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22238 at Wed Oct 18 15:08:54 UTC 2023 kill -USR1 22238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22238 killed at Wed Oct 18 15:08:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22290 found at Wed Oct 18 15:08:54 UTC 2023 selfserv_9355 with PID 22290 started at Wed Oct 18 15:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22290 at Wed Oct 18 15:08:55 UTC 2023 kill -USR1 22290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22290 killed at Wed Oct 18 15:08:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22342 found at Wed Oct 18 15:08:55 UTC 2023 selfserv_9355 with PID 22342 started at Wed Oct 18 15:08:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22342 at Wed Oct 18 15:08:56 UTC 2023 kill -USR1 22342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22342 killed at Wed Oct 18 15:08:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22394 found at Wed Oct 18 15:08:56 UTC 2023 selfserv_9355 with PID 22394 started at Wed Oct 18 15:08:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22394 at Wed Oct 18 15:08:57 UTC 2023 kill -USR1 22394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22394 killed at Wed Oct 18 15:08:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22446 found at Wed Oct 18 15:08:57 UTC 2023 selfserv_9355 with PID 22446 started at Wed Oct 18 15:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22446 at Wed Oct 18 15:08:57 UTC 2023 kill -USR1 22446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22446 killed at Wed Oct 18 15:08:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22498 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22498 found at Wed Oct 18 15:08:57 UTC 2023 selfserv_9355 with PID 22498 started at Wed Oct 18 15:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22498 at Wed Oct 18 15:08:58 UTC 2023 kill -USR1 22498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22498 killed at Wed Oct 18 15:08:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:08:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22550 found at Wed Oct 18 15:08:58 UTC 2023 selfserv_9355 with PID 22550 started at Wed Oct 18 15:08:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22550 at Wed Oct 18 15:08:59 UTC 2023 kill -USR1 22550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22550 killed at Wed Oct 18 15:08:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:08:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22602 found at Wed Oct 18 15:08:59 UTC 2023 selfserv_9355 with PID 22602 started at Wed Oct 18 15:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22602 at Wed Oct 18 15:08:59 UTC 2023 kill -USR1 22602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22602 killed at Wed Oct 18 15:09:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22654 found at Wed Oct 18 15:09:00 UTC 2023 selfserv_9355 with PID 22654 started at Wed Oct 18 15:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22654 at Wed Oct 18 15:09:00 UTC 2023 kill -USR1 22654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22654 killed at Wed Oct 18 15:09:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22706 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22706 found at Wed Oct 18 15:09:00 UTC 2023 selfserv_9355 with PID 22706 started at Wed Oct 18 15:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22706 at Wed Oct 18 15:09:01 UTC 2023 kill -USR1 22706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22706 killed at Wed Oct 18 15:09:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22758 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22758 found at Wed Oct 18 15:09:01 UTC 2023 selfserv_9355 with PID 22758 started at Wed Oct 18 15:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22758 at Wed Oct 18 15:09:02 UTC 2023 kill -USR1 22758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22758 killed at Wed Oct 18 15:09:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22811 found at Wed Oct 18 15:09:02 UTC 2023 selfserv_9355 with PID 22811 started at Wed Oct 18 15:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22811 at Wed Oct 18 15:09:02 UTC 2023 kill -USR1 22811 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22811 killed at Wed Oct 18 15:09:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22863 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22863 found at Wed Oct 18 15:09:03 UTC 2023 selfserv_9355 with PID 22863 started at Wed Oct 18 15:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22863 at Wed Oct 18 15:09:03 UTC 2023 kill -USR1 22863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22863 killed at Wed Oct 18 15:09:03 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22915 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22915 found at Wed Oct 18 15:09:03 UTC 2023 selfserv_9355 with PID 22915 started at Wed Oct 18 15:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22915 at Wed Oct 18 15:09:03 UTC 2023 kill -USR1 22915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22915 killed at Wed Oct 18 15:09:03 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22967 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22967 found at Wed Oct 18 15:09:04 UTC 2023 selfserv_9355 with PID 22967 started at Wed Oct 18 15:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22967 at Wed Oct 18 15:09:04 UTC 2023 kill -USR1 22967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22967 killed at Wed Oct 18 15:09:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23019 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23019 found at Wed Oct 18 15:09:04 UTC 2023 selfserv_9355 with PID 23019 started at Wed Oct 18 15:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23019 at Wed Oct 18 15:09:05 UTC 2023 kill -USR1 23019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23019 killed at Wed Oct 18 15:09:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23071 found at Wed Oct 18 15:09:05 UTC 2023 selfserv_9355 with PID 23071 started at Wed Oct 18 15:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23071 at Wed Oct 18 15:09:05 UTC 2023 kill -USR1 23071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23071 killed at Wed Oct 18 15:09:05 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23123 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23123 found at Wed Oct 18 15:09:05 UTC 2023 selfserv_9355 with PID 23123 started at Wed Oct 18 15:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23123 at Wed Oct 18 15:09:06 UTC 2023 kill -USR1 23123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23123 killed at Wed Oct 18 15:09:06 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23175 found at Wed Oct 18 15:09:06 UTC 2023 selfserv_9355 with PID 23175 started at Wed Oct 18 15:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23175 at Wed Oct 18 15:09:06 UTC 2023 kill -USR1 23175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23175 killed at Wed Oct 18 15:09:07 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23227 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23227 found at Wed Oct 18 15:09:07 UTC 2023 selfserv_9355 with PID 23227 started at Wed Oct 18 15:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23227 at Wed Oct 18 15:09:07 UTC 2023 kill -USR1 23227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23227 killed at Wed Oct 18 15:09:07 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23279 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23279 found at Wed Oct 18 15:09:07 UTC 2023 selfserv_9355 with PID 23279 started at Wed Oct 18 15:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23279 at Wed Oct 18 15:09:08 UTC 2023 kill -USR1 23279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23279 killed at Wed Oct 18 15:09:08 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23331 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23331 found at Wed Oct 18 15:09:08 UTC 2023 selfserv_9355 with PID 23331 started at Wed Oct 18 15:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23331 at Wed Oct 18 15:09:08 UTC 2023 kill -USR1 23331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23331 killed at Wed Oct 18 15:09:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23383 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23383 found at Wed Oct 18 15:09:09 UTC 2023 selfserv_9355 with PID 23383 started at Wed Oct 18 15:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23383 at Wed Oct 18 15:09:09 UTC 2023 kill -USR1 23383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23383 killed at Wed Oct 18 15:09:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23435 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23435 found at Wed Oct 18 15:09:09 UTC 2023 selfserv_9355 with PID 23435 started at Wed Oct 18 15:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23435 at Wed Oct 18 15:09:09 UTC 2023 kill -USR1 23435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23435 killed at Wed Oct 18 15:09:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23487 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23487 found at Wed Oct 18 15:09:10 UTC 2023 selfserv_9355 with PID 23487 started at Wed Oct 18 15:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23487 at Wed Oct 18 15:09:10 UTC 2023 kill -USR1 23487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23487 killed at Wed Oct 18 15:09:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23539 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23539 found at Wed Oct 18 15:09:10 UTC 2023 selfserv_9355 with PID 23539 started at Wed Oct 18 15:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23539 at Wed Oct 18 15:09:11 UTC 2023 kill -USR1 23539 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23539 killed at Wed Oct 18 15:09:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23591 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23591 found at Wed Oct 18 15:09:11 UTC 2023 selfserv_9355 with PID 23591 started at Wed Oct 18 15:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23591 at Wed Oct 18 15:09:11 UTC 2023 kill -USR1 23591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23591 killed at Wed Oct 18 15:09:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23643 found at Wed Oct 18 15:09:12 UTC 2023 selfserv_9355 with PID 23643 started at Wed Oct 18 15:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23643 at Wed Oct 18 15:09:12 UTC 2023 kill -USR1 23643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23643 killed at Wed Oct 18 15:09:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23695 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23695 found at Wed Oct 18 15:09:12 UTC 2023 selfserv_9355 with PID 23695 started at Wed Oct 18 15:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23695 at Wed Oct 18 15:09:13 UTC 2023 kill -USR1 23695 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23695 killed at Wed Oct 18 15:09:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23747 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23747 found at Wed Oct 18 15:09:13 UTC 2023 selfserv_9355 with PID 23747 started at Wed Oct 18 15:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23747 at Wed Oct 18 15:09:14 UTC 2023 kill -USR1 23747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23747 killed at Wed Oct 18 15:09:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23799 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23799 found at Wed Oct 18 15:09:14 UTC 2023 selfserv_9355 with PID 23799 started at Wed Oct 18 15:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23799 at Wed Oct 18 15:09:14 UTC 2023 kill -USR1 23799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23799 killed at Wed Oct 18 15:09:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23851 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23851 found at Wed Oct 18 15:09:15 UTC 2023 selfserv_9355 with PID 23851 started at Wed Oct 18 15:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23851 at Wed Oct 18 15:09:15 UTC 2023 kill -USR1 23851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23851 killed at Wed Oct 18 15:09:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23903 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23903 found at Wed Oct 18 15:09:15 UTC 2023 selfserv_9355 with PID 23903 started at Wed Oct 18 15:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23903 at Wed Oct 18 15:09:16 UTC 2023 kill -USR1 23903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23903 killed at Wed Oct 18 15:09:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23958 found at Wed Oct 18 15:09:16 UTC 2023 selfserv_9355 with PID 23958 started at Wed Oct 18 15:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23958 at Wed Oct 18 15:09:17 UTC 2023 kill -USR1 23958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23958 killed at Wed Oct 18 15:09:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24010 found at Wed Oct 18 15:09:17 UTC 2023 selfserv_9355 with PID 24010 started at Wed Oct 18 15:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24010 at Wed Oct 18 15:09:17 UTC 2023 kill -USR1 24010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24010 killed at Wed Oct 18 15:09:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24063 found at Wed Oct 18 15:09:17 UTC 2023 selfserv_9355 with PID 24063 started at Wed Oct 18 15:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24063 at Wed Oct 18 15:09:18 UTC 2023 kill -USR1 24063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24063 killed at Wed Oct 18 15:09:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:09:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24116 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24116 found at Wed Oct 18 15:09:18 UTC 2023 selfserv_9355 with PID 24116 started at Wed Oct 18 15:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24116 at Wed Oct 18 15:09:19 UTC 2023 kill -USR1 24116 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24116 killed at Wed Oct 18 15:09:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24168 found at Wed Oct 18 15:09:19 UTC 2023 selfserv_9355 with PID 24168 started at Wed Oct 18 15:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24168 at Wed Oct 18 15:09:19 UTC 2023 kill -USR1 24168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24168 killed at Wed Oct 18 15:09:19 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24220 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24220 found at Wed Oct 18 15:09:20 UTC 2023 selfserv_9355 with PID 24220 started at Wed Oct 18 15:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24220 at Wed Oct 18 15:09:20 UTC 2023 kill -USR1 24220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24220 killed at Wed Oct 18 15:09:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:09:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24272 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24272 found at Wed Oct 18 15:09:20 UTC 2023 selfserv_9355 with PID 24272 started at Wed Oct 18 15:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24272 at Wed Oct 18 15:09:21 UTC 2023 kill -USR1 24272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24272 killed at Wed Oct 18 15:09:21 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24332 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24332 found at Wed Oct 18 15:09:21 UTC 2023 selfserv_9355 with PID 24332 started at Wed Oct 18 15:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24332 at Wed Oct 18 15:09:21 UTC 2023 kill -USR1 24332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24332 killed at Wed Oct 18 15:09:21 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24390 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24390 found at Wed Oct 18 15:09:22 UTC 2023 selfserv_9355 with PID 24390 started at Wed Oct 18 15:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24390 at Wed Oct 18 15:09:22 UTC 2023 kill -USR1 24390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24390 killed at Wed Oct 18 15:09:22 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24450 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24450 found at Wed Oct 18 15:09:22 UTC 2023 selfserv_9355 with PID 24450 started at Wed Oct 18 15:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24450 at Wed Oct 18 15:09:22 UTC 2023 kill -USR1 24450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24450 killed at Wed Oct 18 15:09:22 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24508 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24508 found at Wed Oct 18 15:09:22 UTC 2023 selfserv_9355 with PID 24508 started at Wed Oct 18 15:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24508 at Wed Oct 18 15:09:23 UTC 2023 kill -USR1 24508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24508 killed at Wed Oct 18 15:09:23 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 15:09:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24566 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24566 found at Wed Oct 18 15:09:23 UTC 2023 selfserv_9355 with PID 24566 started at Wed Oct 18 15:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24566 at Wed Oct 18 15:09:23 UTC 2023 kill -USR1 24566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24566 killed at Wed Oct 18 15:09:23 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:09:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24624 found at Wed Oct 18 15:09:23 UTC 2023 selfserv_9355 with PID 24624 started at Wed Oct 18 15:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24624 at Wed Oct 18 15:09:24 UTC 2023 kill -USR1 24624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24624 killed at Wed Oct 18 15:09:24 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24684 found at Wed Oct 18 15:09:24 UTC 2023 selfserv_9355 with PID 24684 started at Wed Oct 18 15:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24684 at Wed Oct 18 15:09:24 UTC 2023 kill -USR1 24684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24684 killed at Wed Oct 18 15:09:24 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24742 found at Wed Oct 18 15:09:24 UTC 2023 selfserv_9355 with PID 24742 started at Wed Oct 18 15:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24742 at Wed Oct 18 15:09:25 UTC 2023 kill -USR1 24742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24742 killed at Wed Oct 18 15:09:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:09:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24800 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24800 found at Wed Oct 18 15:09:25 UTC 2023 selfserv_9355 with PID 24800 started at Wed Oct 18 15:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24800 at Wed Oct 18 15:09:25 UTC 2023 kill -USR1 24800 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24800 killed at Wed Oct 18 15:09:25 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:09:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24858 found at Wed Oct 18 15:09:25 UTC 2023 selfserv_9355 with PID 24858 started at Wed Oct 18 15:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24858 at Wed Oct 18 15:09:25 UTC 2023 kill -USR1 24858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24858 killed at Wed Oct 18 15:09:26 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24900 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24900 found at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 with PID 24900 started at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24900 at Wed Oct 18 15:09:26 UTC 2023 kill -USR1 24900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24900 killed at Wed Oct 18 15:09:26 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24942 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24942 found at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 with PID 24942 started at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 24942 at Wed Oct 18 15:09:26 UTC 2023 kill -USR1 24942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24942 killed at Wed Oct 18 15:09:26 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24984 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24984 found at Wed Oct 18 15:09:26 UTC 2023 selfserv_9355 with PID 24984 started at Wed Oct 18 15:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 24984 at Wed Oct 18 15:09:27 UTC 2023 kill -USR1 24984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24984 killed at Wed Oct 18 15:09:27 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 15:09:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25026 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25026 found at Wed Oct 18 15:09:27 UTC 2023 selfserv_9355 with PID 25026 started at Wed Oct 18 15:09:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 25026 at Wed Oct 18 15:09:27 UTC 2023 kill -USR1 25026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25026 killed at Wed Oct 18 15:09:27 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 15:09:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25068 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25068 found at Wed Oct 18 15:09:27 UTC 2023 selfserv_9355 with PID 25068 started at Wed Oct 18 15:09:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 25068 at Wed Oct 18 15:09:27 UTC 2023 kill -USR1 25068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25068 killed at Wed Oct 18 15:09:28 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25110 found at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 with PID 25110 started at Wed Oct 18 15:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 25110 at Wed Oct 18 15:09:28 UTC 2023 kill -USR1 25110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25110 killed at Wed Oct 18 15:09:28 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25152 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25152 found at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 with PID 25152 started at Wed Oct 18 15:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 25152 at Wed Oct 18 15:09:28 UTC 2023 kill -USR1 25152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25152 killed at Wed Oct 18 15:09:28 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25194 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25194 found at Wed Oct 18 15:09:28 UTC 2023 selfserv_9355 with PID 25194 started at Wed Oct 18 15:09:28 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:09:28 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:10:06 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 25194 at Wed Oct 18 15:10:06 UTC 2023 kill -USR1 25194 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25194 killed at Wed Oct 18 15:10:06 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:10:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25245 found at Wed Oct 18 15:10:06 UTC 2023 selfserv_9355 with PID 25245 started at Wed Oct 18 15:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25245 at Wed Oct 18 15:10:06 UTC 2023 kill -USR1 25245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25245 killed at Wed Oct 18 15:10:06 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25287 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25287 found at Wed Oct 18 15:10:06 UTC 2023 selfserv_9355 with PID 25287 started at Wed Oct 18 15:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25287 at Wed Oct 18 15:10:07 UTC 2023 kill -USR1 25287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25287 killed at Wed Oct 18 15:10:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25326 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25326 found at Wed Oct 18 15:10:07 UTC 2023 selfserv_9355 with PID 25326 started at Wed Oct 18 15:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25326 at Wed Oct 18 15:10:07 UTC 2023 kill -USR1 25326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25326 killed at Wed Oct 18 15:10:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25365 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25365 found at Wed Oct 18 15:10:07 UTC 2023 selfserv_9355 with PID 25365 started at Wed Oct 18 15:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25365 at Wed Oct 18 15:10:07 UTC 2023 kill -USR1 25365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25365 killed at Wed Oct 18 15:10:07 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25404 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25404 found at Wed Oct 18 15:10:08 UTC 2023 selfserv_9355 with PID 25404 started at Wed Oct 18 15:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25404 at Wed Oct 18 15:10:08 UTC 2023 kill -USR1 25404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25404 killed at Wed Oct 18 15:10:08 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25443 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25443 found at Wed Oct 18 15:10:08 UTC 2023 selfserv_9355 with PID 25443 started at Wed Oct 18 15:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25443 at Wed Oct 18 15:10:08 UTC 2023 kill -USR1 25443 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25443 killed at Wed Oct 18 15:10:08 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25482 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25482 found at Wed Oct 18 15:10:08 UTC 2023 selfserv_9355 with PID 25482 started at Wed Oct 18 15:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25482 at Wed Oct 18 15:10:08 UTC 2023 kill -USR1 25482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25482 killed at Wed Oct 18 15:10:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25521 found at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 with PID 25521 started at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25521 at Wed Oct 18 15:10:09 UTC 2023 kill -USR1 25521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25521 killed at Wed Oct 18 15:10:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25560 found at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 with PID 25560 started at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25560 at Wed Oct 18 15:10:09 UTC 2023 kill -USR1 25560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25560 killed at Wed Oct 18 15:10:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25599 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25599 found at Wed Oct 18 15:10:09 UTC 2023 selfserv_9355 with PID 25599 started at Wed Oct 18 15:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25599 at Wed Oct 18 15:10:10 UTC 2023 kill -USR1 25599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25599 killed at Wed Oct 18 15:10:10 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25638 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25638 found at Wed Oct 18 15:10:10 UTC 2023 selfserv_9355 with PID 25638 started at Wed Oct 18 15:10:10 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25638 at Wed Oct 18 15:10:10 UTC 2023 kill -USR1 25638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25638 killed at Wed Oct 18 15:10:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25678 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25678 found at Wed Oct 18 15:10:10 UTC 2023 selfserv_9355 with PID 25678 started at Wed Oct 18 15:10:10 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25678 at Wed Oct 18 15:10:10 UTC 2023 kill -USR1 25678 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25678 killed at Wed Oct 18 15:10:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25718 found at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 with PID 25718 started at Wed Oct 18 15:10:11 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25718 at Wed Oct 18 15:10:11 UTC 2023 kill -USR1 25718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25718 killed at Wed Oct 18 15:10:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25758 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25758 found at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 with PID 25758 started at Wed Oct 18 15:10:11 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25758 at Wed Oct 18 15:10:11 UTC 2023 kill -USR1 25758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25758 killed at Wed Oct 18 15:10:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25798 found at Wed Oct 18 15:10:11 UTC 2023 selfserv_9355 with PID 25798 started at Wed Oct 18 15:10:11 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25798 at Wed Oct 18 15:10:12 UTC 2023 kill -USR1 25798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25798 killed at Wed Oct 18 15:10:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25838 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25838 found at Wed Oct 18 15:10:12 UTC 2023 selfserv_9355 with PID 25838 started at Wed Oct 18 15:10:12 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25838 at Wed Oct 18 15:10:12 UTC 2023 kill -USR1 25838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25838 killed at Wed Oct 18 15:10:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25878 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25878 found at Wed Oct 18 15:10:12 UTC 2023 selfserv_9355 with PID 25878 started at Wed Oct 18 15:10:12 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25878 at Wed Oct 18 15:10:12 UTC 2023 kill -USR1 25878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25878 killed at Wed Oct 18 15:10:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25918 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25918 found at Wed Oct 18 15:10:13 UTC 2023 selfserv_9355 with PID 25918 started at Wed Oct 18 15:10:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25918 at Wed Oct 18 15:10:13 UTC 2023 kill -USR1 25918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25918 killed at Wed Oct 18 15:10:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:10:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25958 found at Wed Oct 18 15:10:13 UTC 2023 selfserv_9355 with PID 25958 started at Wed Oct 18 15:10:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25958 at Wed Oct 18 15:10:13 UTC 2023 kill -USR1 25958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25958 killed at Wed Oct 18 15:10:13 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 15:10:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 25998 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25998 found at Wed Oct 18 15:10:13 UTC 2023 selfserv_9355 with PID 25998 started at Wed Oct 18 15:10:13 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 25998 at Wed Oct 18 15:10:22 UTC 2023 kill -USR1 25998 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25998 killed at Wed Oct 18 15:10:22 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:10:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 26557 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26557 found at Wed Oct 18 15:10:23 UTC 2023 selfserv_9355 with PID 26557 started at Wed Oct 18 15:10:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26557 at Wed Oct 18 15:10:35 UTC 2023 kill -USR1 26557 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26557 killed at Wed Oct 18 15:10:35 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27369 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27369 found at Wed Oct 18 15:10:35 UTC 2023 selfserv_9355 with PID 27369 started at Wed Oct 18 15:10:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27369 at Wed Oct 18 15:10:36 UTC 2023 kill -USR1 27369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27369 killed at Wed Oct 18 15:10:36 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27422 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27422 found at Wed Oct 18 15:10:36 UTC 2023 selfserv_9355 with PID 27422 started at Wed Oct 18 15:10:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27422 at Wed Oct 18 15:10:36 UTC 2023 kill -USR1 27422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27422 killed at Wed Oct 18 15:10:36 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27475 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27475 found at Wed Oct 18 15:10:36 UTC 2023 selfserv_9355 with PID 27475 started at Wed Oct 18 15:10:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27475 at Wed Oct 18 15:10:37 UTC 2023 kill -USR1 27475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27475 killed at Wed Oct 18 15:10:37 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27527 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27527 found at Wed Oct 18 15:10:37 UTC 2023 selfserv_9355 with PID 27527 started at Wed Oct 18 15:10:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27527 at Wed Oct 18 15:10:37 UTC 2023 kill -USR1 27527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27527 killed at Wed Oct 18 15:10:37 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27581 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27581 found at Wed Oct 18 15:10:37 UTC 2023 selfserv_9355 with PID 27581 started at Wed Oct 18 15:10:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27581 at Wed Oct 18 15:10:38 UTC 2023 kill -USR1 27581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27581 killed at Wed Oct 18 15:10:38 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27633 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27633 found at Wed Oct 18 15:10:38 UTC 2023 selfserv_9355 with PID 27633 started at Wed Oct 18 15:10:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27633 at Wed Oct 18 15:10:38 UTC 2023 kill -USR1 27633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27633 killed at Wed Oct 18 15:10:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27685 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27685 found at Wed Oct 18 15:10:38 UTC 2023 selfserv_9355 with PID 27685 started at Wed Oct 18 15:10:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27685 at Wed Oct 18 15:10:39 UTC 2023 kill -USR1 27685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27685 killed at Wed Oct 18 15:10:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27737 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27737 found at Wed Oct 18 15:10:39 UTC 2023 selfserv_9355 with PID 27737 started at Wed Oct 18 15:10:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27737 at Wed Oct 18 15:10:39 UTC 2023 kill -USR1 27737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27737 killed at Wed Oct 18 15:10:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27789 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27789 found at Wed Oct 18 15:10:40 UTC 2023 selfserv_9355 with PID 27789 started at Wed Oct 18 15:10:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27789 at Wed Oct 18 15:10:40 UTC 2023 kill -USR1 27789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27789 killed at Wed Oct 18 15:10:40 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27841 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27841 found at Wed Oct 18 15:10:40 UTC 2023 selfserv_9355 with PID 27841 started at Wed Oct 18 15:10:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27841 at Wed Oct 18 15:10:41 UTC 2023 kill -USR1 27841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27841 killed at Wed Oct 18 15:10:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27893 found at Wed Oct 18 15:10:41 UTC 2023 selfserv_9355 with PID 27893 started at Wed Oct 18 15:10:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27893 at Wed Oct 18 15:10:41 UTC 2023 kill -USR1 27893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27893 killed at Wed Oct 18 15:10:41 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27945 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27945 found at Wed Oct 18 15:10:41 UTC 2023 selfserv_9355 with PID 27945 started at Wed Oct 18 15:10:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27945 at Wed Oct 18 15:10:42 UTC 2023 kill -USR1 27945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27945 killed at Wed Oct 18 15:10:42 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27997 found at Wed Oct 18 15:10:42 UTC 2023 selfserv_9355 with PID 27997 started at Wed Oct 18 15:10:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27997 at Wed Oct 18 15:10:42 UTC 2023 kill -USR1 27997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27997 killed at Wed Oct 18 15:10:42 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28049 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28049 found at Wed Oct 18 15:10:42 UTC 2023 selfserv_9355 with PID 28049 started at Wed Oct 18 15:10:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28049 at Wed Oct 18 15:10:43 UTC 2023 kill -USR1 28049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28049 killed at Wed Oct 18 15:10:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28101 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28101 found at Wed Oct 18 15:10:43 UTC 2023 selfserv_9355 with PID 28101 started at Wed Oct 18 15:10:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28101 at Wed Oct 18 15:10:43 UTC 2023 kill -USR1 28101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28101 killed at Wed Oct 18 15:10:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28153 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28153 found at Wed Oct 18 15:10:43 UTC 2023 selfserv_9355 with PID 28153 started at Wed Oct 18 15:10:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28153 at Wed Oct 18 15:10:44 UTC 2023 kill -USR1 28153 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28153 killed at Wed Oct 18 15:10:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28205 found at Wed Oct 18 15:10:44 UTC 2023 selfserv_9355 with PID 28205 started at Wed Oct 18 15:10:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28205 at Wed Oct 18 15:10:44 UTC 2023 kill -USR1 28205 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28205 killed at Wed Oct 18 15:10:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28257 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28257 found at Wed Oct 18 15:10:45 UTC 2023 selfserv_9355 with PID 28257 started at Wed Oct 18 15:10:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28257 at Wed Oct 18 15:10:45 UTC 2023 kill -USR1 28257 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28257 killed at Wed Oct 18 15:10:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28309 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28309 found at Wed Oct 18 15:10:45 UTC 2023 selfserv_9355 with PID 28309 started at Wed Oct 18 15:10:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28309 at Wed Oct 18 15:10:45 UTC 2023 kill -USR1 28309 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28309 killed at Wed Oct 18 15:10:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28361 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28361 found at Wed Oct 18 15:10:46 UTC 2023 selfserv_9355 with PID 28361 started at Wed Oct 18 15:10:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28361 at Wed Oct 18 15:10:46 UTC 2023 kill -USR1 28361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28361 killed at Wed Oct 18 15:10:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28413 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28413 found at Wed Oct 18 15:10:46 UTC 2023 selfserv_9355 with PID 28413 started at Wed Oct 18 15:10:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28413 at Wed Oct 18 15:10:46 UTC 2023 kill -USR1 28413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28413 killed at Wed Oct 18 15:10:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28466 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28466 found at Wed Oct 18 15:10:47 UTC 2023 selfserv_9355 with PID 28466 started at Wed Oct 18 15:10:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28466 at Wed Oct 18 15:10:47 UTC 2023 kill -USR1 28466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28466 killed at Wed Oct 18 15:10:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28518 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28518 found at Wed Oct 18 15:10:47 UTC 2023 selfserv_9355 with PID 28518 started at Wed Oct 18 15:10:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28518 at Wed Oct 18 15:10:48 UTC 2023 kill -USR1 28518 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28518 killed at Wed Oct 18 15:10:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28570 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28570 found at Wed Oct 18 15:10:48 UTC 2023 selfserv_9355 with PID 28570 started at Wed Oct 18 15:10:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28570 at Wed Oct 18 15:10:48 UTC 2023 kill -USR1 28570 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28570 killed at Wed Oct 18 15:10:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28622 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28622 found at Wed Oct 18 15:10:48 UTC 2023 selfserv_9355 with PID 28622 started at Wed Oct 18 15:10:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28622 at Wed Oct 18 15:10:49 UTC 2023 kill -USR1 28622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28622 killed at Wed Oct 18 15:10:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28674 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28674 found at Wed Oct 18 15:10:49 UTC 2023 selfserv_9355 with PID 28674 started at Wed Oct 18 15:10:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28674 at Wed Oct 18 15:10:50 UTC 2023 kill -USR1 28674 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28674 killed at Wed Oct 18 15:10:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28726 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28726 found at Wed Oct 18 15:10:50 UTC 2023 selfserv_9355 with PID 28726 started at Wed Oct 18 15:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28726 at Wed Oct 18 15:10:50 UTC 2023 kill -USR1 28726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28726 killed at Wed Oct 18 15:10:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28778 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28778 found at Wed Oct 18 15:10:50 UTC 2023 selfserv_9355 with PID 28778 started at Wed Oct 18 15:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28778 at Wed Oct 18 15:10:51 UTC 2023 kill -USR1 28778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28778 killed at Wed Oct 18 15:10:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28830 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28830 found at Wed Oct 18 15:10:51 UTC 2023 selfserv_9355 with PID 28830 started at Wed Oct 18 15:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28830 at Wed Oct 18 15:10:52 UTC 2023 kill -USR1 28830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28830 killed at Wed Oct 18 15:10:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28882 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28882 found at Wed Oct 18 15:10:52 UTC 2023 selfserv_9355 with PID 28882 started at Wed Oct 18 15:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28882 at Wed Oct 18 15:10:52 UTC 2023 kill -USR1 28882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28882 killed at Wed Oct 18 15:10:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28934 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28934 found at Wed Oct 18 15:10:53 UTC 2023 selfserv_9355 with PID 28934 started at Wed Oct 18 15:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28934 at Wed Oct 18 15:10:53 UTC 2023 kill -USR1 28934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28934 killed at Wed Oct 18 15:10:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28986 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28986 found at Wed Oct 18 15:10:53 UTC 2023 selfserv_9355 with PID 28986 started at Wed Oct 18 15:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28986 at Wed Oct 18 15:10:53 UTC 2023 kill -USR1 28986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28986 killed at Wed Oct 18 15:10:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29038 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29038 found at Wed Oct 18 15:10:54 UTC 2023 selfserv_9355 with PID 29038 started at Wed Oct 18 15:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29038 at Wed Oct 18 15:10:54 UTC 2023 kill -USR1 29038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29038 killed at Wed Oct 18 15:10:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29090 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29090 found at Wed Oct 18 15:10:54 UTC 2023 selfserv_9355 with PID 29090 started at Wed Oct 18 15:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29090 at Wed Oct 18 15:10:54 UTC 2023 kill -USR1 29090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29090 killed at Wed Oct 18 15:10:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29142 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29142 found at Wed Oct 18 15:10:55 UTC 2023 selfserv_9355 with PID 29142 started at Wed Oct 18 15:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29142 at Wed Oct 18 15:10:55 UTC 2023 kill -USR1 29142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29142 killed at Wed Oct 18 15:10:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29194 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29194 found at Wed Oct 18 15:10:55 UTC 2023 selfserv_9355 with PID 29194 started at Wed Oct 18 15:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29194 at Wed Oct 18 15:10:55 UTC 2023 kill -USR1 29194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29194 killed at Wed Oct 18 15:10:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29246 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29246 found at Wed Oct 18 15:10:56 UTC 2023 selfserv_9355 with PID 29246 started at Wed Oct 18 15:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29246 at Wed Oct 18 15:10:56 UTC 2023 kill -USR1 29246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29246 killed at Wed Oct 18 15:10:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29298 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29298 found at Wed Oct 18 15:10:56 UTC 2023 selfserv_9355 with PID 29298 started at Wed Oct 18 15:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29298 at Wed Oct 18 15:10:56 UTC 2023 kill -USR1 29298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29298 killed at Wed Oct 18 15:10:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29350 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29350 found at Wed Oct 18 15:10:57 UTC 2023 selfserv_9355 with PID 29350 started at Wed Oct 18 15:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29350 at Wed Oct 18 15:10:57 UTC 2023 kill -USR1 29350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29350 killed at Wed Oct 18 15:10:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29402 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29402 found at Wed Oct 18 15:10:57 UTC 2023 selfserv_9355 with PID 29402 started at Wed Oct 18 15:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29402 at Wed Oct 18 15:10:57 UTC 2023 kill -USR1 29402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29402 killed at Wed Oct 18 15:10:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29454 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29454 found at Wed Oct 18 15:10:58 UTC 2023 selfserv_9355 with PID 29454 started at Wed Oct 18 15:10:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29454 at Wed Oct 18 15:10:58 UTC 2023 kill -USR1 29454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29454 killed at Wed Oct 18 15:10:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29506 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29506 found at Wed Oct 18 15:10:58 UTC 2023 selfserv_9355 with PID 29506 started at Wed Oct 18 15:10:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29506 at Wed Oct 18 15:10:59 UTC 2023 kill -USR1 29506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29506 killed at Wed Oct 18 15:10:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:10:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29558 found at Wed Oct 18 15:10:59 UTC 2023 selfserv_9355 with PID 29558 started at Wed Oct 18 15:10:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29558 at Wed Oct 18 15:10:59 UTC 2023 kill -USR1 29558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29558 killed at Wed Oct 18 15:10:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:10:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:10:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29610 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29610 found at Wed Oct 18 15:10:59 UTC 2023 selfserv_9355 with PID 29610 started at Wed Oct 18 15:10:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29610 at Wed Oct 18 15:11:00 UTC 2023 kill -USR1 29610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29610 killed at Wed Oct 18 15:11:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29662 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29662 found at Wed Oct 18 15:11:00 UTC 2023 selfserv_9355 with PID 29662 started at Wed Oct 18 15:11:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29662 at Wed Oct 18 15:11:00 UTC 2023 kill -USR1 29662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29662 killed at Wed Oct 18 15:11:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29714 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29714 found at Wed Oct 18 15:11:00 UTC 2023 selfserv_9355 with PID 29714 started at Wed Oct 18 15:11:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29714 at Wed Oct 18 15:11:01 UTC 2023 kill -USR1 29714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29714 killed at Wed Oct 18 15:11:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29766 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29766 found at Wed Oct 18 15:11:01 UTC 2023 selfserv_9355 with PID 29766 started at Wed Oct 18 15:11:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29766 at Wed Oct 18 15:11:01 UTC 2023 kill -USR1 29766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29766 killed at Wed Oct 18 15:11:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29818 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29818 found at Wed Oct 18 15:11:01 UTC 2023 selfserv_9355 with PID 29818 started at Wed Oct 18 15:11:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29818 at Wed Oct 18 15:11:02 UTC 2023 kill -USR1 29818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29818 killed at Wed Oct 18 15:11:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29870 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29870 found at Wed Oct 18 15:11:02 UTC 2023 selfserv_9355 with PID 29870 started at Wed Oct 18 15:11:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29870 at Wed Oct 18 15:11:02 UTC 2023 kill -USR1 29870 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29870 killed at Wed Oct 18 15:11:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29922 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29922 found at Wed Oct 18 15:11:03 UTC 2023 selfserv_9355 with PID 29922 started at Wed Oct 18 15:11:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29922 at Wed Oct 18 15:11:03 UTC 2023 kill -USR1 29922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29922 killed at Wed Oct 18 15:11:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29974 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29974 found at Wed Oct 18 15:11:03 UTC 2023 selfserv_9355 with PID 29974 started at Wed Oct 18 15:11:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29974 at Wed Oct 18 15:11:03 UTC 2023 kill -USR1 29974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29974 killed at Wed Oct 18 15:11:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30026 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30026 found at Wed Oct 18 15:11:04 UTC 2023 selfserv_9355 with PID 30026 started at Wed Oct 18 15:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30026 at Wed Oct 18 15:11:04 UTC 2023 kill -USR1 30026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30026 killed at Wed Oct 18 15:11:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30078 found at Wed Oct 18 15:11:04 UTC 2023 selfserv_9355 with PID 30078 started at Wed Oct 18 15:11:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30078 at Wed Oct 18 15:11:05 UTC 2023 kill -USR1 30078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30078 killed at Wed Oct 18 15:11:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30130 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30130 found at Wed Oct 18 15:11:05 UTC 2023 selfserv_9355 with PID 30130 started at Wed Oct 18 15:11:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30130 at Wed Oct 18 15:11:05 UTC 2023 kill -USR1 30130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30130 killed at Wed Oct 18 15:11:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30182 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30182 found at Wed Oct 18 15:11:06 UTC 2023 selfserv_9355 with PID 30182 started at Wed Oct 18 15:11:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30182 at Wed Oct 18 15:11:06 UTC 2023 kill -USR1 30182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30182 killed at Wed Oct 18 15:11:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30234 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30234 found at Wed Oct 18 15:11:06 UTC 2023 selfserv_9355 with PID 30234 started at Wed Oct 18 15:11:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30234 at Wed Oct 18 15:11:07 UTC 2023 kill -USR1 30234 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30234 killed at Wed Oct 18 15:11:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30286 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30286 found at Wed Oct 18 15:11:07 UTC 2023 selfserv_9355 with PID 30286 started at Wed Oct 18 15:11:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30286 at Wed Oct 18 15:11:07 UTC 2023 kill -USR1 30286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30286 killed at Wed Oct 18 15:11:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30338 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30338 found at Wed Oct 18 15:11:07 UTC 2023 selfserv_9355 with PID 30338 started at Wed Oct 18 15:11:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30338 at Wed Oct 18 15:11:08 UTC 2023 kill -USR1 30338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30338 killed at Wed Oct 18 15:11:08 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:11:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30420 found at Wed Oct 18 15:11:08 UTC 2023 selfserv_9355 with PID 30420 started at Wed Oct 18 15:11:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30420 at Wed Oct 18 15:11:08 UTC 2023 kill -USR1 30420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30420 killed at Wed Oct 18 15:11:08 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30462 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30462 found at Wed Oct 18 15:11:08 UTC 2023 selfserv_9355 with PID 30462 started at Wed Oct 18 15:11:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30462 at Wed Oct 18 15:11:09 UTC 2023 kill -USR1 30462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30462 killed at Wed Oct 18 15:11:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30501 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30501 found at Wed Oct 18 15:11:09 UTC 2023 selfserv_9355 with PID 30501 started at Wed Oct 18 15:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 30501 at Wed Oct 18 15:11:09 UTC 2023 kill -USR1 30501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30501 killed at Wed Oct 18 15:11:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30540 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30540 found at Wed Oct 18 15:11:09 UTC 2023 selfserv_9355 with PID 30540 started at Wed Oct 18 15:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30540 at Wed Oct 18 15:11:09 UTC 2023 kill -USR1 30540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30540 killed at Wed Oct 18 15:11:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30579 found at Wed Oct 18 15:11:10 UTC 2023 selfserv_9355 with PID 30579 started at Wed Oct 18 15:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 30579 at Wed Oct 18 15:11:10 UTC 2023 kill -USR1 30579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30579 killed at Wed Oct 18 15:11:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30618 found at Wed Oct 18 15:11:10 UTC 2023 selfserv_9355 with PID 30618 started at Wed Oct 18 15:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30618 at Wed Oct 18 15:11:10 UTC 2023 kill -USR1 30618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30618 killed at Wed Oct 18 15:11:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30657 found at Wed Oct 18 15:11:10 UTC 2023 selfserv_9355 with PID 30657 started at Wed Oct 18 15:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30657 at Wed Oct 18 15:11:10 UTC 2023 kill -USR1 30657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30657 killed at Wed Oct 18 15:11:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30696 found at Wed Oct 18 15:11:11 UTC 2023 selfserv_9355 with PID 30696 started at Wed Oct 18 15:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30696 at Wed Oct 18 15:11:11 UTC 2023 kill -USR1 30696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30696 killed at Wed Oct 18 15:11:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30735 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30735 found at Wed Oct 18 15:11:11 UTC 2023 selfserv_9355 with PID 30735 started at Wed Oct 18 15:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30735 at Wed Oct 18 15:11:11 UTC 2023 kill -USR1 30735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30735 killed at Wed Oct 18 15:11:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30774 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30774 found at Wed Oct 18 15:11:12 UTC 2023 selfserv_9355 with PID 30774 started at Wed Oct 18 15:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30774 at Wed Oct 18 15:11:12 UTC 2023 kill -USR1 30774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30774 killed at Wed Oct 18 15:11:12 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30813 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30813 found at Wed Oct 18 15:11:12 UTC 2023 selfserv_9355 with PID 30813 started at Wed Oct 18 15:11:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30813 at Wed Oct 18 15:11:12 UTC 2023 kill -USR1 30813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30813 killed at Wed Oct 18 15:11:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30853 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30853 found at Wed Oct 18 15:11:12 UTC 2023 selfserv_9355 with PID 30853 started at Wed Oct 18 15:11:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30853 at Wed Oct 18 15:11:12 UTC 2023 kill -USR1 30853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30853 killed at Wed Oct 18 15:11:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30893 found at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 with PID 30893 started at Wed Oct 18 15:11:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30893 at Wed Oct 18 15:11:13 UTC 2023 kill -USR1 30893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30893 killed at Wed Oct 18 15:11:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30933 found at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 with PID 30933 started at Wed Oct 18 15:11:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30933 at Wed Oct 18 15:11:13 UTC 2023 kill -USR1 30933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30933 killed at Wed Oct 18 15:11:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30973 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30973 found at Wed Oct 18 15:11:13 UTC 2023 selfserv_9355 with PID 30973 started at Wed Oct 18 15:11:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30973 at Wed Oct 18 15:11:14 UTC 2023 kill -USR1 30973 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30973 killed at Wed Oct 18 15:11:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31013 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31013 found at Wed Oct 18 15:11:14 UTC 2023 selfserv_9355 with PID 31013 started at Wed Oct 18 15:11:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31013 at Wed Oct 18 15:11:14 UTC 2023 kill -USR1 31013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31013 killed at Wed Oct 18 15:11:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31053 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31053 found at Wed Oct 18 15:11:14 UTC 2023 selfserv_9355 with PID 31053 started at Wed Oct 18 15:11:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31053 at Wed Oct 18 15:11:14 UTC 2023 kill -USR1 31053 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31053 killed at Wed Oct 18 15:11:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31093 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31093 found at Wed Oct 18 15:11:15 UTC 2023 selfserv_9355 with PID 31093 started at Wed Oct 18 15:11:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31093 at Wed Oct 18 15:11:15 UTC 2023 kill -USR1 31093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31093 killed at Wed Oct 18 15:11:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:11:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31133 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31133 found at Wed Oct 18 15:11:15 UTC 2023 selfserv_9355 with PID 31133 started at Wed Oct 18 15:11:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31133 at Wed Oct 18 15:11:15 UTC 2023 kill -USR1 31133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31133 killed at Wed Oct 18 15:11:15 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 15:11:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 31258 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31258 found at Wed Oct 18 15:11:16 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv_9355 with PID 31258 started at Wed Oct 18 15:11:16 UTC 2023 selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 31258 at Wed Oct 18 15:11:25 UTC 2023 kill -USR1 31258 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31258 killed at Wed Oct 18 15:11:25 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:11:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 31815 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31815 found at Wed Oct 18 15:11:25 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 31815 started at Wed Oct 18 15:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31815 at Wed Oct 18 15:11:40 UTC 2023 kill -USR1 31815 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31815 killed at Wed Oct 18 15:11:40 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 15:11:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32612 found at Wed Oct 18 15:11:41 UTC 2023 selfserv_9355 with PID 32612 started at Wed Oct 18 15:11:41 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32612 at Wed Oct 18 15:11:41 UTC 2023 kill -USR1 32612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32612 killed at Wed Oct 18 15:11:41 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:11:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32690 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32690 found at Wed Oct 18 15:11:41 UTC 2023 selfserv_9355 with PID 32690 started at Wed Oct 18 15:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32690 at Wed Oct 18 15:11:42 UTC 2023 kill -USR1 32690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32690 killed at Wed Oct 18 15:11:42 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:11:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32742 found at Wed Oct 18 15:11:42 UTC 2023 selfserv_9355 with PID 32742 started at Wed Oct 18 15:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32742 at Wed Oct 18 15:12:06 UTC 2023 kill -USR1 32742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32742 killed at Wed Oct 18 15:12:06 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 328 found at Wed Oct 18 15:12:06 UTC 2023 selfserv_9355 with PID 328 started at Wed Oct 18 15:12:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 328 at Wed Oct 18 15:12:07 UTC 2023 kill -USR1 328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 328 killed at Wed Oct 18 15:12:07 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 397 found at Wed Oct 18 15:12:07 UTC 2023 selfserv_9355 with PID 397 started at Wed Oct 18 15:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 397 at Wed Oct 18 15:12:08 UTC 2023 kill -USR1 397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 397 killed at Wed Oct 18 15:12:08 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:12:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 451 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 451 found at Wed Oct 18 15:12:08 UTC 2023 selfserv_9355 with PID 451 started at Wed Oct 18 15:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 451 at Wed Oct 18 15:12:31 UTC 2023 kill -USR1 451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 451 killed at Wed Oct 18 15:12:31 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 517 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 517 found at Wed Oct 18 15:12:31 UTC 2023 selfserv_9355 with PID 517 started at Wed Oct 18 15:12:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 517 at Wed Oct 18 15:12:32 UTC 2023 kill -USR1 517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 517 killed at Wed Oct 18 15:12:32 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 603 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 603 found at Wed Oct 18 15:12:32 UTC 2023 selfserv_9355 with PID 603 started at Wed Oct 18 15:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 603 at Wed Oct 18 15:12:33 UTC 2023 kill -USR1 603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 603 killed at Wed Oct 18 15:12:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:12:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 663 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 663 found at Wed Oct 18 15:12:33 UTC 2023 selfserv_9355 with PID 663 started at Wed Oct 18 15:12:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 663 at Wed Oct 18 15:12:57 UTC 2023 kill -USR1 663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 663 killed at Wed Oct 18 15:12:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 715 found at Wed Oct 18 15:12:57 UTC 2023 selfserv_9355 with PID 715 started at Wed Oct 18 15:12:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 715 at Wed Oct 18 15:12:58 UTC 2023 kill -USR1 715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 715 killed at Wed Oct 18 15:12:58 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:12:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 779 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 779 found at Wed Oct 18 15:12:58 UTC 2023 selfserv_9355 with PID 779 started at Wed Oct 18 15:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 779 at Wed Oct 18 15:12:59 UTC 2023 kill -USR1 779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 779 killed at Wed Oct 18 15:12:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:12:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 831 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 831 found at Wed Oct 18 15:12:59 UTC 2023 selfserv_9355 with PID 831 started at Wed Oct 18 15:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 831 at Wed Oct 18 15:13:23 UTC 2023 kill -USR1 831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 831 killed at Wed Oct 18 15:13:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 905 found at Wed Oct 18 15:13:23 UTC 2023 selfserv_9355 with PID 905 started at Wed Oct 18 15:13:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 905 at Wed Oct 18 15:13:24 UTC 2023 kill -USR1 905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 905 killed at Wed Oct 18 15:13:24 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 973 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 973 found at Wed Oct 18 15:13:24 UTC 2023 selfserv_9355 with PID 973 started at Wed Oct 18 15:13:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 973 at Wed Oct 18 15:13:25 UTC 2023 kill -USR1 973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 973 killed at Wed Oct 18 15:13:25 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:13:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1029 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1029 found at Wed Oct 18 15:13:25 UTC 2023 selfserv_9355 with PID 1029 started at Wed Oct 18 15:13:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1029 at Wed Oct 18 15:13:48 UTC 2023 kill -USR1 1029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1029 killed at Wed Oct 18 15:13:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1081 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1081 found at Wed Oct 18 15:13:48 UTC 2023 selfserv_9355 with PID 1081 started at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1081 at Wed Oct 18 15:13:49 UTC 2023 kill -USR1 1081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1081 killed at Wed Oct 18 15:13:49 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1137 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1137 found at Wed Oct 18 15:13:49 UTC 2023 selfserv_9355 with PID 1137 started at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1137 at Wed Oct 18 15:13:50 UTC 2023 kill -USR1 1137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1137 killed at Wed Oct 18 15:13:50 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1193 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1193 found at Wed Oct 18 15:13:50 UTC 2023 selfserv_9355 with PID 1193 started at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1193 at Wed Oct 18 15:13:50 UTC 2023 kill -USR1 1193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1193 killed at Wed Oct 18 15:13:50 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:13:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1249 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1249 found at Wed Oct 18 15:13:50 UTC 2023 selfserv_9355 with PID 1249 started at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1249 at Wed Oct 18 15:13:51 UTC 2023 kill -USR1 1249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1249 killed at Wed Oct 18 15:13:51 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:13:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1309 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1309 found at Wed Oct 18 15:13:51 UTC 2023 selfserv_9355 with PID 1309 started at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1309 at Wed Oct 18 15:14:15 UTC 2023 kill -USR1 1309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1309 killed at Wed Oct 18 15:14:15 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:14:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:14:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1361 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1361 found at Wed Oct 18 15:14:16 UTC 2023 selfserv_9355 with PID 1361 started at Wed Oct 18 15:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1361 at Wed Oct 18 15:14:16 UTC 2023 kill -USR1 1361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1361 killed at Wed Oct 18 15:14:16 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:14:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1421 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1421 found at Wed Oct 18 15:14:16 UTC 2023 selfserv_9355 with PID 1421 started at Wed Oct 18 15:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1421 at Wed Oct 18 15:14:40 UTC 2023 kill -USR1 1421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1421 killed at Wed Oct 18 15:14:40 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1484 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1484 found at Wed Oct 18 15:14:40 UTC 2023 selfserv_9355 with PID 1484 started at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1484 at Wed Oct 18 15:14:40 UTC 2023 kill -USR1 1484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1484 killed at Wed Oct 18 15:14:40 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1544 found at Wed Oct 18 15:14:40 UTC 2023 selfserv_9355 with PID 1544 started at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1544 at Wed Oct 18 15:15:05 UTC 2023 kill -USR1 1544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1544 killed at Wed Oct 18 15:15:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:15:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1596 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1596 found at Wed Oct 18 15:15:05 UTC 2023 selfserv_9355 with PID 1596 started at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1596 at Wed Oct 18 15:15:05 UTC 2023 kill -USR1 1596 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1596 killed at Wed Oct 18 15:15:05 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1656 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1656 found at Wed Oct 18 15:15:06 UTC 2023 selfserv_9355 with PID 1656 started at Wed Oct 18 15:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1656 at Wed Oct 18 15:15:30 UTC 2023 kill -USR1 1656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1656 killed at Wed Oct 18 15:15:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:15:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1775 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1775 found at Wed Oct 18 15:15:30 UTC 2023 selfserv_9355 with PID 1775 started at Wed Oct 18 15:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1775 at Wed Oct 18 15:15:31 UTC 2023 kill -USR1 1775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1775 killed at Wed Oct 18 15:15:31 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:15:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1835 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1835 found at Wed Oct 18 15:15:31 UTC 2023 selfserv_9355 with PID 1835 started at Wed Oct 18 15:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1835 at Wed Oct 18 15:15:54 UTC 2023 kill -USR1 1835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1835 killed at Wed Oct 18 15:15:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:15:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1887 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1887 found at Wed Oct 18 15:15:54 UTC 2023 selfserv_9355 with PID 1887 started at Wed Oct 18 15:15:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1887 at Wed Oct 18 15:15:55 UTC 2023 kill -USR1 1887 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1887 killed at Wed Oct 18 15:15:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:15:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1939 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1939 found at Wed Oct 18 15:15:55 UTC 2023 selfserv_9355 with PID 1939 started at Wed Oct 18 15:15:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1939 at Wed Oct 18 15:15:56 UTC 2023 kill -USR1 1939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1939 killed at Wed Oct 18 15:15:56 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:15:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1991 found at Wed Oct 18 15:15:56 UTC 2023 selfserv_9355 with PID 1991 started at Wed Oct 18 15:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1991 at Wed Oct 18 15:15:56 UTC 2023 kill -USR1 1991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1991 killed at Wed Oct 18 15:15:57 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:15:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2049 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2049 found at Wed Oct 18 15:15:57 UTC 2023 selfserv_9355 with PID 2049 started at Wed Oct 18 15:15:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2049 at Wed Oct 18 15:15:57 UTC 2023 kill -USR1 2049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2049 killed at Wed Oct 18 15:15:57 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:15:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2107 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2107 found at Wed Oct 18 15:15:57 UTC 2023 selfserv_9355 with PID 2107 started at Wed Oct 18 15:15:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2107 at Wed Oct 18 15:15:57 UTC 2023 kill -USR1 2107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2107 killed at Wed Oct 18 15:15:58 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:15:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2165 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2165 found at Wed Oct 18 15:15:58 UTC 2023 selfserv_9355 with PID 2165 started at Wed Oct 18 15:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2165 at Wed Oct 18 15:15:58 UTC 2023 kill -USR1 2165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2165 killed at Wed Oct 18 15:15:58 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:15:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2223 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2223 found at Wed Oct 18 15:15:58 UTC 2023 selfserv_9355 with PID 2223 started at Wed Oct 18 15:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2223 at Wed Oct 18 15:15:58 UTC 2023 kill -USR1 2223 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2223 killed at Wed Oct 18 15:15:59 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 15:15:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2281 found at Wed Oct 18 15:15:59 UTC 2023 selfserv_9355 with PID 2281 started at Wed Oct 18 15:15:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2281 at Wed Oct 18 15:15:59 UTC 2023 kill -USR1 2281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2281 killed at Wed Oct 18 15:15:59 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 15:15:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:15:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2339 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2339 found at Wed Oct 18 15:15:59 UTC 2023 selfserv_9355 with PID 2339 started at Wed Oct 18 15:15:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2339 at Wed Oct 18 15:15:59 UTC 2023 kill -USR1 2339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2339 killed at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 15:16:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2397 found at Wed Oct 18 15:16:00 UTC 2023 selfserv_9355 with PID 2397 started at Wed Oct 18 15:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2397 at Wed Oct 18 15:16:00 UTC 2023 kill -USR1 2397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2397 killed at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:16:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2455 found at Wed Oct 18 15:16:00 UTC 2023 selfserv_9355 with PID 2455 started at Wed Oct 18 15:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2455 at Wed Oct 18 15:16:00 UTC 2023 kill -USR1 2455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2455 killed at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2513 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2513 found at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 with PID 2513 started at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2513 at Wed Oct 18 15:16:01 UTC 2023 kill -USR1 2513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2513 killed at Wed Oct 18 15:16:01 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2571 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2571 found at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 with PID 2571 started at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2571 at Wed Oct 18 15:16:01 UTC 2023 kill -USR1 2571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2571 killed at Wed Oct 18 15:16:01 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2613 found at Wed Oct 18 15:16:01 UTC 2023 selfserv_9355 with PID 2613 started at Wed Oct 18 15:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2613 at Wed Oct 18 15:16:02 UTC 2023 kill -USR1 2613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2613 killed at Wed Oct 18 15:16:02 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 15:16:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2655 found at Wed Oct 18 15:16:02 UTC 2023 selfserv_9355 with PID 2655 started at Wed Oct 18 15:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 2655 at Wed Oct 18 15:16:02 UTC 2023 kill -USR1 2655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2655 killed at Wed Oct 18 15:16:02 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 15:16:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2697 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2697 found at Wed Oct 18 15:16:02 UTC 2023 selfserv_9355 with PID 2697 started at Wed Oct 18 15:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 2697 at Wed Oct 18 15:16:02 UTC 2023 kill -USR1 2697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2697 killed at Wed Oct 18 15:16:03 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2739 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2739 found at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 with PID 2739 started at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 2739 at Wed Oct 18 15:16:03 UTC 2023 kill -USR1 2739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2739 killed at Wed Oct 18 15:16:03 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2781 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2781 found at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 with PID 2781 started at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 2781 at Wed Oct 18 15:16:03 UTC 2023 kill -USR1 2781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2781 killed at Wed Oct 18 15:16:03 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2823 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2823 found at Wed Oct 18 15:16:03 UTC 2023 selfserv_9355 with PID 2823 started at Wed Oct 18 15:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 2823 at Wed Oct 18 15:16:04 UTC 2023 kill -USR1 2823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2823 killed at Wed Oct 18 15:16:04 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 15:16:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2865 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2865 found at Wed Oct 18 15:16:04 UTC 2023 selfserv_9355 with PID 2865 started at Wed Oct 18 15:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 2865 at Wed Oct 18 15:16:04 UTC 2023 kill -USR1 2865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2865 killed at Wed Oct 18 15:16:04 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 15:16:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2907 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2907 found at Wed Oct 18 15:16:04 UTC 2023 selfserv_9355 with PID 2907 started at Wed Oct 18 15:16:04 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:16:04 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:16:42 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 2907 at Wed Oct 18 15:16:42 UTC 2023 kill -USR1 2907 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2907 killed at Wed Oct 18 15:16:42 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:16:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2969 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2969 found at Wed Oct 18 15:16:42 UTC 2023 selfserv_9355 with PID 2969 started at Wed Oct 18 15:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2969 at Wed Oct 18 15:16:42 UTC 2023 kill -USR1 2969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2969 killed at Wed Oct 18 15:16:42 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3011 found at Wed Oct 18 15:16:42 UTC 2023 selfserv_9355 with PID 3011 started at Wed Oct 18 15:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3011 at Wed Oct 18 15:16:43 UTC 2023 kill -USR1 3011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3011 killed at Wed Oct 18 15:16:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3050 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3050 found at Wed Oct 18 15:16:43 UTC 2023 selfserv_9355 with PID 3050 started at Wed Oct 18 15:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 3050 at Wed Oct 18 15:16:43 UTC 2023 kill -USR1 3050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3050 killed at Wed Oct 18 15:16:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3089 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3089 found at Wed Oct 18 15:16:43 UTC 2023 selfserv_9355 with PID 3089 started at Wed Oct 18 15:16:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3089 at Wed Oct 18 15:16:43 UTC 2023 kill -USR1 3089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3089 killed at Wed Oct 18 15:16:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3128 found at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 with PID 3128 started at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 3128 at Wed Oct 18 15:16:44 UTC 2023 kill -USR1 3128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3128 killed at Wed Oct 18 15:16:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3167 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3167 found at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 with PID 3167 started at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3167 at Wed Oct 18 15:16:44 UTC 2023 kill -USR1 3167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3167 killed at Wed Oct 18 15:16:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3206 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3206 found at Wed Oct 18 15:16:44 UTC 2023 selfserv_9355 with PID 3206 started at Wed Oct 18 15:16:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3206 at Wed Oct 18 15:16:45 UTC 2023 kill -USR1 3206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3206 killed at Wed Oct 18 15:16:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3245 found at Wed Oct 18 15:16:45 UTC 2023 selfserv_9355 with PID 3245 started at Wed Oct 18 15:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3245 at Wed Oct 18 15:16:45 UTC 2023 kill -USR1 3245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3245 killed at Wed Oct 18 15:16:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3284 found at Wed Oct 18 15:16:45 UTC 2023 selfserv_9355 with PID 3284 started at Wed Oct 18 15:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3284 at Wed Oct 18 15:16:45 UTC 2023 kill -USR1 3284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3284 killed at Wed Oct 18 15:16:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3323 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3323 found at Wed Oct 18 15:16:46 UTC 2023 selfserv_9355 with PID 3323 started at Wed Oct 18 15:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3323 at Wed Oct 18 15:16:46 UTC 2023 kill -USR1 3323 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3323 killed at Wed Oct 18 15:16:46 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3362 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3362 found at Wed Oct 18 15:16:46 UTC 2023 selfserv_9355 with PID 3362 started at Wed Oct 18 15:16:46 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3362 at Wed Oct 18 15:16:46 UTC 2023 kill -USR1 3362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3362 killed at Wed Oct 18 15:16:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3402 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3402 found at Wed Oct 18 15:16:46 UTC 2023 selfserv_9355 with PID 3402 started at Wed Oct 18 15:16:46 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3402 at Wed Oct 18 15:16:47 UTC 2023 kill -USR1 3402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3402 killed at Wed Oct 18 15:16:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3442 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3442 found at Wed Oct 18 15:16:47 UTC 2023 selfserv_9355 with PID 3442 started at Wed Oct 18 15:16:47 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3442 at Wed Oct 18 15:16:47 UTC 2023 kill -USR1 3442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3442 killed at Wed Oct 18 15:16:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3482 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3482 found at Wed Oct 18 15:16:47 UTC 2023 selfserv_9355 with PID 3482 started at Wed Oct 18 15:16:47 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3482 at Wed Oct 18 15:16:47 UTC 2023 kill -USR1 3482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3482 killed at Wed Oct 18 15:16:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3522 found at Wed Oct 18 15:16:48 UTC 2023 selfserv_9355 with PID 3522 started at Wed Oct 18 15:16:48 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3522 at Wed Oct 18 15:16:48 UTC 2023 kill -USR1 3522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3522 killed at Wed Oct 18 15:16:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3562 found at Wed Oct 18 15:16:48 UTC 2023 selfserv_9355 with PID 3562 started at Wed Oct 18 15:16:48 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3562 at Wed Oct 18 15:16:48 UTC 2023 kill -USR1 3562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3562 killed at Wed Oct 18 15:16:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3602 found at Wed Oct 18 15:16:48 UTC 2023 selfserv_9355 with PID 3602 started at Wed Oct 18 15:16:48 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3602 at Wed Oct 18 15:16:48 UTC 2023 kill -USR1 3602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3602 killed at Wed Oct 18 15:16:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3642 found at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 with PID 3642 started at Wed Oct 18 15:16:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3642 at Wed Oct 18 15:16:49 UTC 2023 kill -USR1 3642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3642 killed at Wed Oct 18 15:16:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3682 found at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 with PID 3682 started at Wed Oct 18 15:16:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3682 at Wed Oct 18 15:16:49 UTC 2023 kill -USR1 3682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3682 killed at Wed Oct 18 15:16:49 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 3722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3722 found at Wed Oct 18 15:16:49 UTC 2023 selfserv_9355 with PID 3722 started at Wed Oct 18 15:16:49 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 3722 at Wed Oct 18 15:16:58 UTC 2023 kill -USR1 3722 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3722 killed at Wed Oct 18 15:16:58 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 15:16:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 4271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4271 found at Wed Oct 18 15:16:59 UTC 2023 selfserv_9355 with PID 4271 started at Wed Oct 18 15:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4271 at Wed Oct 18 15:17:11 UTC 2023 kill -USR1 4271 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4271 killed at Wed Oct 18 15:17:11 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:17:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:17:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5093 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5093 found at Wed Oct 18 15:17:12 UTC 2023 selfserv_9355 with PID 5093 started at Wed Oct 18 15:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5093 at Wed Oct 18 15:17:12 UTC 2023 kill -USR1 5093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5093 killed at Wed Oct 18 15:17:12 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:17:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5145 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5145 found at Wed Oct 18 15:17:12 UTC 2023 selfserv_9355 with PID 5145 started at Wed Oct 18 15:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5145 at Wed Oct 18 15:17:37 UTC 2023 kill -USR1 5145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5145 killed at Wed Oct 18 15:17:37 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:17:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:17:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5208 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5208 found at Wed Oct 18 15:17:38 UTC 2023 selfserv_9355 with PID 5208 started at Wed Oct 18 15:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5208 at Wed Oct 18 15:17:38 UTC 2023 kill -USR1 5208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5208 killed at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:17:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5272 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5272 found at Wed Oct 18 15:17:38 UTC 2023 selfserv_9355 with PID 5272 started at Wed Oct 18 15:17:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5272 at Wed Oct 18 15:17:38 UTC 2023 kill -USR1 5272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5272 killed at Wed Oct 18 15:17:39 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:17:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:17:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5324 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5324 found at Wed Oct 18 15:17:39 UTC 2023 selfserv_9355 with PID 5324 started at Wed Oct 18 15:17:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5324 at Wed Oct 18 15:18:02 UTC 2023 kill -USR1 5324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5324 killed at Wed Oct 18 15:18:02 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5376 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5376 found at Wed Oct 18 15:18:02 UTC 2023 selfserv_9355 with PID 5376 started at Wed Oct 18 15:18:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5376 at Wed Oct 18 15:18:03 UTC 2023 kill -USR1 5376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5376 killed at Wed Oct 18 15:18:03 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5440 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5440 found at Wed Oct 18 15:18:03 UTC 2023 selfserv_9355 with PID 5440 started at Wed Oct 18 15:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5440 at Wed Oct 18 15:18:03 UTC 2023 kill -USR1 5440 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5440 killed at Wed Oct 18 15:18:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:18:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5492 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5492 found at Wed Oct 18 15:18:03 UTC 2023 selfserv_9355 with PID 5492 started at Wed Oct 18 15:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5492 at Wed Oct 18 15:18:29 UTC 2023 kill -USR1 5492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5492 killed at Wed Oct 18 15:18:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5555 found at Wed Oct 18 15:18:29 UTC 2023 selfserv_9355 with PID 5555 started at Wed Oct 18 15:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5555 at Wed Oct 18 15:18:29 UTC 2023 kill -USR1 5555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5555 killed at Wed Oct 18 15:18:29 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5619 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5619 found at Wed Oct 18 15:18:29 UTC 2023 selfserv_9355 with PID 5619 started at Wed Oct 18 15:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5619 at Wed Oct 18 15:18:30 UTC 2023 kill -USR1 5619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5619 killed at Wed Oct 18 15:18:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:18:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5671 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5671 found at Wed Oct 18 15:18:30 UTC 2023 selfserv_9355 with PID 5671 started at Wed Oct 18 15:18:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5671 at Wed Oct 18 15:18:55 UTC 2023 kill -USR1 5671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5671 killed at Wed Oct 18 15:18:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5723 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5723 found at Wed Oct 18 15:18:55 UTC 2023 selfserv_9355 with PID 5723 started at Wed Oct 18 15:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5723 at Wed Oct 18 15:18:56 UTC 2023 kill -USR1 5723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5723 killed at Wed Oct 18 15:18:56 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:18:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5787 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5787 found at Wed Oct 18 15:18:56 UTC 2023 selfserv_9355 with PID 5787 started at Wed Oct 18 15:18:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5787 at Wed Oct 18 15:18:57 UTC 2023 kill -USR1 5787 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5787 killed at Wed Oct 18 15:18:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:18:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:18:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5839 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5839 found at Wed Oct 18 15:18:57 UTC 2023 selfserv_9355 with PID 5839 started at Wed Oct 18 15:18:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5839 at Wed Oct 18 15:19:20 UTC 2023 kill -USR1 5839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5839 killed at Wed Oct 18 15:19:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:19:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5896 found at Wed Oct 18 15:19:20 UTC 2023 selfserv_9355 with PID 5896 started at Wed Oct 18 15:19:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5896 at Wed Oct 18 15:19:21 UTC 2023 kill -USR1 5896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5896 killed at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:19:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5954 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5954 found at Wed Oct 18 15:19:21 UTC 2023 selfserv_9355 with PID 5954 started at Wed Oct 18 15:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5954 at Wed Oct 18 15:19:21 UTC 2023 kill -USR1 5954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5954 killed at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:19:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6010 found at Wed Oct 18 15:19:22 UTC 2023 selfserv_9355 with PID 6010 started at Wed Oct 18 15:19:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6010 at Wed Oct 18 15:19:22 UTC 2023 kill -USR1 6010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6010 killed at Wed Oct 18 15:19:22 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:19:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6068 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6068 found at Wed Oct 18 15:19:22 UTC 2023 selfserv_9355 with PID 6068 started at Wed Oct 18 15:19:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6068 at Wed Oct 18 15:19:22 UTC 2023 kill -USR1 6068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6068 killed at Wed Oct 18 15:19:23 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:19:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6128 found at Wed Oct 18 15:19:23 UTC 2023 selfserv_9355 with PID 6128 started at Wed Oct 18 15:19:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6128 at Wed Oct 18 15:19:48 UTC 2023 kill -USR1 6128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6128 killed at Wed Oct 18 15:19:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:19:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6182 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6182 found at Wed Oct 18 15:19:48 UTC 2023 selfserv_9355 with PID 6182 started at Wed Oct 18 15:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6182 at Wed Oct 18 15:19:48 UTC 2023 kill -USR1 6182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6182 killed at Wed Oct 18 15:19:49 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:19:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6242 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6242 found at Wed Oct 18 15:19:49 UTC 2023 selfserv_9355 with PID 6242 started at Wed Oct 18 15:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6242 at Wed Oct 18 15:20:12 UTC 2023 kill -USR1 6242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6242 killed at Wed Oct 18 15:20:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:20:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:20:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6294 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6294 found at Wed Oct 18 15:20:12 UTC 2023 selfserv_9355 with PID 6294 started at Wed Oct 18 15:20:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6294 at Wed Oct 18 15:20:13 UTC 2023 kill -USR1 6294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6294 killed at Wed Oct 18 15:20:13 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:20:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6354 found at Wed Oct 18 15:20:13 UTC 2023 selfserv_9355 with PID 6354 started at Wed Oct 18 15:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6354 at Wed Oct 18 15:20:38 UTC 2023 kill -USR1 6354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6354 killed at Wed Oct 18 15:20:38 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:20:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:20:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6417 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6417 found at Wed Oct 18 15:20:38 UTC 2023 selfserv_9355 with PID 6417 started at Wed Oct 18 15:20:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6417 at Wed Oct 18 15:20:39 UTC 2023 kill -USR1 6417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6417 killed at Wed Oct 18 15:20:39 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:20:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:20:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6477 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6477 found at Wed Oct 18 15:20:39 UTC 2023 selfserv_9355 with PID 6477 started at Wed Oct 18 15:20:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6477 at Wed Oct 18 15:21:04 UTC 2023 kill -USR1 6477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6477 killed at Wed Oct 18 15:21:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:21:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6529 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6529 found at Wed Oct 18 15:21:04 UTC 2023 selfserv_9355 with PID 6529 started at Wed Oct 18 15:21:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6529 at Wed Oct 18 15:21:05 UTC 2023 kill -USR1 6529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6529 killed at Wed Oct 18 15:21:05 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:21:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6589 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6589 found at Wed Oct 18 15:21:05 UTC 2023 selfserv_9355 with PID 6589 started at Wed Oct 18 15:21:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6589 at Wed Oct 18 15:21:28 UTC 2023 kill -USR1 6589 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6589 killed at Wed Oct 18 15:21:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:21:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6652 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6652 found at Wed Oct 18 15:21:28 UTC 2023 selfserv_9355 with PID 6652 started at Wed Oct 18 15:21:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6652 at Wed Oct 18 15:21:29 UTC 2023 kill -USR1 6652 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6652 killed at Wed Oct 18 15:21:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:21:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6704 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6704 found at Wed Oct 18 15:21:29 UTC 2023 selfserv_9355 with PID 6704 started at Wed Oct 18 15:21:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6704 at Wed Oct 18 15:21:29 UTC 2023 kill -USR1 6704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6704 killed at Wed Oct 18 15:21:29 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:21:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6756 found at Wed Oct 18 15:21:30 UTC 2023 selfserv_9355 with PID 6756 started at Wed Oct 18 15:21:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6756 at Wed Oct 18 15:21:30 UTC 2023 kill -USR1 6756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6756 killed at Wed Oct 18 15:21:30 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 15:21:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6838 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6838 found at Wed Oct 18 15:21:30 UTC 2023 selfserv_9355 with PID 6838 started at Wed Oct 18 15:21:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6838 at Wed Oct 18 15:21:30 UTC 2023 kill -USR1 6838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6838 killed at Wed Oct 18 15:21:31 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6880 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6880 found at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 with PID 6880 started at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6880 at Wed Oct 18 15:21:31 UTC 2023 kill -USR1 6880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6880 killed at Wed Oct 18 15:21:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6919 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6919 found at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 with PID 6919 started at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 6919 at Wed Oct 18 15:21:31 UTC 2023 kill -USR1 6919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6919 killed at Wed Oct 18 15:21:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6958 found at Wed Oct 18 15:21:31 UTC 2023 selfserv_9355 with PID 6958 started at Wed Oct 18 15:21:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6958 at Wed Oct 18 15:21:32 UTC 2023 kill -USR1 6958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6958 killed at Wed Oct 18 15:21:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6997 found at Wed Oct 18 15:21:32 UTC 2023 selfserv_9355 with PID 6997 started at Wed Oct 18 15:21:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 6997 at Wed Oct 18 15:21:32 UTC 2023 kill -USR1 6997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6997 killed at Wed Oct 18 15:21:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7036 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7036 found at Wed Oct 18 15:21:32 UTC 2023 selfserv_9355 with PID 7036 started at Wed Oct 18 15:21:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7036 at Wed Oct 18 15:21:32 UTC 2023 kill -USR1 7036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7036 killed at Wed Oct 18 15:21:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7075 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7075 found at Wed Oct 18 15:21:33 UTC 2023 selfserv_9355 with PID 7075 started at Wed Oct 18 15:21:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7075 at Wed Oct 18 15:21:33 UTC 2023 kill -USR1 7075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7075 killed at Wed Oct 18 15:21:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7114 found at Wed Oct 18 15:21:33 UTC 2023 selfserv_9355 with PID 7114 started at Wed Oct 18 15:21:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7114 at Wed Oct 18 15:21:33 UTC 2023 kill -USR1 7114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7114 killed at Wed Oct 18 15:21:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7153 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7153 found at Wed Oct 18 15:21:33 UTC 2023 selfserv_9355 with PID 7153 started at Wed Oct 18 15:21:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7153 at Wed Oct 18 15:21:34 UTC 2023 kill -USR1 7153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7153 killed at Wed Oct 18 15:21:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7192 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7192 found at Wed Oct 18 15:21:34 UTC 2023 selfserv_9355 with PID 7192 started at Wed Oct 18 15:21:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7192 at Wed Oct 18 15:21:34 UTC 2023 kill -USR1 7192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7192 killed at Wed Oct 18 15:21:34 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7231 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7231 found at Wed Oct 18 15:21:34 UTC 2023 selfserv_9355 with PID 7231 started at Wed Oct 18 15:21:34 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7231 at Wed Oct 18 15:21:34 UTC 2023 kill -USR1 7231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7231 killed at Wed Oct 18 15:21:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7271 found at Wed Oct 18 15:21:35 UTC 2023 selfserv_9355 with PID 7271 started at Wed Oct 18 15:21:35 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7271 at Wed Oct 18 15:21:35 UTC 2023 kill -USR1 7271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7271 killed at Wed Oct 18 15:21:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7311 found at Wed Oct 18 15:21:35 UTC 2023 selfserv_9355 with PID 7311 started at Wed Oct 18 15:21:35 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7311 at Wed Oct 18 15:21:35 UTC 2023 kill -USR1 7311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7311 killed at Wed Oct 18 15:21:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7351 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7351 found at Wed Oct 18 15:21:35 UTC 2023 selfserv_9355 with PID 7351 started at Wed Oct 18 15:21:35 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7351 at Wed Oct 18 15:21:35 UTC 2023 kill -USR1 7351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7351 killed at Wed Oct 18 15:21:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7391 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7391 found at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 with PID 7391 started at Wed Oct 18 15:21:36 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7391 at Wed Oct 18 15:21:36 UTC 2023 kill -USR1 7391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7391 killed at Wed Oct 18 15:21:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7431 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7431 found at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 with PID 7431 started at Wed Oct 18 15:21:36 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7431 at Wed Oct 18 15:21:36 UTC 2023 kill -USR1 7431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7431 killed at Wed Oct 18 15:21:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7471 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7471 found at Wed Oct 18 15:21:36 UTC 2023 selfserv_9355 with PID 7471 started at Wed Oct 18 15:21:36 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7471 at Wed Oct 18 15:21:37 UTC 2023 kill -USR1 7471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7471 killed at Wed Oct 18 15:21:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7511 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7511 found at Wed Oct 18 15:21:37 UTC 2023 selfserv_9355 with PID 7511 started at Wed Oct 18 15:21:37 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7511 at Wed Oct 18 15:21:37 UTC 2023 kill -USR1 7511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7511 killed at Wed Oct 18 15:21:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 15:21:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:21:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7551 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7551 found at Wed Oct 18 15:21:37 UTC 2023 selfserv_9355 with PID 7551 started at Wed Oct 18 15:21:37 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7551 at Wed Oct 18 15:21:37 UTC 2023 kill -USR1 7551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7551 killed at Wed Oct 18 15:21:38 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 15:21:38 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 15:21:38 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 15:21:38 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Wed Oct 18 15:21:38 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed Oct 18 15:21:38 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 15:21:38 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152139 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018152207Z nextupdate=20241018152207Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 15:22:07 2023 Next Update: Fri Oct 18 15:22:07 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018152208Z addcert 2 20231018152208Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 15:22:08 2023 Next Update: Fri Oct 18 15:22:07 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:08 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018152208Z nextupdate=20241018152208Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 15:22:08 2023 Next Update: Fri Oct 18 15:22:08 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018152209Z addcert 2 20231018152209Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 15:22:09 2023 Next Update: Fri Oct 18 15:22:08 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:09 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018152210Z addcert 4 20231018152210Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 15:22:10 2023 Next Update: Fri Oct 18 15:22:08 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:09 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 15:22:10 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018152211Z nextupdate=20241018152211Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 15:22:11 2023 Next Update: Fri Oct 18 15:22:11 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018152212Z addcert 2 20231018152212Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 15:22:12 2023 Next Update: Fri Oct 18 15:22:11 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:12 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018152213Z addcert 3 20231018152213Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 15:22:13 2023 Next Update: Fri Oct 18 15:22:11 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:12 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 15:22:13 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018152213Z nextupdate=20241018152213Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 15:22:13 2023 Next Update: Fri Oct 18 15:22:13 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018152214Z addcert 2 20231018152214Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 15:22:14 2023 Next Update: Fri Oct 18 15:22:13 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:14 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018152215Z addcert 3 20231018152215Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 15:22:15 2023 Next Update: Fri Oct 18 15:22:13 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 15:22:14 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 15:22:15 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152140 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152141 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018152142 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018152143 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018152144 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018152145 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018152146 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018152147 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018152148 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018152149 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018152150 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018152151 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018152152 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018152153 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018152154 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018152155 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 15:22:52 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 15:22:52 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 9843 >/dev/null 2>/dev/null httpserv with PID 9843 found at Wed Oct 18 15:22:52 UTC 2023 httpserv with PID 9843 started at Wed Oct 18 15:22:52 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152140 (0x3cafc4cc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:22:29 2023 Not After : Wed Oct 18 15:22:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7f:f4:46:af:17:c9:81:b9:c1:2a:34:d1:b8:6d:3b: f9:5e:32:f8:1b:a5:54:0d:3f:06:7b:41:f2:71:ae:e5: 8c:ab:f3:b2:50:e3:2f:ea:d5:44:c0:87:cd:a3:87:eb: f5:9e:32:e7:1b:1c:ff:f7:70:73:cd:13:ea:c4:47:82: 87:27:bd:08:08:49:d0:bc:52:29:c0:96:0f:da:6b:52: a5:ee:e5:bc:cf:e0:3c:fb:8e:fa:a8:d6:4f:44:c5:0b: be:58:b9:05:a9:41:64:f7:d8:63:f4:4e:66:d6:32:a4: 67:cd:29:c7:1d:48:78:35:a1:0a:b4:38:9e:fc:c9:64: 4d:f6:f2:a9:99:ca:39:c2:20:3f:d4:97:83:ce:25:c9: a9:3f:c7:ad:6e:a3:30:63:2c:94:99:18:4f:42:c0:c5: a4:36:f3:4d:0f:66:a9:7c:34:a1:06:77:60:82:0b:41: 7f:b1:ea:a8:a0:48:b3:ca:b0:08:b4:2f:64:4a:da:a6: 48:58:f7:65:f6:80:b8:ea:6f:c2:74:25:14:78:75:e9: 2a:4a:78:94:19:dd:c9:c9:93:ff:6c:79:d7:e8:ae:36: 16:35:fe:7c:7c:c5:a5:9c:8a:4d:fd:91:b6:42:ba:4a: d8:23:d7:07:9e:8e:96:aa:40:19:12:ad:62:38:91:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:67:b7:1c:a0:2b:71:c6:d0:b5:6a:3a:ff:15:e5:4d: 6e:43:43:17:4a:d4:eb:01:6e:37:e6:3a:26:f5:00:94: 4d:c0:6b:32:ff:c6:6e:6b:84:88:0f:8d:da:4a:71:da: 2f:4f:5d:41:5d:7b:aa:0d:ca:f7:c9:3f:e3:21:95:a8: 6a:86:6d:95:7b:4f:c1:cc:31:e6:1b:23:63:49:3a:d4: 5c:0e:73:51:b2:06:66:08:dd:4a:1f:82:da:28:a3:8b: d5:3e:5d:59:6d:7d:58:20:0d:00:ce:53:83:c5:66:be: 2c:f2:07:33:ea:45:eb:a7:f1:61:71:22:95:9e:0a:8a: 5a:d7:63:48:2c:78:e9:0f:9d:59:f7:fd:ee:74:04:28: 42:0b:69:33:cc:65:1f:ea:35:78:b4:ef:fe:d1:8e:a1: ee:49:a2:40:19:9c:a9:0a:44:c4:f9:6d:bb:b2:28:15: ad:1f:12:81:20:3f:ff:7a:7c:c8:a7:d4:54:b6:2a:51: b8:af:54:d4:0d:de:5d:bd:b6:62:2e:c3:ad:53:3e:27: cc:42:c5:82:6d:f9:9f:6e:bf:fb:b0:35:a1:f8:c6:c9: 0f:7f:6c:6c:d5:47:7f:64:9e:51:67:aa:c9:bc:8f:28: ea:3f:c3:8b:aa:69:b7:14:df:3a:01:42:80:c5:73:7d Fingerprint (SHA-256): 1E:BB:9D:FD:84:E0:7D:96:2E:09:71:D2:CD:76:D4:91:FB:E5:21:F1:0E:CB:77:EE:51:95:86:D7:FC:19:83:FE Fingerprint (SHA1): 1E:BE:9D:9A:56:C1:46:64:ED:6E:B7:D0:29:AC:0E:2B:4C:BC:D2:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152139 (0x3cafc4cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 15:21:39 2023 Not After : Wed Oct 18 15:21:39 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:dd:54:6b:54:fe:71:cb:f1:ff:71:4f:21:fc:23:ee: 41:90:95:fd:11:ec:50:a2:12:9a:56:92:53:0a:4f:49: cd:4d:a9:9e:ef:ca:13:63:34:18:84:01:35:1d:90:52: 73:b5:87:84:0f:04:30:51:9f:4a:4b:3d:01:d2:43:e2: 39:f1:00:8d:7c:41:db:96:41:2f:89:cd:85:bc:af:96: e9:f7:64:7d:b1:b3:f4:5f:8f:31:9f:04:68:ed:98:b5: 0f:ef:ea:b4:6e:56:c8:17:c8:04:97:11:c3:15:a4:3d: e6:7d:66:9e:85:94:39:9c:7b:c3:0b:89:f1:d2:db:53: 37:41:ca:1f:14:7d:83:4d:42:cd:9a:1b:59:57:12:75: a3:a9:35:10:28:81:be:46:4e:d1:82:7e:e1:31:ea:49: 69:6a:a6:dd:bf:f9:57:17:bf:83:55:87:ea:34:18:34: b2:5d:8c:26:bd:fd:d3:f5:f8:6c:67:4b:74:aa:2f:72: 6d:e6:91:a4:a3:0a:9f:72:37:e4:45:96:b5:1a:2f:77: f0:b6:63:fa:58:07:d2:dd:2a:af:7a:fd:f0:d7:ab:f6: f8:ea:94:50:3a:19:98:87:22:e4:b2:7b:92:cc:30:93: ff:91:2d:9b:a2:9d:31:6b:a7:33:3f:c4:20:1f:85:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:22:4c:4f:2f:ae:3d:94:65:37:4b:ac:1c:08:6a:2c: b0:52:60:51:af:5d:6d:50:13:2f:84:fa:f9:91:4d:12: 21:13:0f:73:e7:cb:c7:ce:3b:e0:b3:55:43:61:e0:86: a7:6e:1b:48:54:aa:22:28:2c:a5:77:c4:61:ab:7b:5a: 54:68:1d:cf:36:3a:5f:8e:1d:f4:a4:8e:59:c6:e3:d8: 6d:f6:f3:9d:8e:07:d1:62:69:57:4b:1a:76:0f:cc:bf: d7:be:82:40:c8:79:10:82:e6:19:b9:5a:b4:63:c3:8e: 3b:31:89:5c:92:3a:b7:9b:be:11:01:8c:cd:cb:b6:0c: cf:f1:7b:4d:06:c8:bb:10:ac:6f:95:14:4f:35:a8:30: b1:30:6a:27:db:62:aa:b6:14:ac:4e:e0:3d:07:2a:97: 58:d9:5a:e5:b8:ce:b5:f4:a6:f9:2b:36:9e:11:87:86: c8:d3:70:72:29:31:1f:ce:fc:8f:3a:b1:f2:db:a5:ff: ff:51:d2:fb:b6:20:c2:70:f9:c0:a6:68:49:57:1f:bc: d1:d5:59:fa:e1:57:dd:11:44:99:b0:d5:c8:e4:59:1a: 4e:77:c8:b5:8f:6d:4c:1a:7b:15:67:0e:28:dc:88:fe: 27:59:e7:5a:89:7d:ac:05:ae:a8:6a:db:3c:b6:f1:49 Fingerprint (SHA-256): DA:AF:9E:C6:34:5A:15:0C:DF:86:AC:94:A7:42:BC:13:00:3E:4D:E4:88:72:E3:6F:E7:D1:4C:1E:C6:A4:F1:22 Fingerprint (SHA1): 5D:C5:02:87:59:18:BE:1F:60:96:95:D7:E3:AD:1B:51:52:EE:04:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 9843 at Wed Oct 18 15:22:53 UTC 2023 kill -USR1 9843 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 9843 killed at Wed Oct 18 15:22:53 UTC 2023 httpserv starting at Wed Oct 18 15:22:53 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 15:22:53 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 10045 >/dev/null 2>/dev/null httpserv with PID 10045 found at Wed Oct 18 15:22:53 UTC 2023 httpserv with PID 10045 started at Wed Oct 18 15:22:53 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152139 (0x3cafc4cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 15:21:39 2023 Not After : Wed Oct 18 15:21:39 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:dd:54:6b:54:fe:71:cb:f1:ff:71:4f:21:fc:23:ee: 41:90:95:fd:11:ec:50:a2:12:9a:56:92:53:0a:4f:49: cd:4d:a9:9e:ef:ca:13:63:34:18:84:01:35:1d:90:52: 73:b5:87:84:0f:04:30:51:9f:4a:4b:3d:01:d2:43:e2: 39:f1:00:8d:7c:41:db:96:41:2f:89:cd:85:bc:af:96: e9:f7:64:7d:b1:b3:f4:5f:8f:31:9f:04:68:ed:98:b5: 0f:ef:ea:b4:6e:56:c8:17:c8:04:97:11:c3:15:a4:3d: e6:7d:66:9e:85:94:39:9c:7b:c3:0b:89:f1:d2:db:53: 37:41:ca:1f:14:7d:83:4d:42:cd:9a:1b:59:57:12:75: a3:a9:35:10:28:81:be:46:4e:d1:82:7e:e1:31:ea:49: 69:6a:a6:dd:bf:f9:57:17:bf:83:55:87:ea:34:18:34: b2:5d:8c:26:bd:fd:d3:f5:f8:6c:67:4b:74:aa:2f:72: 6d:e6:91:a4:a3:0a:9f:72:37:e4:45:96:b5:1a:2f:77: f0:b6:63:fa:58:07:d2:dd:2a:af:7a:fd:f0:d7:ab:f6: f8:ea:94:50:3a:19:98:87:22:e4:b2:7b:92:cc:30:93: ff:91:2d:9b:a2:9d:31:6b:a7:33:3f:c4:20:1f:85:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:22:4c:4f:2f:ae:3d:94:65:37:4b:ac:1c:08:6a:2c: b0:52:60:51:af:5d:6d:50:13:2f:84:fa:f9:91:4d:12: 21:13:0f:73:e7:cb:c7:ce:3b:e0:b3:55:43:61:e0:86: a7:6e:1b:48:54:aa:22:28:2c:a5:77:c4:61:ab:7b:5a: 54:68:1d:cf:36:3a:5f:8e:1d:f4:a4:8e:59:c6:e3:d8: 6d:f6:f3:9d:8e:07:d1:62:69:57:4b:1a:76:0f:cc:bf: d7:be:82:40:c8:79:10:82:e6:19:b9:5a:b4:63:c3:8e: 3b:31:89:5c:92:3a:b7:9b:be:11:01:8c:cd:cb:b6:0c: cf:f1:7b:4d:06:c8:bb:10:ac:6f:95:14:4f:35:a8:30: b1:30:6a:27:db:62:aa:b6:14:ac:4e:e0:3d:07:2a:97: 58:d9:5a:e5:b8:ce:b5:f4:a6:f9:2b:36:9e:11:87:86: c8:d3:70:72:29:31:1f:ce:fc:8f:3a:b1:f2:db:a5:ff: ff:51:d2:fb:b6:20:c2:70:f9:c0:a6:68:49:57:1f:bc: d1:d5:59:fa:e1:57:dd:11:44:99:b0:d5:c8:e4:59:1a: 4e:77:c8:b5:8f:6d:4c:1a:7b:15:67:0e:28:dc:88:fe: 27:59:e7:5a:89:7d:ac:05:ae:a8:6a:db:3c:b6:f1:49 Fingerprint (SHA-256): DA:AF:9E:C6:34:5A:15:0C:DF:86:AC:94:A7:42:BC:13:00:3E:4D:E4:88:72:E3:6F:E7:D1:4C:1E:C6:A4:F1:22 Fingerprint (SHA1): 5D:C5:02:87:59:18:BE:1F:60:96:95:D7:E3:AD:1B:51:52:EE:04:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 10045 at Wed Oct 18 15:22:55 UTC 2023 kill -USR1 10045 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 10045 killed at Wed Oct 18 15:22:55 UTC 2023 httpserv starting at Wed Oct 18 15:22:55 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 15:22:55 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 10264 >/dev/null 2>/dev/null httpserv with PID 10264 found at Wed Oct 18 15:22:55 UTC 2023 httpserv with PID 10264 started at Wed Oct 18 15:22:55 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152156 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152157 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152158 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152159 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018152160 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152157 (0x3cafc4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:22:57 2023 Not After : Wed Oct 18 15:22:57 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:02:6e:64:03:5e:d7:0a:45:3c:ca:a1:53:71:69:2b: cd:98:52:50:37:3e:39:a2:b2:26:63:b8:60:fd:41:8e: e8:1b:14:3d:10:95:55:42:18:76:21:4d:05:02:cd:47: 87:8d:aa:d8:c7:be:96:3e:2a:45:d6:84:8f:0d:6e:c8: 82:6c:00:91:8e:11:f6:06:71:a9:90:0a:ae:a7:8d:29: 67:b1:59:f8:31:57:b5:45:69:02:de:de:86:4c:13:b7: 60:ba:05:07:b6:a7:98:3d:03:57:0e:82:47:6b:c2:1b: bc:b6:dc:e2:c2:77:a0:45:45:df:17:19:e4:3b:4e:8f: a4:15:76:9e:e3:ee:d7:fb:14:4d:b2:f7:96:0f:fc:01: de:29:ef:fe:3c:e2:cc:7c:ed:2c:c1:21:d1:96:f1:43: 4b:f1:53:5a:1a:f2:21:d8:46:75:84:e5:2f:61:2e:99: b1:8a:46:95:4f:85:3a:09:38:7d:12:b6:35:7d:8e:d7: 7d:bc:61:42:b8:eb:81:04:61:e6:f2:06:b3:3b:8d:95: 01:ea:ee:4c:e3:ad:5f:d0:22:af:59:89:b9:e3:3c:bb: 5c:df:13:0a:64:50:a8:a9:da:4e:97:b3:be:f6:67:07: 4d:45:25:0e:e7:80:af:20:c9:43:11:d0:e6:2d:b9:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:30:40:90:6c:ce:c7:02:28:b4:c5:4f:73:3a:63:9e: 5a:52:79:1e:34:bf:ec:a7:94:77:16:8a:ac:22:d9:98: 6a:22:1b:f4:fa:df:e3:c5:ff:52:0e:1d:e0:c8:27:50: 21:67:31:ec:5c:d8:b3:fd:11:2e:6b:75:47:fe:03:c9: 76:cb:25:a7:b3:66:74:ca:06:25:8d:80:c1:67:94:61: ec:0f:a9:ff:4d:25:8a:86:eb:67:fc:15:79:35:05:65: c2:6e:37:06:b5:d4:25:d6:e2:d1:8c:b2:b6:f2:5b:6d: 16:66:61:30:3e:dc:96:2f:20:07:81:a3:80:00:53:65: cb:20:55:d5:3b:74:58:d4:a9:7c:e1:7f:14:c0:0c:56: 98:76:e5:86:61:8e:ec:ff:34:77:36:bb:ec:d8:c9:f1: cf:86:09:99:35:71:9e:ef:78:fd:1c:3a:64:56:9e:ba: fc:4a:ad:a6:8b:88:fc:72:32:9e:a9:ab:ed:f9:6f:0b: 13:83:b7:e7:78:6b:a2:d1:00:d5:4b:6c:52:19:d1:09: 77:3d:1a:e3:43:06:58:0c:74:d0:57:aa:94:fc:a7:5b: a2:ca:a1:b9:56:38:83:dc:66:da:a1:e6:d1:d0:2a:71: b0:0b:29:9e:45:7a:02:6c:7a:74:6c:ce:0f:a4:cd:b7 Fingerprint (SHA-256): C0:4C:59:D4:82:9E:71:19:06:89:42:5F:0D:3A:4D:BA:B9:DC:B3:96:1A:86:76:62:26:71:EE:D3:3A:35:7C:F1 Fingerprint (SHA1): 20:8B:20:28:28:B6:2C:AE:47:85:38:6B:7E:A7:39:D8:64:35:19:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152156 (0x3cafc4dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:22:56 2023 Not After : Wed Oct 18 15:22:56 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:66:ae:6a:a7:50:f7:1f:f1:02:91:bd:6a:e7:56:c0: a0:62:3e:1f:f8:24:57:35:0b:6f:0d:29:eb:5f:30:12: 88:23:1c:2c:3d:37:38:02:f4:6d:f6:1a:cd:c9:ab:d5: 66:2e:57:a7:ed:f0:c6:dd:72:bd:5c:7b:d2:47:e5:98: 3f:75:ac:83:2b:0e:d7:ed:85:f9:ee:ea:30:dd:0e:cf: 75:3d:6b:f0:ad:99:59:ad:45:cb:ca:cf:c7:f8:bc:3b: b4:c5:30:a9:64:e9:71:59:0f:a0:a1:23:da:b9:48:c9: 36:fb:11:d0:df:8e:9d:8a:a4:86:d5:0c:1c:3c:46:b4: ee:fe:f9:95:6c:b9:05:71:a9:fa:4a:24:5e:bc:90:60: a8:f8:03:57:ec:ba:72:d4:5e:f3:95:2e:0c:3b:bb:b3: 67:b8:2f:46:82:20:a3:aa:fc:11:93:d4:d1:53:aa:97: 1b:a8:2d:08:46:59:92:b0:cd:84:dd:34:a7:2c:6d:ac: ec:ed:27:d5:cc:79:27:28:60:58:33:04:f3:b7:9e:24: af:4a:aa:43:96:8e:b1:ee:12:af:e7:3d:ab:df:68:cb: 8b:d9:b0:cc:ce:09:75:2e:a7:42:0e:0a:78:5b:bf:0e: ad:bd:09:87:64:ed:1f:ac:98:24:3b:3f:ef:e4:0a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:06:b8:f0:4c:71:ff:75:d8:28:e4:01:1e:7b:10:2d: 80:17:c7:0c:bf:fc:be:2d:c6:e0:08:bf:88:f9:24:e1: 71:d4:e6:ac:d7:2c:85:38:fd:22:1f:77:91:6c:83:88: e4:b1:3b:1a:67:6b:8c:1f:e5:ef:a7:d0:60:87:91:70: 5b:80:88:2e:a9:38:88:94:cf:fa:f2:99:52:88:cd:5b: 32:6c:f1:e1:bc:93:32:10:61:4e:8c:1e:32:17:f9:ca: bf:8b:2a:ba:aa:1d:c6:eb:c3:6a:60:99:1a:6e:37:6d: 77:a6:85:c6:43:6a:a4:4f:13:b6:0f:81:2a:81:0e:91: 2f:8d:e2:da:2c:23:1b:10:a2:d3:95:6a:5e:cd:13:92: 20:79:d2:7b:9e:9b:ba:a7:9d:2f:7c:29:16:33:74:db: b3:ce:92:c9:58:2f:24:7d:6d:7c:ae:a0:71:fd:58:c7: 95:84:3c:c6:db:bd:1c:10:fb:0b:1a:e5:37:3f:a0:71: 19:6b:12:90:ea:4f:36:97:33:f7:ce:5d:1e:6d:61:81: 76:e1:98:ae:64:3f:29:25:04:6a:ee:22:96:0c:b7:4a: 48:e6:7e:14:22:9a:6d:1e:3f:98:94:a0:4f:f9:e9:42: 06:15:10:28:9d:1d:5b:c6:06:b3:fd:76:af:81:95:5b Fingerprint (SHA-256): 85:68:F6:2B:4E:73:5A:C2:C2:76:16:A8:FA:42:47:45:75:3D:0B:85:5A:8F:E1:9E:ED:AC:1F:90:1A:22:B7:BF Fingerprint (SHA1): A7:C3:3C:80:5E:F2:69:34:81:07:01:30:D6:4A:76:13:85:05:BD:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152156 (0x3cafc4dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:22:56 2023 Not After : Wed Oct 18 15:22:56 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:66:ae:6a:a7:50:f7:1f:f1:02:91:bd:6a:e7:56:c0: a0:62:3e:1f:f8:24:57:35:0b:6f:0d:29:eb:5f:30:12: 88:23:1c:2c:3d:37:38:02:f4:6d:f6:1a:cd:c9:ab:d5: 66:2e:57:a7:ed:f0:c6:dd:72:bd:5c:7b:d2:47:e5:98: 3f:75:ac:83:2b:0e:d7:ed:85:f9:ee:ea:30:dd:0e:cf: 75:3d:6b:f0:ad:99:59:ad:45:cb:ca:cf:c7:f8:bc:3b: b4:c5:30:a9:64:e9:71:59:0f:a0:a1:23:da:b9:48:c9: 36:fb:11:d0:df:8e:9d:8a:a4:86:d5:0c:1c:3c:46:b4: ee:fe:f9:95:6c:b9:05:71:a9:fa:4a:24:5e:bc:90:60: a8:f8:03:57:ec:ba:72:d4:5e:f3:95:2e:0c:3b:bb:b3: 67:b8:2f:46:82:20:a3:aa:fc:11:93:d4:d1:53:aa:97: 1b:a8:2d:08:46:59:92:b0:cd:84:dd:34:a7:2c:6d:ac: ec:ed:27:d5:cc:79:27:28:60:58:33:04:f3:b7:9e:24: af:4a:aa:43:96:8e:b1:ee:12:af:e7:3d:ab:df:68:cb: 8b:d9:b0:cc:ce:09:75:2e:a7:42:0e:0a:78:5b:bf:0e: ad:bd:09:87:64:ed:1f:ac:98:24:3b:3f:ef:e4:0a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:06:b8:f0:4c:71:ff:75:d8:28:e4:01:1e:7b:10:2d: 80:17:c7:0c:bf:fc:be:2d:c6:e0:08:bf:88:f9:24:e1: 71:d4:e6:ac:d7:2c:85:38:fd:22:1f:77:91:6c:83:88: e4:b1:3b:1a:67:6b:8c:1f:e5:ef:a7:d0:60:87:91:70: 5b:80:88:2e:a9:38:88:94:cf:fa:f2:99:52:88:cd:5b: 32:6c:f1:e1:bc:93:32:10:61:4e:8c:1e:32:17:f9:ca: bf:8b:2a:ba:aa:1d:c6:eb:c3:6a:60:99:1a:6e:37:6d: 77:a6:85:c6:43:6a:a4:4f:13:b6:0f:81:2a:81:0e:91: 2f:8d:e2:da:2c:23:1b:10:a2:d3:95:6a:5e:cd:13:92: 20:79:d2:7b:9e:9b:ba:a7:9d:2f:7c:29:16:33:74:db: b3:ce:92:c9:58:2f:24:7d:6d:7c:ae:a0:71:fd:58:c7: 95:84:3c:c6:db:bd:1c:10:fb:0b:1a:e5:37:3f:a0:71: 19:6b:12:90:ea:4f:36:97:33:f7:ce:5d:1e:6d:61:81: 76:e1:98:ae:64:3f:29:25:04:6a:ee:22:96:0c:b7:4a: 48:e6:7e:14:22:9a:6d:1e:3f:98:94:a0:4f:f9:e9:42: 06:15:10:28:9d:1d:5b:c6:06:b3:fd:76:af:81:95:5b Fingerprint (SHA-256): 85:68:F6:2B:4E:73:5A:C2:C2:76:16:A8:FA:42:47:45:75:3D:0B:85:5A:8F:E1:9E:ED:AC:1F:90:1A:22:B7:BF Fingerprint (SHA1): A7:C3:3C:80:5E:F2:69:34:81:07:01:30:D6:4A:76:13:85:05:BD:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152157 (0x3cafc4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:22:57 2023 Not After : Wed Oct 18 15:22:57 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:02:6e:64:03:5e:d7:0a:45:3c:ca:a1:53:71:69:2b: cd:98:52:50:37:3e:39:a2:b2:26:63:b8:60:fd:41:8e: e8:1b:14:3d:10:95:55:42:18:76:21:4d:05:02:cd:47: 87:8d:aa:d8:c7:be:96:3e:2a:45:d6:84:8f:0d:6e:c8: 82:6c:00:91:8e:11:f6:06:71:a9:90:0a:ae:a7:8d:29: 67:b1:59:f8:31:57:b5:45:69:02:de:de:86:4c:13:b7: 60:ba:05:07:b6:a7:98:3d:03:57:0e:82:47:6b:c2:1b: bc:b6:dc:e2:c2:77:a0:45:45:df:17:19:e4:3b:4e:8f: a4:15:76:9e:e3:ee:d7:fb:14:4d:b2:f7:96:0f:fc:01: de:29:ef:fe:3c:e2:cc:7c:ed:2c:c1:21:d1:96:f1:43: 4b:f1:53:5a:1a:f2:21:d8:46:75:84:e5:2f:61:2e:99: b1:8a:46:95:4f:85:3a:09:38:7d:12:b6:35:7d:8e:d7: 7d:bc:61:42:b8:eb:81:04:61:e6:f2:06:b3:3b:8d:95: 01:ea:ee:4c:e3:ad:5f:d0:22:af:59:89:b9:e3:3c:bb: 5c:df:13:0a:64:50:a8:a9:da:4e:97:b3:be:f6:67:07: 4d:45:25:0e:e7:80:af:20:c9:43:11:d0:e6:2d:b9:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:30:40:90:6c:ce:c7:02:28:b4:c5:4f:73:3a:63:9e: 5a:52:79:1e:34:bf:ec:a7:94:77:16:8a:ac:22:d9:98: 6a:22:1b:f4:fa:df:e3:c5:ff:52:0e:1d:e0:c8:27:50: 21:67:31:ec:5c:d8:b3:fd:11:2e:6b:75:47:fe:03:c9: 76:cb:25:a7:b3:66:74:ca:06:25:8d:80:c1:67:94:61: ec:0f:a9:ff:4d:25:8a:86:eb:67:fc:15:79:35:05:65: c2:6e:37:06:b5:d4:25:d6:e2:d1:8c:b2:b6:f2:5b:6d: 16:66:61:30:3e:dc:96:2f:20:07:81:a3:80:00:53:65: cb:20:55:d5:3b:74:58:d4:a9:7c:e1:7f:14:c0:0c:56: 98:76:e5:86:61:8e:ec:ff:34:77:36:bb:ec:d8:c9:f1: cf:86:09:99:35:71:9e:ef:78:fd:1c:3a:64:56:9e:ba: fc:4a:ad:a6:8b:88:fc:72:32:9e:a9:ab:ed:f9:6f:0b: 13:83:b7:e7:78:6b:a2:d1:00:d5:4b:6c:52:19:d1:09: 77:3d:1a:e3:43:06:58:0c:74:d0:57:aa:94:fc:a7:5b: a2:ca:a1:b9:56:38:83:dc:66:da:a1:e6:d1:d0:2a:71: b0:0b:29:9e:45:7a:02:6c:7a:74:6c:ce:0f:a4:cd:b7 Fingerprint (SHA-256): C0:4C:59:D4:82:9E:71:19:06:89:42:5F:0D:3A:4D:BA:B9:DC:B3:96:1A:86:76:62:26:71:EE:D3:3A:35:7C:F1 Fingerprint (SHA1): 20:8B:20:28:28:B6:2C:AE:47:85:38:6B:7E:A7:39:D8:64:35:19:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152157 (0x3cafc4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:22:57 2023 Not After : Wed Oct 18 15:22:57 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:02:6e:64:03:5e:d7:0a:45:3c:ca:a1:53:71:69:2b: cd:98:52:50:37:3e:39:a2:b2:26:63:b8:60:fd:41:8e: e8:1b:14:3d:10:95:55:42:18:76:21:4d:05:02:cd:47: 87:8d:aa:d8:c7:be:96:3e:2a:45:d6:84:8f:0d:6e:c8: 82:6c:00:91:8e:11:f6:06:71:a9:90:0a:ae:a7:8d:29: 67:b1:59:f8:31:57:b5:45:69:02:de:de:86:4c:13:b7: 60:ba:05:07:b6:a7:98:3d:03:57:0e:82:47:6b:c2:1b: bc:b6:dc:e2:c2:77:a0:45:45:df:17:19:e4:3b:4e:8f: a4:15:76:9e:e3:ee:d7:fb:14:4d:b2:f7:96:0f:fc:01: de:29:ef:fe:3c:e2:cc:7c:ed:2c:c1:21:d1:96:f1:43: 4b:f1:53:5a:1a:f2:21:d8:46:75:84:e5:2f:61:2e:99: b1:8a:46:95:4f:85:3a:09:38:7d:12:b6:35:7d:8e:d7: 7d:bc:61:42:b8:eb:81:04:61:e6:f2:06:b3:3b:8d:95: 01:ea:ee:4c:e3:ad:5f:d0:22:af:59:89:b9:e3:3c:bb: 5c:df:13:0a:64:50:a8:a9:da:4e:97:b3:be:f6:67:07: 4d:45:25:0e:e7:80:af:20:c9:43:11:d0:e6:2d:b9:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:30:40:90:6c:ce:c7:02:28:b4:c5:4f:73:3a:63:9e: 5a:52:79:1e:34:bf:ec:a7:94:77:16:8a:ac:22:d9:98: 6a:22:1b:f4:fa:df:e3:c5:ff:52:0e:1d:e0:c8:27:50: 21:67:31:ec:5c:d8:b3:fd:11:2e:6b:75:47:fe:03:c9: 76:cb:25:a7:b3:66:74:ca:06:25:8d:80:c1:67:94:61: ec:0f:a9:ff:4d:25:8a:86:eb:67:fc:15:79:35:05:65: c2:6e:37:06:b5:d4:25:d6:e2:d1:8c:b2:b6:f2:5b:6d: 16:66:61:30:3e:dc:96:2f:20:07:81:a3:80:00:53:65: cb:20:55:d5:3b:74:58:d4:a9:7c:e1:7f:14:c0:0c:56: 98:76:e5:86:61:8e:ec:ff:34:77:36:bb:ec:d8:c9:f1: cf:86:09:99:35:71:9e:ef:78:fd:1c:3a:64:56:9e:ba: fc:4a:ad:a6:8b:88:fc:72:32:9e:a9:ab:ed:f9:6f:0b: 13:83:b7:e7:78:6b:a2:d1:00:d5:4b:6c:52:19:d1:09: 77:3d:1a:e3:43:06:58:0c:74:d0:57:aa:94:fc:a7:5b: a2:ca:a1:b9:56:38:83:dc:66:da:a1:e6:d1:d0:2a:71: b0:0b:29:9e:45:7a:02:6c:7a:74:6c:ce:0f:a4:cd:b7 Fingerprint (SHA-256): C0:4C:59:D4:82:9E:71:19:06:89:42:5F:0D:3A:4D:BA:B9:DC:B3:96:1A:86:76:62:26:71:EE:D3:3A:35:7C:F1 Fingerprint (SHA1): 20:8B:20:28:28:B6:2C:AE:47:85:38:6B:7E:A7:39:D8:64:35:19:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152157 (0x3cafc4dd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:22:57 2023 Not After : Wed Oct 18 15:22:57 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:02:6e:64:03:5e:d7:0a:45:3c:ca:a1:53:71:69:2b: cd:98:52:50:37:3e:39:a2:b2:26:63:b8:60:fd:41:8e: e8:1b:14:3d:10:95:55:42:18:76:21:4d:05:02:cd:47: 87:8d:aa:d8:c7:be:96:3e:2a:45:d6:84:8f:0d:6e:c8: 82:6c:00:91:8e:11:f6:06:71:a9:90:0a:ae:a7:8d:29: 67:b1:59:f8:31:57:b5:45:69:02:de:de:86:4c:13:b7: 60:ba:05:07:b6:a7:98:3d:03:57:0e:82:47:6b:c2:1b: bc:b6:dc:e2:c2:77:a0:45:45:df:17:19:e4:3b:4e:8f: a4:15:76:9e:e3:ee:d7:fb:14:4d:b2:f7:96:0f:fc:01: de:29:ef:fe:3c:e2:cc:7c:ed:2c:c1:21:d1:96:f1:43: 4b:f1:53:5a:1a:f2:21:d8:46:75:84:e5:2f:61:2e:99: b1:8a:46:95:4f:85:3a:09:38:7d:12:b6:35:7d:8e:d7: 7d:bc:61:42:b8:eb:81:04:61:e6:f2:06:b3:3b:8d:95: 01:ea:ee:4c:e3:ad:5f:d0:22:af:59:89:b9:e3:3c:bb: 5c:df:13:0a:64:50:a8:a9:da:4e:97:b3:be:f6:67:07: 4d:45:25:0e:e7:80:af:20:c9:43:11:d0:e6:2d:b9:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:30:40:90:6c:ce:c7:02:28:b4:c5:4f:73:3a:63:9e: 5a:52:79:1e:34:bf:ec:a7:94:77:16:8a:ac:22:d9:98: 6a:22:1b:f4:fa:df:e3:c5:ff:52:0e:1d:e0:c8:27:50: 21:67:31:ec:5c:d8:b3:fd:11:2e:6b:75:47:fe:03:c9: 76:cb:25:a7:b3:66:74:ca:06:25:8d:80:c1:67:94:61: ec:0f:a9:ff:4d:25:8a:86:eb:67:fc:15:79:35:05:65: c2:6e:37:06:b5:d4:25:d6:e2:d1:8c:b2:b6:f2:5b:6d: 16:66:61:30:3e:dc:96:2f:20:07:81:a3:80:00:53:65: cb:20:55:d5:3b:74:58:d4:a9:7c:e1:7f:14:c0:0c:56: 98:76:e5:86:61:8e:ec:ff:34:77:36:bb:ec:d8:c9:f1: cf:86:09:99:35:71:9e:ef:78:fd:1c:3a:64:56:9e:ba: fc:4a:ad:a6:8b:88:fc:72:32:9e:a9:ab:ed:f9:6f:0b: 13:83:b7:e7:78:6b:a2:d1:00:d5:4b:6c:52:19:d1:09: 77:3d:1a:e3:43:06:58:0c:74:d0:57:aa:94:fc:a7:5b: a2:ca:a1:b9:56:38:83:dc:66:da:a1:e6:d1:d0:2a:71: b0:0b:29:9e:45:7a:02:6c:7a:74:6c:ce:0f:a4:cd:b7 Fingerprint (SHA-256): C0:4C:59:D4:82:9E:71:19:06:89:42:5F:0D:3A:4D:BA:B9:DC:B3:96:1A:86:76:62:26:71:EE:D3:3A:35:7C:F1 Fingerprint (SHA1): 20:8B:20:28:28:B6:2C:AE:47:85:38:6B:7E:A7:39:D8:64:35:19:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152156 (0x3cafc4dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:22:56 2023 Not After : Wed Oct 18 15:22:56 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:66:ae:6a:a7:50:f7:1f:f1:02:91:bd:6a:e7:56:c0: a0:62:3e:1f:f8:24:57:35:0b:6f:0d:29:eb:5f:30:12: 88:23:1c:2c:3d:37:38:02:f4:6d:f6:1a:cd:c9:ab:d5: 66:2e:57:a7:ed:f0:c6:dd:72:bd:5c:7b:d2:47:e5:98: 3f:75:ac:83:2b:0e:d7:ed:85:f9:ee:ea:30:dd:0e:cf: 75:3d:6b:f0:ad:99:59:ad:45:cb:ca:cf:c7:f8:bc:3b: b4:c5:30:a9:64:e9:71:59:0f:a0:a1:23:da:b9:48:c9: 36:fb:11:d0:df:8e:9d:8a:a4:86:d5:0c:1c:3c:46:b4: ee:fe:f9:95:6c:b9:05:71:a9:fa:4a:24:5e:bc:90:60: a8:f8:03:57:ec:ba:72:d4:5e:f3:95:2e:0c:3b:bb:b3: 67:b8:2f:46:82:20:a3:aa:fc:11:93:d4:d1:53:aa:97: 1b:a8:2d:08:46:59:92:b0:cd:84:dd:34:a7:2c:6d:ac: ec:ed:27:d5:cc:79:27:28:60:58:33:04:f3:b7:9e:24: af:4a:aa:43:96:8e:b1:ee:12:af:e7:3d:ab:df:68:cb: 8b:d9:b0:cc:ce:09:75:2e:a7:42:0e:0a:78:5b:bf:0e: ad:bd:09:87:64:ed:1f:ac:98:24:3b:3f:ef:e4:0a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:06:b8:f0:4c:71:ff:75:d8:28:e4:01:1e:7b:10:2d: 80:17:c7:0c:bf:fc:be:2d:c6:e0:08:bf:88:f9:24:e1: 71:d4:e6:ac:d7:2c:85:38:fd:22:1f:77:91:6c:83:88: e4:b1:3b:1a:67:6b:8c:1f:e5:ef:a7:d0:60:87:91:70: 5b:80:88:2e:a9:38:88:94:cf:fa:f2:99:52:88:cd:5b: 32:6c:f1:e1:bc:93:32:10:61:4e:8c:1e:32:17:f9:ca: bf:8b:2a:ba:aa:1d:c6:eb:c3:6a:60:99:1a:6e:37:6d: 77:a6:85:c6:43:6a:a4:4f:13:b6:0f:81:2a:81:0e:91: 2f:8d:e2:da:2c:23:1b:10:a2:d3:95:6a:5e:cd:13:92: 20:79:d2:7b:9e:9b:ba:a7:9d:2f:7c:29:16:33:74:db: b3:ce:92:c9:58:2f:24:7d:6d:7c:ae:a0:71:fd:58:c7: 95:84:3c:c6:db:bd:1c:10:fb:0b:1a:e5:37:3f:a0:71: 19:6b:12:90:ea:4f:36:97:33:f7:ce:5d:1e:6d:61:81: 76:e1:98:ae:64:3f:29:25:04:6a:ee:22:96:0c:b7:4a: 48:e6:7e:14:22:9a:6d:1e:3f:98:94:a0:4f:f9:e9:42: 06:15:10:28:9d:1d:5b:c6:06:b3:fd:76:af:81:95:5b Fingerprint (SHA-256): 85:68:F6:2B:4E:73:5A:C2:C2:76:16:A8:FA:42:47:45:75:3D:0B:85:5A:8F:E1:9E:ED:AC:1F:90:1A:22:B7:BF Fingerprint (SHA1): A7:C3:3C:80:5E:F2:69:34:81:07:01:30:D6:4A:76:13:85:05:BD:87 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152156 (0x3cafc4dc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:22:56 2023 Not After : Wed Oct 18 15:22:56 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:66:ae:6a:a7:50:f7:1f:f1:02:91:bd:6a:e7:56:c0: a0:62:3e:1f:f8:24:57:35:0b:6f:0d:29:eb:5f:30:12: 88:23:1c:2c:3d:37:38:02:f4:6d:f6:1a:cd:c9:ab:d5: 66:2e:57:a7:ed:f0:c6:dd:72:bd:5c:7b:d2:47:e5:98: 3f:75:ac:83:2b:0e:d7:ed:85:f9:ee:ea:30:dd:0e:cf: 75:3d:6b:f0:ad:99:59:ad:45:cb:ca:cf:c7:f8:bc:3b: b4:c5:30:a9:64:e9:71:59:0f:a0:a1:23:da:b9:48:c9: 36:fb:11:d0:df:8e:9d:8a:a4:86:d5:0c:1c:3c:46:b4: ee:fe:f9:95:6c:b9:05:71:a9:fa:4a:24:5e:bc:90:60: a8:f8:03:57:ec:ba:72:d4:5e:f3:95:2e:0c:3b:bb:b3: 67:b8:2f:46:82:20:a3:aa:fc:11:93:d4:d1:53:aa:97: 1b:a8:2d:08:46:59:92:b0:cd:84:dd:34:a7:2c:6d:ac: ec:ed:27:d5:cc:79:27:28:60:58:33:04:f3:b7:9e:24: af:4a:aa:43:96:8e:b1:ee:12:af:e7:3d:ab:df:68:cb: 8b:d9:b0:cc:ce:09:75:2e:a7:42:0e:0a:78:5b:bf:0e: ad:bd:09:87:64:ed:1f:ac:98:24:3b:3f:ef:e4:0a:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:06:b8:f0:4c:71:ff:75:d8:28:e4:01:1e:7b:10:2d: 80:17:c7:0c:bf:fc:be:2d:c6:e0:08:bf:88:f9:24:e1: 71:d4:e6:ac:d7:2c:85:38:fd:22:1f:77:91:6c:83:88: e4:b1:3b:1a:67:6b:8c:1f:e5:ef:a7:d0:60:87:91:70: 5b:80:88:2e:a9:38:88:94:cf:fa:f2:99:52:88:cd:5b: 32:6c:f1:e1:bc:93:32:10:61:4e:8c:1e:32:17:f9:ca: bf:8b:2a:ba:aa:1d:c6:eb:c3:6a:60:99:1a:6e:37:6d: 77:a6:85:c6:43:6a:a4:4f:13:b6:0f:81:2a:81:0e:91: 2f:8d:e2:da:2c:23:1b:10:a2:d3:95:6a:5e:cd:13:92: 20:79:d2:7b:9e:9b:ba:a7:9d:2f:7c:29:16:33:74:db: b3:ce:92:c9:58:2f:24:7d:6d:7c:ae:a0:71:fd:58:c7: 95:84:3c:c6:db:bd:1c:10:fb:0b:1a:e5:37:3f:a0:71: 19:6b:12:90:ea:4f:36:97:33:f7:ce:5d:1e:6d:61:81: 76:e1:98:ae:64:3f:29:25:04:6a:ee:22:96:0c:b7:4a: 48:e6:7e:14:22:9a:6d:1e:3f:98:94:a0:4f:f9:e9:42: 06:15:10:28:9d:1d:5b:c6:06:b3:fd:76:af:81:95:5b Fingerprint (SHA-256): 85:68:F6:2B:4E:73:5A:C2:C2:76:16:A8:FA:42:47:45:75:3D:0B:85:5A:8F:E1:9E:ED:AC:1F:90:1A:22:B7:BF Fingerprint (SHA1): A7:C3:3C:80:5E:F2:69:34:81:07:01:30:D6:4A:76:13:85:05:BD:87 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152161 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152162 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152163 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152164 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152165 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152166 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152167 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152168 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152169 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018152170 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018152171 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018152172 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018152173 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018152174 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018152175 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018152176 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018152177 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018152178 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018152179 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018152180 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018152181 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018152182 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152183 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152161 (0x3cafc4e1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 15:23:04 2023 Not After : Wed Oct 18 15:23:04 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:bb:ac:1a:b5:aa:7f:38:af:d7:03:91:48:45:b0:a9: 15:12:10:16:d9:32:2c:a6:cd:72:94:b9:96:9f:a0:0a: 6e:70:b7:51:c9:90:42:09:25:80:b4:3d:64:1b:74:5b: 70:6a:c8:b3:74:cb:15:05:e6:19:bf:be:d0:77:be:94: 2d:b9:3a:73:8b:fb:5a:58:a9:85:dd:1a:13:88:c4:03: 36:9a:ea:53:0b:b9:a6:d0:cd:f0:22:84:54:c0:01:82: cb:60:6d:f7:5b:18:c7:f5:f3:8d:ae:b4:b7:19:45:c7: 9b:b7:93:1d:82:07:71:56:f8:97:24:2f:7e:e4:6f:dd: 6f:b8:8f:59:cf:ec:b0:2f:00:8f:c7:ff:a5:e7:0a:51: 72:03:04:ef:97:0a:7c:a5:bf:9d:77:fc:78:09:02:8c: 44:e4:09:f3:38:c0:92:15:c0:a0:be:0c:1d:a6:1b:1e: 2a:be:b2:9c:61:95:d9:f5:8d:b9:9d:3b:58:5b:cb:b2: ee:a9:86:ca:77:67:7e:3b:92:0a:bc:b4:9b:0a:be:60: 15:09:a6:8f:9b:bd:4b:a5:3a:2b:b8:35:c7:96:b5:57: 7f:f8:da:f2:7e:e7:2f:a7:fe:b0:59:34:c0:8f:f5:b2: 59:56:d3:ad:99:f4:41:72:ec:e6:2a:93:29:a6:02:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:f1:5b:d6:a0:8b:a6:0b:e9:08:cf:16:07:95:82:e0: 80:43:a3:9e:55:e1:6f:f3:2a:d5:1d:29:58:d4:97:5d: 90:2a:ef:5c:3d:aa:3e:42:a6:aa:7b:b1:49:8e:eb:10: 73:2c:ef:2f:f6:b2:09:a4:c8:e3:fd:63:95:11:0a:16: 95:2e:e8:71:46:d6:22:ad:0a:42:73:c9:05:05:4f:e2: eb:58:d8:24:44:ab:0a:de:b4:2f:24:18:c7:68:f3:7e: 9b:54:d3:65:dd:18:f5:36:53:48:94:c0:8f:b7:6e:74: 28:82:01:df:f9:c6:e6:6d:4b:a9:2a:67:ff:b5:3f:ea: e6:a3:28:6c:7b:a6:a9:38:12:63:9b:f9:ad:9d:0a:03: 2f:ae:c5:9e:23:6b:d9:ff:79:e8:ce:55:da:7f:0f:89: f6:4d:a7:d6:63:ec:81:80:19:27:07:dd:4c:5b:e7:03: 57:da:97:c0:1e:38:d5:7b:b1:d7:d3:f7:77:92:ee:87: 45:e5:90:1d:07:a2:87:02:0a:51:d7:54:77:9f:15:7c: f4:71:26:32:e9:96:b0:8c:3e:45:63:42:53:20:0c:1b: 01:42:e6:13:bf:d9:0f:e4:0b:f3:88:30:d4:17:b7:38: af:c2:42:30:19:b8:06:3e:ad:d6:5b:e7:bc:f6:a8:81 Fingerprint (SHA-256): 66:67:AC:31:FE:AE:32:05:65:9E:86:C9:11:1F:FD:98:9B:4D:07:18:8B:2A:F0:7D:9A:E7:CF:C7:D6:5F:18:FE Fingerprint (SHA1): CF:E6:96:53:C4:03:32:68:AB:31:48:DD:F1:DC:A9:A0:A7:1B:E5:82 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152162 (0x3cafc4e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 15:23:05 2023 Not After : Wed Oct 18 15:23:05 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:bf:44:27:38:c4:70:31:8e:1e:9c:90:88:a8:3a:d8: 70:43:4f:49:fa:a8:3f:39:a1:d7:93:68:74:fb:07:72: 15:9f:0f:6e:d0:2e:ce:e3:b1:f8:9c:17:7d:d4:30:d5: 41:33:36:af:da:c3:af:37:96:86:95:1b:a3:41:b3:ad: ed:e3:84:54:82:c4:c3:36:8f:52:ed:6e:0c:75:1e:fc: 34:dd:bd:e6:19:c4:1f:78:d3:2e:d6:55:37:67:42:f6: eb:b6:d0:fd:b2:a1:4e:0f:a7:79:ab:ef:a0:78:52:b8: e2:0a:e0:eb:ff:ef:d9:7c:23:3d:16:21:ab:3f:e6:40: db:ac:b1:e3:90:fa:de:04:46:b1:8a:3c:d5:5c:79:39: 03:1d:15:a1:f6:8b:eb:9c:ad:22:a5:d1:98:e8:2d:8a: 69:c5:27:98:0c:dd:fc:df:24:56:9f:96:b5:ab:0f:cb: b4:57:9f:d9:f2:94:9e:07:a2:30:a7:4c:85:dd:60:62: da:ac:3b:ce:e3:61:a4:4a:98:82:e0:b0:c7:6f:a8:64: 44:5c:19:93:63:cb:b7:8b:33:6b:83:31:a5:fc:16:7d: 3e:d7:61:34:8c:d6:21:d7:70:5e:56:ce:c7:47:ec:94: 69:bc:f0:a9:b8:ef:e1:ed:c3:83:8a:a1:81:40:b5:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:39:0a:04:76:4e:10:a3:54:1c:7d:cf:90:b9:3c:eb: 09:90:97:90:a1:85:a5:fa:9c:85:03:1a:47:4b:b5:b3: 90:41:3b:85:5d:e6:82:72:25:74:2d:6a:dd:20:99:9e: 58:0e:fd:0d:07:55:80:10:71:82:2d:c1:99:53:86:8d: f7:5e:d2:d4:4e:8a:e2:b2:61:f1:08:b3:60:bf:c0:55: 9e:23:eb:46:cd:77:7e:63:fd:f2:16:b7:bf:fb:3c:a6: 67:79:c1:06:7d:93:01:f9:ce:25:7d:4e:21:fc:d6:7d: 20:fb:9b:0f:d0:23:4c:94:90:26:79:f0:f9:f0:05:b0: 7b:23:87:7b:ff:e5:ab:8b:58:44:8a:d1:4b:5a:9c:49: 26:bf:63:65:82:73:ed:5c:47:14:ca:b6:d0:a2:a1:7c: dd:93:9e:09:9d:a4:e7:dd:91:90:1d:ca:0c:8f:da:45: 69:a0:94:5f:cc:19:dd:30:52:75:ab:5c:1d:50:d9:d9: 88:8a:87:7a:cd:d8:5b:f5:ea:de:f3:51:7b:b0:d6:a2: 8c:2e:30:64:38:5e:93:66:82:23:c7:74:1c:19:07:a6: e8:62:2c:a2:21:5e:47:fc:6a:d6:bc:02:77:9d:23:04: 75:70:5a:4b:32:ab:0b:87:f2:74:2b:d2:65:01:5a:f8 Fingerprint (SHA-256): D2:0C:26:37:25:DB:97:91:71:EC:B7:0E:2B:BF:02:82:70:5C:A9:D9:41:DF:2E:CA:BE:2D:AA:B3:5A:ED:9C:54 Fingerprint (SHA1): A0:BF:68:F4:0A:9E:FF:10:6E:A3:01:29:64:00:4D:A5:7E:7B:33:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152163 (0x3cafc4e3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 15:23:06 2023 Not After : Wed Oct 18 15:23:06 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:54:74:d1:5f:86:ad:bc:04:44:b2:85:27:eb:49:e6: 3a:b6:7a:0f:36:85:7d:a5:f2:1b:b1:28:5b:a2:6e:a4: e6:8a:f9:ca:06:67:f8:60:c2:15:8a:50:de:06:20:9b: a0:a3:b4:85:04:85:45:24:28:ca:31:ef:96:cf:7d:71: f5:a3:73:fe:da:eb:45:fb:3d:a2:07:77:ce:6e:1b:d3: 72:d5:b9:5f:bd:f0:ef:e8:0f:24:27:64:5f:df:77:a8: 11:3e:67:ec:3d:67:10:d6:85:ba:50:b3:38:c1:86:81: 28:8a:b7:23:39:76:9d:27:be:6b:63:d0:2c:87:a7:ea: 2a:c7:40:a4:e9:9a:c5:ed:90:56:d8:b6:d3:cf:dc:d4: af:bc:99:8c:01:5f:96:76:58:8d:47:97:82:c9:16:65: 68:aa:0d:7f:55:5e:76:50:09:59:f3:26:f9:6e:bb:83: 7e:9b:16:69:fe:93:6d:fe:9b:ee:5c:09:c6:91:f5:14: 8d:5b:69:14:d2:fd:4b:c0:67:2b:75:f6:7b:2a:7a:1f: 59:bc:96:98:b1:b0:6a:0e:d9:bf:14:0a:f6:28:8e:23: 08:2d:9b:5f:02:81:07:32:de:38:8c:3b:2f:a8:2c:56: bb:28:92:6f:08:60:1a:b5:f2:64:67:63:7c:48:fe:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:13:ea:15:a1:99:f0:a8:41:f0:5c:a0:ff:df:a7:40: be:0b:87:88:14:22:73:29:11:e4:d1:d7:da:b0:31:de: cd:cc:1d:ae:fb:76:fd:ab:ef:0f:92:76:19:b8:ce:11: fb:b5:7a:68:5e:6c:d5:31:09:83:ae:72:c7:13:bf:b1: 7a:d6:8c:e8:05:06:9d:5d:78:7b:1c:09:95:fd:0d:2e: b9:5c:b1:0b:e2:70:af:17:42:12:42:6d:36:5b:d0:0d: 3d:42:c7:9f:a1:22:48:c9:ea:9c:e4:5b:50:03:9c:2e: 4a:09:f2:64:28:4d:d8:0e:92:cb:87:d4:4d:4f:07:b8: f6:6e:5e:88:2e:10:85:e6:95:16:bf:73:5a:cf:ca:83: 76:81:31:37:6a:49:91:7f:7e:96:73:28:5c:06:b7:be: 69:b1:e4:1c:20:8d:86:6a:7b:c1:15:6d:19:72:fc:30: 05:1d:a8:d7:1c:53:6b:03:d0:dd:59:e2:1c:76:84:0d: 3d:31:ba:76:a4:e0:e8:89:06:57:1b:d9:20:7f:f1:b4: 7c:6b:07:2a:80:e2:90:e6:12:51:6c:ac:14:3c:85:01: 26:cf:53:7d:4d:97:e8:80:ba:99:ac:3e:45:d9:c1:cf: 6c:e0:d4:ef:6b:29:9c:58:30:d2:89:4b:d7:81:e5:bc Fingerprint (SHA-256): C0:34:CD:CE:84:EA:33:E2:62:5F:4F:D5:34:1C:4C:DE:1A:28:EA:F7:AF:11:DE:81:34:14:82:FF:96:64:F2:61 Fingerprint (SHA1): 81:5B:F5:52:8A:67:36:24:6B:AA:19:8B:C4:5E:0A:CB:37:32:55:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152164 (0x3cafc4e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 15:23:08 2023 Not After : Wed Oct 18 15:23:08 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:45:de:fb:2e:a5:f6:ec:d3:18:fc:b4:60:ec:bc:60: db:b6:ac:30:cd:b4:ac:e8:59:65:c5:fa:30:d3:f1:84: 7a:95:0f:51:81:33:81:d8:4d:bc:6d:68:22:75:0e:9c: 0a:16:22:21:40:ca:da:8d:63:28:b1:d0:a9:9c:0f:b2: a4:0e:fa:77:f0:41:0f:1f:0b:6c:14:a0:39:18:46:c8: 11:cb:60:ae:f3:19:06:e1:eb:e3:4f:b7:bb:d2:f7:e9: b3:78:a1:c7:47:25:4d:d5:27:04:19:2f:78:54:32:c5: 5b:90:c8:6b:32:74:36:b3:c8:a6:71:18:1d:c2:c9:5f: 16:30:ea:82:30:62:92:5b:01:dc:43:d0:af:e1:69:fd: 2e:2c:cd:79:ef:bc:de:96:74:d6:b6:eb:a8:c5:26:1f: a8:30:55:80:42:5c:d5:39:c1:1d:5b:df:b3:dc:0e:99: b6:54:78:c9:16:36:45:a8:55:59:12:f8:99:b8:88:ac: d9:31:c1:82:7c:8c:fe:a5:2f:5b:3b:a5:39:9c:ba:5c: ab:1f:49:49:91:58:0f:de:19:4a:a8:98:f0:a6:78:5b: fb:2b:80:e1:fe:83:14:23:62:54:4c:4f:11:4e:04:d2: 30:12:10:f6:0a:e4:a1:e7:14:42:fb:9d:46:7a:a8:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:5c:69:b7:f7:2d:96:b4:d6:28:c3:57:44:80:9b:3f: c5:29:a4:2b:b0:ce:f8:7d:54:1a:25:97:b2:3d:05:2f: dc:ba:a4:59:a9:b1:8d:68:81:9d:bb:b6:2f:4f:ac:aa: c5:af:b2:43:6b:12:5f:68:70:b2:6e:93:32:56:9d:d3: e4:e5:c8:61:15:de:1f:e6:b2:b8:bf:10:9f:bf:ea:4e: 3a:0e:fc:9e:b8:9a:cd:f0:85:8d:9d:99:7d:38:0d:2e: 2e:6c:5b:c2:ad:bb:e4:44:58:0d:a7:b5:57:96:e9:83: 08:cb:e7:78:49:6f:c3:6a:53:93:42:c5:17:51:98:ec: 78:8b:c0:cd:79:92:64:b5:a7:a7:0e:aa:2d:bb:1f:d9: c9:a3:08:2d:3e:80:da:79:47:81:4c:b1:c1:f0:b0:37: 75:f8:3a:12:60:78:20:e6:68:fc:b8:8f:c4:c1:97:90: a9:51:3a:f7:92:8c:b6:d2:59:12:c8:67:11:a5:4c:a9: a5:17:43:0c:09:ff:50:ac:b4:90:bd:69:20:b4:f6:07: d9:e3:b7:8d:21:91:8f:63:b1:01:73:55:4a:99:c4:78: 54:fe:fc:d8:68:ce:74:1e:3e:4e:67:84:d3:98:2b:a4: b4:74:56:95:2a:cf:e3:d0:d4:f1:08:76:4a:48:69:eb Fingerprint (SHA-256): 1B:5C:6F:70:8E:FD:DE:70:70:2C:5F:FC:99:4C:E2:64:B5:EC:F5:A7:78:0A:16:09:1C:61:00:31:67:E0:98:A9 Fingerprint (SHA1): 14:97:E2:6D:D4:60:AF:D6:F1:0B:2A:53:55:83:22:72:D0:9C:1F:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152165 (0x3cafc4e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 15:23:09 2023 Not After : Wed Oct 18 15:23:09 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:b5:ce:d1:08:85:09:f4:39:03:6a:6f:f2:c6:a3:73: 11:90:56:53:58:1e:30:07:cc:6b:07:9e:3c:a1:32:14: 70:67:ac:10:a9:2a:ef:3f:81:06:8b:18:b2:37:b8:f6: 0a:f3:8e:38:f8:ea:54:91:e8:67:d1:8e:1a:8c:a3:c1: 50:fd:89:4b:4b:0b:e0:8f:1e:b1:31:88:77:e8:c8:8c: b3:c1:55:d9:7d:ba:fd:46:1d:85:45:94:f4:fe:ef:86: d0:36:45:f1:b1:ad:8e:b2:6f:7f:02:0a:f5:df:88:37: 17:b8:a8:55:69:d4:a4:e0:ef:1e:93:f3:fd:b7:c5:f2: 29:88:30:d5:73:93:bc:08:96:ff:fb:b5:c1:23:c8:03: 53:8e:3e:cd:64:2d:ce:c8:75:40:10:57:b0:62:6b:92: c0:6f:7d:40:c5:83:dc:73:ea:74:47:64:46:ff:cb:53: 47:02:b2:a9:fc:d2:8a:d8:19:25:80:ef:4b:99:2e:cc: 0f:26:5a:e7:dd:f2:7b:a4:a3:82:de:87:c4:fa:14:f5: 84:4f:30:5a:84:71:f7:7a:2e:78:7b:5b:9f:4a:0b:38: 2b:96:cd:91:69:7a:6a:18:f7:b0:17:ce:21:ae:a3:02: 7d:bf:58:8d:20:2b:cc:d7:57:99:74:23:61:aa:b1:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:2a:0d:68:91:45:03:e8:11:6a:b1:aa:cc:75:1d:61: 56:2e:1c:00:32:d0:42:1f:c9:5a:c2:2a:64:93:d2:b9: de:07:99:91:41:33:8d:38:d5:b5:d5:ee:27:05:3b:b0: f4:35:03:b8:17:a5:53:84:b3:9e:ee:76:64:19:42:6a: 0c:85:28:27:9d:42:e8:07:b7:6c:59:5a:b2:f9:64:bc: 57:29:d4:a0:f4:e4:30:3c:27:70:47:13:d1:82:ad:81: 4b:af:85:98:7e:77:53:1f:2d:ee:0a:f8:a8:ad:99:e8: 51:ba:21:c9:dd:e3:02:11:b1:b3:fb:cc:63:8c:1b:ed: ee:cb:91:1d:5c:b2:05:8b:29:ef:3f:d5:29:a8:f6:4e: 8f:3e:d9:5a:9c:69:8b:a6:00:38:51:3b:06:cd:d7:19: da:ae:69:47:ab:42:c7:85:9a:9d:ed:2e:7c:6f:83:e4: 43:4a:c9:0a:9e:d1:5c:fd:c1:71:25:1e:66:68:2f:22: e8:fa:20:29:a7:f7:ba:a9:a9:07:07:a9:64:e5:2c:31: 13:37:88:71:fe:bc:02:9d:55:59:fe:2d:98:4f:f2:ad: cb:fa:bb:27:52:38:7f:65:cb:45:79:89:f2:ba:2e:f8: 83:23:fa:0c:86:64:3f:21:04:90:f6:b6:eb:5e:7e:0a Fingerprint (SHA-256): FA:7F:32:C0:14:2F:D9:86:C3:BD:01:1C:45:6C:D6:3F:CB:95:9F:85:94:9E:CA:62:ED:E2:47:23:49:31:D0:0B Fingerprint (SHA1): BB:4B:B6:CD:93:D7:59:D2:61:C5:30:3D:5E:18:90:6F:81:17:E8:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152166 (0x3cafc4e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 15:23:09 2023 Not After : Wed Oct 18 15:23:09 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:09:3d:11:fe:8a:88:84:70:b2:25:a4:a5:9f:a3:0d: cb:39:15:87:82:54:69:59:d3:57:a4:32:e5:78:67:1d: 10:eb:df:8c:f9:75:f7:7c:76:8b:ec:b4:5b:b3:36:7f: 31:28:d3:37:b7:c1:27:73:6d:bd:db:ee:9d:06:51:ce: ea:bb:07:09:ef:86:b3:ca:4e:ab:93:4f:c6:ee:35:d6: 3e:00:15:62:d3:2c:9c:da:11:a9:cb:40:13:63:3d:cf: d7:67:cd:fd:e8:c8:07:4f:73:3f:76:06:34:46:df:8d: 71:04:94:c2:9d:a1:a6:4f:e0:bd:0b:01:27:be:e1:13: f9:71:f4:86:fa:5b:91:7d:72:32:e8:1e:8c:44:c3:28: e7:19:9d:c7:fa:8a:80:9a:80:98:8c:2c:06:ee:84:fc: 7d:d7:8a:51:ea:e5:93:3e:6e:1a:38:ee:55:54:fc:d1: 37:91:fc:36:80:9c:8c:1e:0f:48:b0:af:07:67:24:5d: 71:17:29:6d:9a:7f:c2:ff:c8:c4:1a:b8:2f:b5:86:78: 19:1a:0e:70:63:3d:60:b0:1b:fd:ce:40:6d:22:c8:72: 0a:3c:89:8e:15:fb:e6:d9:6d:70:a9:ef:56:04:43:37: cb:cd:d2:aa:d6:0f:80:79:a1:e8:0d:ef:21:68:50:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:4d:55:8b:45:d9:33:65:78:1b:ef:2a:fa:1a:46:c6: 95:73:e1:da:a2:a0:23:04:82:e8:fe:f4:b9:d8:ac:e6: 77:f3:e2:15:63:52:41:f6:78:fc:fe:d9:e6:29:98:65: cc:03:a7:5a:80:84:d3:19:88:2d:2c:27:e5:e5:35:e8: 27:5a:a3:02:95:1c:41:2b:9c:5b:4d:fd:4a:1b:22:01: 28:10:8b:13:18:be:11:c1:3e:ab:9f:4c:13:da:f4:a5: 15:6e:d5:a3:81:9a:2d:66:d3:7f:67:33:fe:b3:93:63: 91:b1:b7:58:cd:d6:8c:9a:5d:23:e4:af:19:29:ac:7d: 32:a7:de:a2:d7:21:6b:79:2c:b8:42:a5:58:2d:2f:85: e3:73:95:a6:ea:ec:66:2a:24:8e:51:d9:16:da:fd:5f: 18:77:be:75:c5:2c:11:be:6a:23:37:91:19:34:18:c1: 33:94:f7:36:e8:69:f2:6c:61:62:b6:1b:3b:98:23:5d: 67:da:a9:2a:49:c2:9a:01:8a:fe:35:b9:d3:ab:9f:7c: c5:54:6b:93:91:11:d3:dd:38:95:65:fd:05:28:73:0c: b4:be:59:7d:fb:b0:5c:a0:75:bc:2a:8b:0d:d5:ad:97: 26:3d:08:43:be:fe:a1:84:9e:11:d9:60:d0:11:1c:d7 Fingerprint (SHA-256): 9A:2F:E7:F2:40:EC:68:51:52:20:A4:65:CD:4C:94:A5:35:0B:BC:2A:64:6E:E9:0D:5A:10:AC:F8:91:C4:23:B0 Fingerprint (SHA1): AA:B4:0F:D4:72:00:B8:2E:B2:B6:18:1D:4C:1C:31:39:8D:45:F5:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152167 (0x3cafc4e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 15:23:10 2023 Not After : Wed Oct 18 15:23:10 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:c8:55:ad:57:b1:92:4c:16:5a:a9:9e:de:37:c1:da: 83:a7:67:b5:66:ad:31:1f:d1:f5:b4:b1:ac:65:72:d1: 9f:7d:84:05:ae:84:e8:b6:93:9e:9f:ea:8f:96:c8:fc: c3:5e:91:3e:6f:ee:8d:e6:7c:b3:73:c8:00:dd:98:4f: c2:3f:f0:49:bc:f6:4c:27:03:8e:1f:d7:75:9d:ef:72: ce:47:76:da:b0:78:13:ac:1e:6b:f9:3d:c3:67:c6:2b: 53:94:86:fd:34:ae:99:e0:67:e3:88:d1:86:0c:d3:d9: b3:5a:90:54:0b:00:11:12:df:63:ff:c9:45:c7:7a:24: d8:44:9b:a2:b4:c1:16:cf:bd:fc:91:e9:d3:b1:47:1e: 64:23:e0:29:14:e7:29:69:9b:29:e6:2c:ed:00:15:dc: 52:04:b2:b4:27:e3:bc:23:8e:62:11:04:d8:6e:c6:31: f4:61:dd:5f:f3:56:9a:9d:d8:8d:a3:d3:b9:dc:23:03: 41:ce:b1:77:8e:ea:cb:76:4e:c4:dc:12:9b:c9:b1:b2: 31:72:62:8e:81:ce:86:c2:59:2e:fa:d6:94:f3:41:66: 04:ea:d2:73:9f:d0:5d:e5:8d:c6:8e:cd:5e:2f:a8:9b: 2d:c3:70:7e:0b:84:64:f6:86:c2:fb:ad:43:aa:39:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:3e:61:6b:b9:67:1c:52:b4:7d:07:2d:04:47:ca:f1: cb:d1:30:44:95:a5:98:29:e3:28:79:c0:93:fa:3a:60: b7:ea:96:ac:b1:28:35:88:b2:90:eb:bc:c5:81:a3:4c: 37:b8:cd:73:58:50:4b:9d:1c:c3:87:f7:b5:83:05:6f: 48:c2:01:6d:b6:41:f6:5e:e0:f2:06:77:1f:fb:1f:25: 88:81:e6:81:7e:4b:16:ca:87:f3:cf:3f:ae:4c:4f:8f: 63:b8:b1:bb:10:53:4e:10:f7:a2:b4:72:1a:80:93:8f: 0e:6c:a4:f2:c9:99:c5:d2:f1:45:ef:d1:2a:a8:a3:67: 71:fa:ab:b9:c7:99:10:4f:89:3b:bc:7f:12:10:db:75: 30:83:cb:51:81:dd:19:97:43:6d:c9:81:1d:09:54:a2: 6f:91:29:d5:02:5a:70:81:7d:2a:a6:eb:b0:ed:e8:eb: 86:b8:36:0a:43:69:29:31:e2:6e:a5:5b:49:8f:3d:3d: 29:ce:94:39:fb:ec:e3:5b:55:d8:33:9e:b7:f2:b6:fc: 45:a3:4e:21:98:13:3d:70:7e:18:c8:f0:b5:18:38:a9: 42:4d:d4:17:bd:35:d8:90:a1:d7:13:8e:a8:4b:55:ca: 08:e2:fa:8d:4c:7b:c6:3e:63:5c:f0:98:4a:a3:2f:09 Fingerprint (SHA-256): 3E:00:D8:51:A3:47:FA:42:46:77:5A:A0:2B:38:F4:65:C9:80:77:F9:8C:5C:7E:DE:72:B2:99:49:8D:89:10:04 Fingerprint (SHA1): 8B:8F:BF:2F:37:54:9D:23:49:2E:7B:2D:5F:69:F9:18:FC:59:E2:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152168 (0x3cafc4e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 15:23:11 2023 Not After : Wed Oct 18 15:23:11 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:ea:b0:9c:70:1a:b8:42:63:73:66:de:9c:04:93:d3: b9:ff:fe:69:f9:f5:c3:84:23:4f:41:64:15:7e:42:c5: e4:de:ca:11:c0:2f:b4:2c:1d:fa:74:e1:0d:bf:92:e7: 7f:e0:78:d4:89:ca:dc:69:f6:ee:b0:33:90:57:82:24: c5:77:f8:ee:a2:04:eb:66:f9:1c:91:0f:7a:e9:6c:78: 15:87:a3:24:15:87:13:ad:e1:c5:b2:28:83:23:40:65: b2:9d:4e:75:59:39:f1:fd:b8:40:dd:03:3a:63:74:b2: 04:4b:08:55:ed:6b:ff:2b:8c:d8:00:b7:22:f6:0a:03: db:48:a5:bb:46:44:0d:e4:e8:b8:83:0f:b4:09:35:37: 1b:22:86:21:fc:a9:41:fc:69:00:cc:bd:b8:b9:35:ef: be:9f:fe:d3:05:6a:14:23:78:02:8b:e4:bb:31:0c:6a: 6d:45:a0:33:e1:d8:fd:9a:c3:41:aa:55:ed:34:8a:96: f0:29:14:32:86:6f:fa:ae:86:f7:1c:2e:ab:ac:cc:67: d2:1d:1b:76:3d:bc:52:13:d6:2b:77:58:22:7d:38:dd: 3b:49:d3:18:fb:11:af:b4:80:75:47:90:d7:42:32:35: b2:ac:52:8c:d7:2d:f4:8c:f6:37:c0:5e:b7:b4:5f:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:4c:d9:92:0b:68:56:e4:3e:dc:39:75:81:e7:4e:b9: 17:5b:61:a7:f1:aa:96:75:47:92:6e:bc:b3:8c:03:b3: 89:b6:f2:9d:69:aa:d7:6c:32:31:d4:4c:4f:0e:05:46: d6:77:20:f3:32:56:ab:0b:89:3e:33:1f:74:52:1c:38: 8d:0c:f8:c8:67:1e:01:92:ba:55:34:7c:b1:79:f4:6e: b9:a3:20:81:7d:5e:b4:5d:3e:33:2b:44:d8:94:67:d4: b2:a1:7c:fd:22:9b:87:f6:59:a8:78:ee:fe:bc:e0:d1: 94:99:50:e6:2e:d4:b8:4c:90:9b:e5:e4:41:18:b0:71: 66:b8:80:12:aa:fe:a6:19:02:c7:4b:65:ad:13:fd:f5: f1:10:fd:d6:5b:62:11:81:93:45:ce:db:35:82:21:69: 46:c1:e3:f2:34:56:4a:37:75:35:bd:2f:d6:b1:bb:8b: 2a:3e:fa:d2:3c:d1:34:fd:19:60:88:34:b3:db:39:2f: 33:f0:36:45:5c:8e:26:55:45:d6:9d:94:5f:a1:a7:cd: 29:a4:ae:84:ea:ee:35:fd:64:14:2e:93:73:49:1f:9d: 22:9c:4c:e9:21:c2:d6:27:bc:3b:1b:82:8d:81:b9:3a: c1:a9:d7:1f:3e:75:43:53:2b:3b:db:d6:06:2c:2b:e9 Fingerprint (SHA-256): F2:59:F2:AB:AB:BE:8C:20:ED:D2:7A:3F:AA:64:3C:FE:B2:BA:78:45:FD:C9:39:D1:71:0E:7B:10:29:BA:D5:05 Fingerprint (SHA1): CE:62:06:84:10:32:99:30:61:C7:95:68:53:B1:03:D0:40:EB:03:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152169 (0x3cafc4e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 15:23:13 2023 Not After : Wed Oct 18 15:23:13 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:4f:87:91:1c:c9:33:dd:ed:19:7f:91:ca:9d:6c:97: 8b:d9:4c:29:30:55:69:a5:78:09:64:c8:f2:85:c8:e0: a9:e1:e6:8a:2c:f0:4c:c2:e5:e8:00:ff:f9:66:40:32: 82:6a:08:35:ae:8b:8c:44:b8:55:59:8b:95:1c:0e:df: 0f:60:c1:81:8e:ae:64:ff:37:c4:13:11:c5:eb:0c:f4: 06:ba:1e:c5:ce:5b:44:f4:1e:2a:d9:0d:cf:99:7d:db: f7:3e:60:66:9a:52:dd:ac:4b:bb:17:f6:e0:c4:23:4d: ab:cc:66:cb:9c:90:11:4e:d6:61:21:6e:f1:71:a0:5c: 01:58:ce:41:fc:83:ff:4b:ad:8e:ab:2a:c3:ae:7e:cd: 75:e6:98:28:72:d4:44:4a:09:1e:60:46:84:f7:85:6a: 94:7b:de:6c:b8:a9:d4:49:b4:b9:e2:f6:86:5c:cc:07: 12:d3:90:6f:b9:27:1f:65:8c:db:00:9b:58:f3:05:51: b7:cd:ab:cc:71:c7:57:54:56:fc:2b:84:98:80:a4:a7: ae:11:ce:57:b8:a5:f0:99:2c:6e:42:a8:6c:cb:b1:7b: ee:66:ae:fd:6e:5e:cc:06:eb:3b:1c:04:5d:cc:7a:55: c4:99:fc:07:7b:dc:d8:ce:21:a7:48:52:c0:a7:71:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:a7:c2:3d:58:30:f6:ea:6a:ec:38:cb:93:63:09:3a: ed:50:a3:af:78:59:34:48:e3:72:c7:73:2f:f8:81:c4: 74:a8:06:5f:be:3f:83:b1:16:ec:fa:a2:a8:03:1a:a1: 03:4d:c9:d7:cb:8c:e3:c6:74:79:5d:b0:d7:f7:d8:ee: bf:72:22:f0:c8:1f:fd:d5:8b:c1:f7:d8:e7:60:e7:ed: 24:2c:ba:f7:ae:7d:ea:34:42:0d:a7:f2:ae:3d:fe:e7: b7:0a:b7:84:d9:fc:8b:ce:ae:59:4a:eb:c3:30:68:de: 51:40:f6:a9:81:47:2c:2b:96:55:44:c3:42:3a:87:75: 88:a5:3a:11:d0:89:90:f6:71:83:cd:11:5a:34:92:4a: 2a:95:75:4d:91:0f:ff:2e:6f:e6:83:7a:77:50:d8:b5: 73:9e:8d:4a:e5:eb:ac:98:ff:9d:26:20:2b:76:cc:a6: 26:bf:d0:e2:75:ce:d6:46:70:89:a5:b8:24:47:5b:bf: 17:61:9b:b5:3a:92:7c:88:85:d8:32:ed:ec:63:17:7a: ee:4f:dd:07:a0:70:9a:7c:07:18:93:15:b2:51:e6:ba: f0:87:a2:c1:10:1a:83:a4:74:63:db:af:a9:1e:ac:2c: 55:65:80:f5:67:11:c1:a5:fb:01:a0:9f:bc:f9:df:bb Fingerprint (SHA-256): EA:53:7F:FE:33:E4:74:FD:56:2D:32:E3:8C:AE:70:51:5B:A5:5E:37:0C:F9:13:18:93:88:32:DC:8F:B9:DF:3C Fingerprint (SHA1): 5D:B7:25:E5:AF:5B:FC:F8:AC:93:65:C7:66:EB:76:88:84:6C:C8:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152184 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152185 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152186 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152187 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152184 (0x3cafc4f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:26 2023 Not After : Wed Oct 18 15:23:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:43:9f:a9:21:70:f0:90:b1:3c:f3:19:d9:e3:41:f7: 2c:21:ba:52:f1:df:ef:1f:01:d6:ae:b6:66:08:ad:a8: 3b:ab:7c:4c:1c:1b:07:27:e0:7c:ce:ff:a7:aa:0e:dd: 57:77:38:d1:6d:e2:05:eb:f9:e5:1e:d4:bc:f2:42:62: 91:cf:ab:48:93:ca:0a:f1:07:a7:22:7b:31:fc:c0:42: e9:a5:9e:41:84:79:fb:8b:7c:50:a6:7d:06:4b:a0:f9: b3:1a:30:79:ce:5a:ba:17:bb:85:4f:b0:7a:94:65:b4: ce:af:26:c0:5e:b0:9f:22:db:28:5c:d9:ae:e7:7c:5d: 74:e6:a4:01:7d:18:e7:cc:4e:dd:6b:05:a2:05:71:23: 38:20:36:ff:b8:fb:c2:b0:1f:a3:58:f4:dd:c0:73:c7: bc:67:4c:c3:57:1b:b1:c1:e9:d0:55:e8:78:cb:74:24: 42:c7:7f:a3:9f:1c:86:a7:7d:56:26:18:bc:a5:e6:34: 90:81:3d:cc:0a:e1:4b:ff:ed:76:bb:bb:a3:b3:78:ad: 56:44:9b:f5:8b:30:16:81:3e:20:2c:7a:0e:a6:a6:5c: 04:95:ca:12:bd:70:f1:55:64:b9:30:9d:99:b3:43:a3: d5:0a:02:d7:e4:55:51:19:4a:d4:47:95:cd:ff:be:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:b9:e5:2f:1d:62:11:0b:06:d3:8f:be:27:5a:61:e7: 77:44:af:d2:13:ad:01:f4:90:79:68:49:bb:90:e1:be: 2c:3c:da:97:0c:d4:5c:29:9f:97:c0:5f:7e:aa:80:d4: 48:e4:da:b8:4b:29:85:1b:4d:a5:be:7a:0d:60:9e:8e: e5:ad:b5:c1:04:08:c2:b1:1f:90:51:8d:9b:e4:71:4b: 16:4c:25:e2:f2:f9:4b:87:7e:80:18:8d:7b:34:95:6d: db:a8:f7:e7:f3:d1:bd:c7:89:42:4e:85:53:c2:b6:aa: 92:46:54:ea:af:93:87:f6:f4:e2:33:cb:99:3d:68:ab: d6:96:6c:96:fc:54:ad:a3:41:ca:e7:7f:53:46:ed:db: 8a:7f:d4:e5:bd:8e:83:14:01:9f:ca:59:c0:89:e3:a6: 2f:b7:54:08:96:f6:21:0f:8f:a7:3f:5e:6a:ad:9e:58: 8b:32:65:07:04:95:07:a8:45:b6:b3:d4:ff:a6:90:27: 7e:72:62:8d:97:5a:5d:fc:98:ff:96:aa:e9:5b:4b:9f: f3:13:45:1a:a1:ab:14:8b:a0:e1:e8:3f:07:e2:7a:c6: d1:8d:d2:30:31:75:d4:6f:74:53:2d:af:93:69:c2:97: 69:62:b5:07:c6:36:5e:47:0d:1e:fb:ad:65:a3:9e:53 Fingerprint (SHA-256): E1:F9:E0:3F:2E:4F:49:8E:47:D7:2B:FA:7B:C5:13:A3:31:B0:BB:4B:51:DD:8E:E3:16:BF:A1:09:7C:7C:07:04 Fingerprint (SHA1): 64:6A:2B:D3:62:22:5D:FB:FF:E8:80:40:96:98:99:11:ED:89:C4:15 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152185 (0x3cafc4f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:27 2023 Not After : Wed Oct 18 15:23:27 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:eb:0a:e6:2a:1b:f5:35:18:b9:71:8f:21:02:73:82: 1f:f2:94:d0:d8:ed:c2:31:00:d7:5c:01:9e:f7:3d:48: 9a:23:f0:0a:ef:60:8d:5e:55:a9:72:e2:32:4d:e6:e5: b7:76:0b:48:5e:a1:33:00:84:cd:5c:fe:83:12:2b:15: f4:77:27:84:e4:71:54:11:80:72:a2:a0:00:2c:cf:6f: 51:9d:15:f0:56:56:e3:a5:37:55:20:eb:e0:32:68:2c: bf:59:06:de:be:f1:e6:74:f2:0e:a2:95:0c:d2:ec:d8: 2f:7c:8e:a9:9e:24:3d:0f:6c:69:55:85:a2:4b:4b:24: 2b:40:95:05:d9:7a:25:37:3f:fd:45:fb:93:23:b3:c8: 6f:0c:1c:14:9b:d5:e6:8a:4e:a4:56:23:6f:7b:fa:ed: cd:06:cb:1a:91:df:72:ea:2b:ce:b6:73:88:29:7b:41: a6:c5:f5:66:0d:49:52:0f:f7:ae:0f:d5:2b:01:be:35: 0f:54:07:36:ce:cc:97:5d:e4:e8:ff:39:f9:6f:62:cd: 21:88:0a:98:b8:5d:2f:b5:00:7b:5b:59:39:45:0d:a7: 87:e0:03:5a:f6:57:50:87:92:06:49:e0:2c:0a:b5:da: f6:5e:43:41:7b:86:34:e6:c9:34:c0:15:90:b0:2a:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:cc:46:79:03:32:a7:aa:ba:15:c9:12:c8:88:f7:4f: 3d:d6:ee:1d:7f:bc:b4:a7:66:18:a7:69:ca:c5:91:49: 29:74:4a:43:b9:8a:ca:97:ff:41:89:18:61:4f:ad:b0: 3e:51:2c:93:90:e3:34:b3:4b:58:8c:bd:b0:1f:ac:e7: 73:8e:cb:2c:88:7d:47:f2:b9:a9:c3:12:2c:0d:47:e2: 9e:4e:5a:fa:1e:1f:ac:23:20:31:31:34:67:c6:cb:b0: 8e:96:63:fc:fc:ad:bd:bd:46:5e:7a:cd:f7:3d:38:54: 99:0b:cd:49:de:64:5e:26:a0:af:81:b8:9b:ae:ca:ad: 05:c5:ea:b9:49:a4:5d:83:3f:ed:e4:4e:84:7a:69:11: 5f:2c:76:c6:10:58:75:ff:58:e4:40:07:98:09:04:30: 4c:7a:85:a9:2a:34:c4:d5:bf:87:e9:bf:82:69:4e:bb: b6:98:68:3e:6f:45:c1:75:af:0d:39:3a:4b:1b:b2:59: c1:c0:90:ae:66:97:81:a9:6b:81:fd:68:40:e1:43:7d: db:0b:f3:11:05:aa:b7:10:82:82:ed:e8:4b:d4:08:4e: 41:2a:b5:05:ed:c9:0f:76:0f:b5:55:aa:40:39:83:5d: 9e:65:b3:4d:54:78:19:c3:e3:ef:13:55:74:4e:07:2d Fingerprint (SHA-256): 21:5F:57:D4:D7:4C:99:8B:EC:5C:B0:0E:BE:5E:D2:39:1F:0A:D2:9F:83:72:13:9D:87:4E:4D:07:A8:A3:A5:45 Fingerprint (SHA1): 57:18:AE:45:9F:52:5D:20:D4:B9:A0:8C:3E:0B:2B:E5:4B:40:E6:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152186 (0x3cafc4fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:28 2023 Not After : Wed Oct 18 15:23:28 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:27:73:f5:2b:a9:44:6e:9a:46:d3:75:5c:58:a2:8e: 01:52:eb:46:a4:91:3c:f5:2e:7d:f1:ff:c9:61:f9:4c: 2b:3d:b0:56:2e:c7:59:79:0c:b8:ef:a1:87:9d:ad:11: 28:0a:f0:89:a6:36:7e:d6:8e:98:e2:08:44:d7:75:6f: 82:ce:35:3d:c1:e8:84:ee:ec:9b:3f:dd:6d:c5:89:46: 23:0f:20:88:1c:a3:16:0b:86:65:64:17:d1:56:fc:4b: fe:ee:d1:d4:e0:e1:67:9f:c5:18:f1:3c:67:45:7b:8f: 0d:7d:88:3b:01:aa:73:ce:75:ff:a4:7d:d6:59:e3:4e: 0f:92:d5:d9:ea:9f:c0:51:e1:2c:1e:b5:3d:de:1e:74: 99:1e:e4:81:57:4c:5b:e3:79:32:d0:b5:de:cd:62:a0: 18:1e:44:6b:73:64:54:1d:36:cf:cb:fc:f4:34:3f:c4: ea:85:aa:01:df:a6:e3:6c:fb:59:28:cf:ee:55:31:03: 42:e8:39:cb:20:73:49:15:84:d2:1d:a9:b9:66:25:86: f8:4e:41:26:5f:f0:b6:2c:03:ff:43:6f:6f:6f:13:d2: ff:be:9a:fd:95:3b:37:46:c0:7f:45:ab:63:d6:79:c0: e6:06:d2:a9:5b:35:e9:26:ee:be:e0:fe:18:e2:3e:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:5c:d3:2a:8f:a1:c1:51:f7:5b:c5:b8:2d:7b:3c:4e: d7:40:c3:41:6d:bc:73:c2:58:18:ed:83:49:68:1f:a1: b1:92:e7:78:51:59:e7:85:1f:3d:80:c7:e7:e9:a3:75: 81:34:e8:d7:89:ba:c9:64:09:91:d4:eb:17:c9:83:f3: 36:5a:7d:14:60:9e:7b:28:92:1c:49:5f:e2:be:01:8e: f5:b4:89:3f:f4:3b:2f:18:49:8b:14:1b:c6:a4:24:1a: 06:74:2f:e6:aa:55:4b:9b:b8:44:b9:12:55:62:b7:59: 86:00:a8:64:6b:bd:1f:5a:74:00:52:e4:59:f7:91:f1: bd:10:e7:f1:0a:ec:2b:a1:94:e4:0b:dc:ee:5e:1d:28: da:43:10:18:f4:99:f3:1b:a6:52:90:07:9f:1f:2e:76: c0:ed:9c:b4:60:74:ad:31:01:d1:c4:9c:b4:3f:86:cb: 4d:b0:19:82:75:08:c3:24:7c:8d:be:fd:d7:a3:46:e4: 63:9a:39:6c:45:a4:a8:ed:00:8e:5f:33:4a:33:cd:6f: 67:d9:2c:06:a3:a4:c2:92:37:bb:67:d7:cb:33:e3:74: 17:2d:cc:a6:6f:c4:63:d5:25:0a:2f:12:58:0f:d1:5c: 1e:95:62:1a:4a:9f:07:c6:a1:44:cc:3d:be:18:8d:f7 Fingerprint (SHA-256): 8E:F1:CD:ED:68:6F:EC:8F:9F:96:79:7E:5F:34:CD:8F:84:CD:49:6D:53:3C:99:62:56:9E:D3:B4:AE:55:A5:3D Fingerprint (SHA1): 3C:46:74:4A:D7:3D:0B:40:6E:D2:69:C9:78:BC:40:0B:DB:1D:DA:BE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152184 (0x3cafc4f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:26 2023 Not After : Wed Oct 18 15:23:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:43:9f:a9:21:70:f0:90:b1:3c:f3:19:d9:e3:41:f7: 2c:21:ba:52:f1:df:ef:1f:01:d6:ae:b6:66:08:ad:a8: 3b:ab:7c:4c:1c:1b:07:27:e0:7c:ce:ff:a7:aa:0e:dd: 57:77:38:d1:6d:e2:05:eb:f9:e5:1e:d4:bc:f2:42:62: 91:cf:ab:48:93:ca:0a:f1:07:a7:22:7b:31:fc:c0:42: e9:a5:9e:41:84:79:fb:8b:7c:50:a6:7d:06:4b:a0:f9: b3:1a:30:79:ce:5a:ba:17:bb:85:4f:b0:7a:94:65:b4: ce:af:26:c0:5e:b0:9f:22:db:28:5c:d9:ae:e7:7c:5d: 74:e6:a4:01:7d:18:e7:cc:4e:dd:6b:05:a2:05:71:23: 38:20:36:ff:b8:fb:c2:b0:1f:a3:58:f4:dd:c0:73:c7: bc:67:4c:c3:57:1b:b1:c1:e9:d0:55:e8:78:cb:74:24: 42:c7:7f:a3:9f:1c:86:a7:7d:56:26:18:bc:a5:e6:34: 90:81:3d:cc:0a:e1:4b:ff:ed:76:bb:bb:a3:b3:78:ad: 56:44:9b:f5:8b:30:16:81:3e:20:2c:7a:0e:a6:a6:5c: 04:95:ca:12:bd:70:f1:55:64:b9:30:9d:99:b3:43:a3: d5:0a:02:d7:e4:55:51:19:4a:d4:47:95:cd:ff:be:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:b9:e5:2f:1d:62:11:0b:06:d3:8f:be:27:5a:61:e7: 77:44:af:d2:13:ad:01:f4:90:79:68:49:bb:90:e1:be: 2c:3c:da:97:0c:d4:5c:29:9f:97:c0:5f:7e:aa:80:d4: 48:e4:da:b8:4b:29:85:1b:4d:a5:be:7a:0d:60:9e:8e: e5:ad:b5:c1:04:08:c2:b1:1f:90:51:8d:9b:e4:71:4b: 16:4c:25:e2:f2:f9:4b:87:7e:80:18:8d:7b:34:95:6d: db:a8:f7:e7:f3:d1:bd:c7:89:42:4e:85:53:c2:b6:aa: 92:46:54:ea:af:93:87:f6:f4:e2:33:cb:99:3d:68:ab: d6:96:6c:96:fc:54:ad:a3:41:ca:e7:7f:53:46:ed:db: 8a:7f:d4:e5:bd:8e:83:14:01:9f:ca:59:c0:89:e3:a6: 2f:b7:54:08:96:f6:21:0f:8f:a7:3f:5e:6a:ad:9e:58: 8b:32:65:07:04:95:07:a8:45:b6:b3:d4:ff:a6:90:27: 7e:72:62:8d:97:5a:5d:fc:98:ff:96:aa:e9:5b:4b:9f: f3:13:45:1a:a1:ab:14:8b:a0:e1:e8:3f:07:e2:7a:c6: d1:8d:d2:30:31:75:d4:6f:74:53:2d:af:93:69:c2:97: 69:62:b5:07:c6:36:5e:47:0d:1e:fb:ad:65:a3:9e:53 Fingerprint (SHA-256): E1:F9:E0:3F:2E:4F:49:8E:47:D7:2B:FA:7B:C5:13:A3:31:B0:BB:4B:51:DD:8E:E3:16:BF:A1:09:7C:7C:07:04 Fingerprint (SHA1): 64:6A:2B:D3:62:22:5D:FB:FF:E8:80:40:96:98:99:11:ED:89:C4:15 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152185 (0x3cafc4f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:27 2023 Not After : Wed Oct 18 15:23:27 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:eb:0a:e6:2a:1b:f5:35:18:b9:71:8f:21:02:73:82: 1f:f2:94:d0:d8:ed:c2:31:00:d7:5c:01:9e:f7:3d:48: 9a:23:f0:0a:ef:60:8d:5e:55:a9:72:e2:32:4d:e6:e5: b7:76:0b:48:5e:a1:33:00:84:cd:5c:fe:83:12:2b:15: f4:77:27:84:e4:71:54:11:80:72:a2:a0:00:2c:cf:6f: 51:9d:15:f0:56:56:e3:a5:37:55:20:eb:e0:32:68:2c: bf:59:06:de:be:f1:e6:74:f2:0e:a2:95:0c:d2:ec:d8: 2f:7c:8e:a9:9e:24:3d:0f:6c:69:55:85:a2:4b:4b:24: 2b:40:95:05:d9:7a:25:37:3f:fd:45:fb:93:23:b3:c8: 6f:0c:1c:14:9b:d5:e6:8a:4e:a4:56:23:6f:7b:fa:ed: cd:06:cb:1a:91:df:72:ea:2b:ce:b6:73:88:29:7b:41: a6:c5:f5:66:0d:49:52:0f:f7:ae:0f:d5:2b:01:be:35: 0f:54:07:36:ce:cc:97:5d:e4:e8:ff:39:f9:6f:62:cd: 21:88:0a:98:b8:5d:2f:b5:00:7b:5b:59:39:45:0d:a7: 87:e0:03:5a:f6:57:50:87:92:06:49:e0:2c:0a:b5:da: f6:5e:43:41:7b:86:34:e6:c9:34:c0:15:90:b0:2a:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:cc:46:79:03:32:a7:aa:ba:15:c9:12:c8:88:f7:4f: 3d:d6:ee:1d:7f:bc:b4:a7:66:18:a7:69:ca:c5:91:49: 29:74:4a:43:b9:8a:ca:97:ff:41:89:18:61:4f:ad:b0: 3e:51:2c:93:90:e3:34:b3:4b:58:8c:bd:b0:1f:ac:e7: 73:8e:cb:2c:88:7d:47:f2:b9:a9:c3:12:2c:0d:47:e2: 9e:4e:5a:fa:1e:1f:ac:23:20:31:31:34:67:c6:cb:b0: 8e:96:63:fc:fc:ad:bd:bd:46:5e:7a:cd:f7:3d:38:54: 99:0b:cd:49:de:64:5e:26:a0:af:81:b8:9b:ae:ca:ad: 05:c5:ea:b9:49:a4:5d:83:3f:ed:e4:4e:84:7a:69:11: 5f:2c:76:c6:10:58:75:ff:58:e4:40:07:98:09:04:30: 4c:7a:85:a9:2a:34:c4:d5:bf:87:e9:bf:82:69:4e:bb: b6:98:68:3e:6f:45:c1:75:af:0d:39:3a:4b:1b:b2:59: c1:c0:90:ae:66:97:81:a9:6b:81:fd:68:40:e1:43:7d: db:0b:f3:11:05:aa:b7:10:82:82:ed:e8:4b:d4:08:4e: 41:2a:b5:05:ed:c9:0f:76:0f:b5:55:aa:40:39:83:5d: 9e:65:b3:4d:54:78:19:c3:e3:ef:13:55:74:4e:07:2d Fingerprint (SHA-256): 21:5F:57:D4:D7:4C:99:8B:EC:5C:B0:0E:BE:5E:D2:39:1F:0A:D2:9F:83:72:13:9D:87:4E:4D:07:A8:A3:A5:45 Fingerprint (SHA1): 57:18:AE:45:9F:52:5D:20:D4:B9:A0:8C:3E:0B:2B:E5:4B:40:E6:C7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152186 (0x3cafc4fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:28 2023 Not After : Wed Oct 18 15:23:28 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:27:73:f5:2b:a9:44:6e:9a:46:d3:75:5c:58:a2:8e: 01:52:eb:46:a4:91:3c:f5:2e:7d:f1:ff:c9:61:f9:4c: 2b:3d:b0:56:2e:c7:59:79:0c:b8:ef:a1:87:9d:ad:11: 28:0a:f0:89:a6:36:7e:d6:8e:98:e2:08:44:d7:75:6f: 82:ce:35:3d:c1:e8:84:ee:ec:9b:3f:dd:6d:c5:89:46: 23:0f:20:88:1c:a3:16:0b:86:65:64:17:d1:56:fc:4b: fe:ee:d1:d4:e0:e1:67:9f:c5:18:f1:3c:67:45:7b:8f: 0d:7d:88:3b:01:aa:73:ce:75:ff:a4:7d:d6:59:e3:4e: 0f:92:d5:d9:ea:9f:c0:51:e1:2c:1e:b5:3d:de:1e:74: 99:1e:e4:81:57:4c:5b:e3:79:32:d0:b5:de:cd:62:a0: 18:1e:44:6b:73:64:54:1d:36:cf:cb:fc:f4:34:3f:c4: ea:85:aa:01:df:a6:e3:6c:fb:59:28:cf:ee:55:31:03: 42:e8:39:cb:20:73:49:15:84:d2:1d:a9:b9:66:25:86: f8:4e:41:26:5f:f0:b6:2c:03:ff:43:6f:6f:6f:13:d2: ff:be:9a:fd:95:3b:37:46:c0:7f:45:ab:63:d6:79:c0: e6:06:d2:a9:5b:35:e9:26:ee:be:e0:fe:18:e2:3e:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:5c:d3:2a:8f:a1:c1:51:f7:5b:c5:b8:2d:7b:3c:4e: d7:40:c3:41:6d:bc:73:c2:58:18:ed:83:49:68:1f:a1: b1:92:e7:78:51:59:e7:85:1f:3d:80:c7:e7:e9:a3:75: 81:34:e8:d7:89:ba:c9:64:09:91:d4:eb:17:c9:83:f3: 36:5a:7d:14:60:9e:7b:28:92:1c:49:5f:e2:be:01:8e: f5:b4:89:3f:f4:3b:2f:18:49:8b:14:1b:c6:a4:24:1a: 06:74:2f:e6:aa:55:4b:9b:b8:44:b9:12:55:62:b7:59: 86:00:a8:64:6b:bd:1f:5a:74:00:52:e4:59:f7:91:f1: bd:10:e7:f1:0a:ec:2b:a1:94:e4:0b:dc:ee:5e:1d:28: da:43:10:18:f4:99:f3:1b:a6:52:90:07:9f:1f:2e:76: c0:ed:9c:b4:60:74:ad:31:01:d1:c4:9c:b4:3f:86:cb: 4d:b0:19:82:75:08:c3:24:7c:8d:be:fd:d7:a3:46:e4: 63:9a:39:6c:45:a4:a8:ed:00:8e:5f:33:4a:33:cd:6f: 67:d9:2c:06:a3:a4:c2:92:37:bb:67:d7:cb:33:e3:74: 17:2d:cc:a6:6f:c4:63:d5:25:0a:2f:12:58:0f:d1:5c: 1e:95:62:1a:4a:9f:07:c6:a1:44:cc:3d:be:18:8d:f7 Fingerprint (SHA-256): 8E:F1:CD:ED:68:6F:EC:8F:9F:96:79:7E:5F:34:CD:8F:84:CD:49:6D:53:3C:99:62:56:9E:D3:B4:AE:55:A5:3D Fingerprint (SHA1): 3C:46:74:4A:D7:3D:0B:40:6E:D2:69:C9:78:BC:40:0B:DB:1D:DA:BE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152188 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152189 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152190 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018152191 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018152192 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152188 (0x3cafc4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:32 2023 Not After : Wed Oct 18 15:23:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:6c:e1:19:91:d3:ab:1a:df:b1:7b:ac:ec:3a:34:7c: e3:89:10:f0:c1:47:d6:2b:51:86:7f:1b:73:f1:19:87: 0f:83:21:90:b1:4a:31:90:c0:57:55:af:97:5b:3b:0c: 09:64:3f:2a:d9:f3:5e:82:9a:60:be:5a:ad:71:ea:23: 63:87:ea:a5:73:05:26:2d:03:db:4c:38:4e:f9:58:6a: 60:55:4c:8e:63:3c:f1:74:3f:92:3f:db:47:d9:c0:e5: e0:01:6a:3d:a0:9d:45:12:df:00:8a:cd:97:08:e6:aa: ae:de:b3:82:95:59:eb:ff:e0:74:7a:3d:29:a2:ed:0a: 8a:1d:f0:ba:d3:c9:56:bc:8e:2f:4e:4f:f1:0b:a4:2b: 7f:e5:4d:b9:0c:d7:31:46:23:ca:df:c8:47:ac:05:09: 1d:aa:fc:a2:e4:7d:d5:6a:ab:99:f0:a1:18:a8:6f:b2: fe:ac:57:58:d9:a9:16:17:a5:81:6c:a8:ab:c8:1d:44: 13:53:55:26:12:93:19:d9:ce:2c:1d:02:90:60:69:80: f7:7d:89:aa:36:71:4b:e9:7e:f4:b0:3b:68:93:f9:10: 62:35:b0:83:74:17:d3:b7:c8:22:c6:92:92:ae:ad:b7: d0:b9:2a:97:bb:9a:4f:d0:33:03:9b:7d:7b:6d:c0:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b9:c0:cc:19:47:50:37:d5:08:c7:39:9a:92:92:e9: 53:ef:bd:34:50:cc:82:74:87:54:b0:eb:68:88:b7:34: fe:b3:27:5b:25:76:68:21:9a:5c:fb:1e:f0:72:8d:1e: 87:8e:de:bb:9b:3f:1a:4b:16:aa:06:2f:be:77:b2:b0: 31:72:ff:ec:3d:d8:d6:69:09:05:1b:d0:1b:5e:03:7f: fc:e9:7a:cd:ea:08:0f:88:07:09:d0:5d:88:25:d8:0f: fb:c1:13:62:26:99:4c:3d:85:59:1d:a1:8e:8b:6e:33: 4d:ea:59:7e:69:71:99:e8:39:b6:82:5a:bc:e4:9b:e0: 8b:fe:97:0a:8b:ae:ff:1d:5d:1b:8b:64:32:47:d8:8c: 89:74:8d:0d:47:ef:e9:e5:e2:27:da:a1:8f:5e:7d:70: d9:a0:a2:70:1d:68:cc:9b:c2:a5:16:81:4d:57:38:6b: 75:43:3d:09:45:08:30:ca:2e:fd:d6:fe:9f:fe:59:b6: 6c:b0:19:01:97:16:4d:74:92:44:7b:32:22:be:06:b3: e7:e7:2b:41:87:a3:4d:90:e9:62:da:77:f2:de:d8:3b: 8e:db:77:75:44:d0:49:d6:77:47:88:b0:4f:05:85:9c: 5a:a6:07:50:9f:25:11:d6:d7:87:a8:cd:57:83:72:7f Fingerprint (SHA-256): 08:92:31:DA:13:22:CB:7A:8F:34:83:28:5F:54:95:74:B1:82:51:F7:25:B9:3A:50:FE:D7:B9:D8:83:3B:25:BE Fingerprint (SHA1): A2:5E:7F:BE:2B:31:7A:FF:4A:4A:CC:60:90:AB:14:5D:CF:E2:8D:65 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152189 (0x3cafc4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:33 2023 Not After : Wed Oct 18 15:23:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:50:ca:20:7d:20:65:80:32:1a:ef:82:1b:27:d3:f0: d0:ba:1a:f2:8a:3d:ce:d8:2d:90:03:16:90:c7:6e:37: 57:44:7f:ed:d2:2f:ca:76:34:4d:2b:dc:d2:7f:e3:96: 74:aa:6c:1d:95:20:b5:5b:bc:51:b7:d7:84:2d:2c:18: 06:4f:a2:6d:57:20:86:7f:a7:8f:0e:84:66:c9:51:91: ae:97:0b:5b:35:09:e8:9b:d6:6a:6e:a7:c0:90:24:78: 9b:a4:1a:38:b7:84:d6:6b:0a:a8:5a:ac:b9:64:36:26: 00:04:ed:6b:3c:e1:64:83:b9:8d:00:23:8c:1c:65:bd: 2b:23:da:b4:a4:a8:38:3e:b6:8a:33:9a:12:bd:dd:03: 6d:b4:0d:c4:f9:e2:30:4e:11:97:56:b3:6e:11:8c:72: 12:28:fb:11:5b:74:2f:cf:87:ca:75:b4:90:ad:ce:a3: d1:23:6d:01:c4:94:c2:5b:b7:d4:e0:9d:86:67:2e:08: e2:9c:69:61:c9:96:6c:d0:5c:71:d6:83:e6:9d:68:59: 9a:3e:f9:5c:85:66:21:00:b6:1a:73:95:7a:2f:2e:bf: 15:87:2e:82:ae:ff:e6:8c:4b:68:35:b9:6c:8c:11:38: ed:38:92:5e:b7:69:b1:c5:1e:67:a7:45:87:d3:60:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:33:21:4c:9a:7c:31:ed:8c:79:88:73:8c:bf:7e:c7: c3:72:a7:05:46:1e:7c:42:6c:10:07:6d:f0:7e:ee:33: 7e:1c:08:70:8d:e4:9e:17:52:83:40:c2:f2:47:f4:12: 83:1a:5f:13:11:42:29:f9:e8:1a:6a:68:51:81:f0:f2: de:01:c4:16:25:99:4f:33:9c:32:d4:64:bb:eb:e6:d3: 56:c9:fd:91:4a:75:30:50:03:17:a2:9a:45:ea:68:ee: 24:2f:9c:9c:d1:6d:ca:f7:c2:8f:a2:b8:20:4f:b1:d3: 06:a2:4a:f0:40:64:df:85:35:5f:24:5a:4a:b8:3c:19: d5:50:2e:82:2c:23:38:7e:39:9a:d0:7c:6e:21:49:3b: 3c:75:cc:aa:e6:2d:a9:3c:25:06:d3:c0:3b:5f:a6:7f: b7:c5:b4:a2:92:fa:4d:04:44:c3:61:33:bb:ad:14:18: f4:fa:fb:f2:20:0a:cb:7c:7d:17:35:5e:b7:81:1d:e9: 3a:c9:5e:1e:1f:60:44:54:ca:93:59:c2:9b:ac:f7:95: 8f:96:7b:53:a8:af:84:a4:57:21:21:3a:e8:e3:0e:02: d1:e8:1b:99:a1:84:3b:12:f3:7a:b3:70:55:a2:19:cf: c4:a3:f9:47:dd:52:59:0b:42:93:1b:22:6b:2f:d1:c1 Fingerprint (SHA-256): DE:15:BF:28:38:DD:42:BD:6A:47:D3:A9:90:01:C7:E6:AB:21:FC:7A:78:35:08:3C:79:11:3B:A0:78:DA:69:7A Fingerprint (SHA1): 70:B8:3F:B0:58:D8:F5:99:E1:DE:79:A1:88:87:AE:50:20:DB:46:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152190 (0x3cafc4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:35 2023 Not After : Wed Oct 18 15:23:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:99:72:a8:19:74:9e:f0:cf:8b:6c:6c:a9:3b:69: 3a:bc:17:91:49:56:e5:ee:53:89:85:64:52:e6:6d:a4: ad:a7:f8:d1:fa:62:30:75:8a:b2:9f:49:2e:f9:3a:3e: 0c:27:a5:08:c2:c7:b1:34:84:58:20:14:34:31:df:4c: 46:88:f3:8c:11:9b:6b:07:f5:23:04:af:8d:e0:da:06: 21:ea:26:b9:56:17:d4:fb:5f:0f:ca:4b:de:58:eb:af: ca:f6:78:9c:0f:b1:ad:f0:10:66:4f:a7:2e:f9:fb:ab: 12:aa:09:4e:97:33:3c:1b:74:99:86:18:95:04:2b:6e: ce:d7:97:95:0d:e3:9f:68:45:e7:cf:ea:58:2f:bb:28: d2:65:b1:dc:9f:5d:52:94:ed:e7:03:c4:3b:4c:76:87: 6c:95:f5:fe:f7:f5:ce:3a:49:cb:c3:c8:3b:7d:84:5b: 96:97:d7:d6:9c:d7:87:12:56:b9:71:79:67:84:3e:f5: 7d:76:d0:c4:21:8e:39:f7:b7:1e:97:a2:60:aa:59:8a: 41:87:cb:5c:75:5f:2f:60:93:d2:ff:15:75:c7:1d:72: 4e:4a:b8:6a:54:49:84:b3:d4:09:ce:e6:0a:85:ad:ac: 2c:62:7c:59:98:40:b5:65:e5:4c:cb:85:70:7a:bc:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:91:49:28:4c:85:e6:c1:2f:dc:fe:4c:f2:47:63:29: 11:a0:64:c0:82:89:73:30:e4:69:2b:84:3e:fa:1e:46: f0:81:65:db:fe:05:9e:e7:9a:74:7b:61:00:2f:78:4f: aa:15:5f:fc:f7:84:80:2d:97:3d:85:79:e6:6d:41:31: 6d:b4:95:7e:5d:bf:53:a9:7d:fd:e9:f2:a3:17:92:13: 4a:d5:a4:10:b9:2b:7f:ed:63:c0:3c:d5:ea:8a:a3:a7: 1d:55:6a:1c:30:21:a5:49:28:6f:5c:f9:b2:37:37:d4: 98:9a:4b:97:43:82:26:a4:59:dd:08:4d:8e:21:85:08: 6a:77:a7:a1:7a:77:33:7f:5d:02:14:d9:ef:cd:67:63: 95:65:19:bf:48:4b:67:a6:85:b1:b1:90:5e:d3:ff:62: b3:78:a6:c7:9f:a3:9d:56:db:ec:2c:a3:ea:e9:19:4e: 1e:b0:dd:fc:03:c2:7c:db:b4:1f:ce:44:5f:e4:12:04: 3f:93:81:6e:a8:c0:32:ec:ba:e5:e9:8f:cf:3a:03:37: 11:2b:06:8b:87:a0:16:31:95:74:e2:63:9c:0f:49:e1: 8f:3c:55:a1:d6:d2:ae:66:cf:ae:34:8b:e8:f5:0a:1b: cd:79:4b:da:d7:fe:c6:4f:2e:9a:9e:31:b7:44:7a:da Fingerprint (SHA-256): 32:3E:4B:F5:5E:B8:B6:D5:9B:8A:22:88:5D:F9:FA:16:50:54:90:97:E3:8C:BE:65:5C:49:C2:05:EE:98:32:6C Fingerprint (SHA1): 64:A2:91:04:E7:AC:F9:C0:C6:D8:E8:79:0D:14:DC:8A:31:CE:D5:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152188 (0x3cafc4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:32 2023 Not After : Wed Oct 18 15:23:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:6c:e1:19:91:d3:ab:1a:df:b1:7b:ac:ec:3a:34:7c: e3:89:10:f0:c1:47:d6:2b:51:86:7f:1b:73:f1:19:87: 0f:83:21:90:b1:4a:31:90:c0:57:55:af:97:5b:3b:0c: 09:64:3f:2a:d9:f3:5e:82:9a:60:be:5a:ad:71:ea:23: 63:87:ea:a5:73:05:26:2d:03:db:4c:38:4e:f9:58:6a: 60:55:4c:8e:63:3c:f1:74:3f:92:3f:db:47:d9:c0:e5: e0:01:6a:3d:a0:9d:45:12:df:00:8a:cd:97:08:e6:aa: ae:de:b3:82:95:59:eb:ff:e0:74:7a:3d:29:a2:ed:0a: 8a:1d:f0:ba:d3:c9:56:bc:8e:2f:4e:4f:f1:0b:a4:2b: 7f:e5:4d:b9:0c:d7:31:46:23:ca:df:c8:47:ac:05:09: 1d:aa:fc:a2:e4:7d:d5:6a:ab:99:f0:a1:18:a8:6f:b2: fe:ac:57:58:d9:a9:16:17:a5:81:6c:a8:ab:c8:1d:44: 13:53:55:26:12:93:19:d9:ce:2c:1d:02:90:60:69:80: f7:7d:89:aa:36:71:4b:e9:7e:f4:b0:3b:68:93:f9:10: 62:35:b0:83:74:17:d3:b7:c8:22:c6:92:92:ae:ad:b7: d0:b9:2a:97:bb:9a:4f:d0:33:03:9b:7d:7b:6d:c0:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b9:c0:cc:19:47:50:37:d5:08:c7:39:9a:92:92:e9: 53:ef:bd:34:50:cc:82:74:87:54:b0:eb:68:88:b7:34: fe:b3:27:5b:25:76:68:21:9a:5c:fb:1e:f0:72:8d:1e: 87:8e:de:bb:9b:3f:1a:4b:16:aa:06:2f:be:77:b2:b0: 31:72:ff:ec:3d:d8:d6:69:09:05:1b:d0:1b:5e:03:7f: fc:e9:7a:cd:ea:08:0f:88:07:09:d0:5d:88:25:d8:0f: fb:c1:13:62:26:99:4c:3d:85:59:1d:a1:8e:8b:6e:33: 4d:ea:59:7e:69:71:99:e8:39:b6:82:5a:bc:e4:9b:e0: 8b:fe:97:0a:8b:ae:ff:1d:5d:1b:8b:64:32:47:d8:8c: 89:74:8d:0d:47:ef:e9:e5:e2:27:da:a1:8f:5e:7d:70: d9:a0:a2:70:1d:68:cc:9b:c2:a5:16:81:4d:57:38:6b: 75:43:3d:09:45:08:30:ca:2e:fd:d6:fe:9f:fe:59:b6: 6c:b0:19:01:97:16:4d:74:92:44:7b:32:22:be:06:b3: e7:e7:2b:41:87:a3:4d:90:e9:62:da:77:f2:de:d8:3b: 8e:db:77:75:44:d0:49:d6:77:47:88:b0:4f:05:85:9c: 5a:a6:07:50:9f:25:11:d6:d7:87:a8:cd:57:83:72:7f Fingerprint (SHA-256): 08:92:31:DA:13:22:CB:7A:8F:34:83:28:5F:54:95:74:B1:82:51:F7:25:B9:3A:50:FE:D7:B9:D8:83:3B:25:BE Fingerprint (SHA1): A2:5E:7F:BE:2B:31:7A:FF:4A:4A:CC:60:90:AB:14:5D:CF:E2:8D:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152189 (0x3cafc4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:33 2023 Not After : Wed Oct 18 15:23:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:50:ca:20:7d:20:65:80:32:1a:ef:82:1b:27:d3:f0: d0:ba:1a:f2:8a:3d:ce:d8:2d:90:03:16:90:c7:6e:37: 57:44:7f:ed:d2:2f:ca:76:34:4d:2b:dc:d2:7f:e3:96: 74:aa:6c:1d:95:20:b5:5b:bc:51:b7:d7:84:2d:2c:18: 06:4f:a2:6d:57:20:86:7f:a7:8f:0e:84:66:c9:51:91: ae:97:0b:5b:35:09:e8:9b:d6:6a:6e:a7:c0:90:24:78: 9b:a4:1a:38:b7:84:d6:6b:0a:a8:5a:ac:b9:64:36:26: 00:04:ed:6b:3c:e1:64:83:b9:8d:00:23:8c:1c:65:bd: 2b:23:da:b4:a4:a8:38:3e:b6:8a:33:9a:12:bd:dd:03: 6d:b4:0d:c4:f9:e2:30:4e:11:97:56:b3:6e:11:8c:72: 12:28:fb:11:5b:74:2f:cf:87:ca:75:b4:90:ad:ce:a3: d1:23:6d:01:c4:94:c2:5b:b7:d4:e0:9d:86:67:2e:08: e2:9c:69:61:c9:96:6c:d0:5c:71:d6:83:e6:9d:68:59: 9a:3e:f9:5c:85:66:21:00:b6:1a:73:95:7a:2f:2e:bf: 15:87:2e:82:ae:ff:e6:8c:4b:68:35:b9:6c:8c:11:38: ed:38:92:5e:b7:69:b1:c5:1e:67:a7:45:87:d3:60:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:33:21:4c:9a:7c:31:ed:8c:79:88:73:8c:bf:7e:c7: c3:72:a7:05:46:1e:7c:42:6c:10:07:6d:f0:7e:ee:33: 7e:1c:08:70:8d:e4:9e:17:52:83:40:c2:f2:47:f4:12: 83:1a:5f:13:11:42:29:f9:e8:1a:6a:68:51:81:f0:f2: de:01:c4:16:25:99:4f:33:9c:32:d4:64:bb:eb:e6:d3: 56:c9:fd:91:4a:75:30:50:03:17:a2:9a:45:ea:68:ee: 24:2f:9c:9c:d1:6d:ca:f7:c2:8f:a2:b8:20:4f:b1:d3: 06:a2:4a:f0:40:64:df:85:35:5f:24:5a:4a:b8:3c:19: d5:50:2e:82:2c:23:38:7e:39:9a:d0:7c:6e:21:49:3b: 3c:75:cc:aa:e6:2d:a9:3c:25:06:d3:c0:3b:5f:a6:7f: b7:c5:b4:a2:92:fa:4d:04:44:c3:61:33:bb:ad:14:18: f4:fa:fb:f2:20:0a:cb:7c:7d:17:35:5e:b7:81:1d:e9: 3a:c9:5e:1e:1f:60:44:54:ca:93:59:c2:9b:ac:f7:95: 8f:96:7b:53:a8:af:84:a4:57:21:21:3a:e8:e3:0e:02: d1:e8:1b:99:a1:84:3b:12:f3:7a:b3:70:55:a2:19:cf: c4:a3:f9:47:dd:52:59:0b:42:93:1b:22:6b:2f:d1:c1 Fingerprint (SHA-256): DE:15:BF:28:38:DD:42:BD:6A:47:D3:A9:90:01:C7:E6:AB:21:FC:7A:78:35:08:3C:79:11:3B:A0:78:DA:69:7A Fingerprint (SHA1): 70:B8:3F:B0:58:D8:F5:99:E1:DE:79:A1:88:87:AE:50:20:DB:46:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152190 (0x3cafc4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:35 2023 Not After : Wed Oct 18 15:23:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:99:72:a8:19:74:9e:f0:cf:8b:6c:6c:a9:3b:69: 3a:bc:17:91:49:56:e5:ee:53:89:85:64:52:e6:6d:a4: ad:a7:f8:d1:fa:62:30:75:8a:b2:9f:49:2e:f9:3a:3e: 0c:27:a5:08:c2:c7:b1:34:84:58:20:14:34:31:df:4c: 46:88:f3:8c:11:9b:6b:07:f5:23:04:af:8d:e0:da:06: 21:ea:26:b9:56:17:d4:fb:5f:0f:ca:4b:de:58:eb:af: ca:f6:78:9c:0f:b1:ad:f0:10:66:4f:a7:2e:f9:fb:ab: 12:aa:09:4e:97:33:3c:1b:74:99:86:18:95:04:2b:6e: ce:d7:97:95:0d:e3:9f:68:45:e7:cf:ea:58:2f:bb:28: d2:65:b1:dc:9f:5d:52:94:ed:e7:03:c4:3b:4c:76:87: 6c:95:f5:fe:f7:f5:ce:3a:49:cb:c3:c8:3b:7d:84:5b: 96:97:d7:d6:9c:d7:87:12:56:b9:71:79:67:84:3e:f5: 7d:76:d0:c4:21:8e:39:f7:b7:1e:97:a2:60:aa:59:8a: 41:87:cb:5c:75:5f:2f:60:93:d2:ff:15:75:c7:1d:72: 4e:4a:b8:6a:54:49:84:b3:d4:09:ce:e6:0a:85:ad:ac: 2c:62:7c:59:98:40:b5:65:e5:4c:cb:85:70:7a:bc:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:91:49:28:4c:85:e6:c1:2f:dc:fe:4c:f2:47:63:29: 11:a0:64:c0:82:89:73:30:e4:69:2b:84:3e:fa:1e:46: f0:81:65:db:fe:05:9e:e7:9a:74:7b:61:00:2f:78:4f: aa:15:5f:fc:f7:84:80:2d:97:3d:85:79:e6:6d:41:31: 6d:b4:95:7e:5d:bf:53:a9:7d:fd:e9:f2:a3:17:92:13: 4a:d5:a4:10:b9:2b:7f:ed:63:c0:3c:d5:ea:8a:a3:a7: 1d:55:6a:1c:30:21:a5:49:28:6f:5c:f9:b2:37:37:d4: 98:9a:4b:97:43:82:26:a4:59:dd:08:4d:8e:21:85:08: 6a:77:a7:a1:7a:77:33:7f:5d:02:14:d9:ef:cd:67:63: 95:65:19:bf:48:4b:67:a6:85:b1:b1:90:5e:d3:ff:62: b3:78:a6:c7:9f:a3:9d:56:db:ec:2c:a3:ea:e9:19:4e: 1e:b0:dd:fc:03:c2:7c:db:b4:1f:ce:44:5f:e4:12:04: 3f:93:81:6e:a8:c0:32:ec:ba:e5:e9:8f:cf:3a:03:37: 11:2b:06:8b:87:a0:16:31:95:74:e2:63:9c:0f:49:e1: 8f:3c:55:a1:d6:d2:ae:66:cf:ae:34:8b:e8:f5:0a:1b: cd:79:4b:da:d7:fe:c6:4f:2e:9a:9e:31:b7:44:7a:da Fingerprint (SHA-256): 32:3E:4B:F5:5E:B8:B6:D5:9B:8A:22:88:5D:F9:FA:16:50:54:90:97:E3:8C:BE:65:5C:49:C2:05:EE:98:32:6C Fingerprint (SHA1): 64:A2:91:04:E7:AC:F9:C0:C6:D8:E8:79:0D:14:DC:8A:31:CE:D5:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152188 (0x3cafc4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:32 2023 Not After : Wed Oct 18 15:23:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:6c:e1:19:91:d3:ab:1a:df:b1:7b:ac:ec:3a:34:7c: e3:89:10:f0:c1:47:d6:2b:51:86:7f:1b:73:f1:19:87: 0f:83:21:90:b1:4a:31:90:c0:57:55:af:97:5b:3b:0c: 09:64:3f:2a:d9:f3:5e:82:9a:60:be:5a:ad:71:ea:23: 63:87:ea:a5:73:05:26:2d:03:db:4c:38:4e:f9:58:6a: 60:55:4c:8e:63:3c:f1:74:3f:92:3f:db:47:d9:c0:e5: e0:01:6a:3d:a0:9d:45:12:df:00:8a:cd:97:08:e6:aa: ae:de:b3:82:95:59:eb:ff:e0:74:7a:3d:29:a2:ed:0a: 8a:1d:f0:ba:d3:c9:56:bc:8e:2f:4e:4f:f1:0b:a4:2b: 7f:e5:4d:b9:0c:d7:31:46:23:ca:df:c8:47:ac:05:09: 1d:aa:fc:a2:e4:7d:d5:6a:ab:99:f0:a1:18:a8:6f:b2: fe:ac:57:58:d9:a9:16:17:a5:81:6c:a8:ab:c8:1d:44: 13:53:55:26:12:93:19:d9:ce:2c:1d:02:90:60:69:80: f7:7d:89:aa:36:71:4b:e9:7e:f4:b0:3b:68:93:f9:10: 62:35:b0:83:74:17:d3:b7:c8:22:c6:92:92:ae:ad:b7: d0:b9:2a:97:bb:9a:4f:d0:33:03:9b:7d:7b:6d:c0:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b9:c0:cc:19:47:50:37:d5:08:c7:39:9a:92:92:e9: 53:ef:bd:34:50:cc:82:74:87:54:b0:eb:68:88:b7:34: fe:b3:27:5b:25:76:68:21:9a:5c:fb:1e:f0:72:8d:1e: 87:8e:de:bb:9b:3f:1a:4b:16:aa:06:2f:be:77:b2:b0: 31:72:ff:ec:3d:d8:d6:69:09:05:1b:d0:1b:5e:03:7f: fc:e9:7a:cd:ea:08:0f:88:07:09:d0:5d:88:25:d8:0f: fb:c1:13:62:26:99:4c:3d:85:59:1d:a1:8e:8b:6e:33: 4d:ea:59:7e:69:71:99:e8:39:b6:82:5a:bc:e4:9b:e0: 8b:fe:97:0a:8b:ae:ff:1d:5d:1b:8b:64:32:47:d8:8c: 89:74:8d:0d:47:ef:e9:e5:e2:27:da:a1:8f:5e:7d:70: d9:a0:a2:70:1d:68:cc:9b:c2:a5:16:81:4d:57:38:6b: 75:43:3d:09:45:08:30:ca:2e:fd:d6:fe:9f:fe:59:b6: 6c:b0:19:01:97:16:4d:74:92:44:7b:32:22:be:06:b3: e7:e7:2b:41:87:a3:4d:90:e9:62:da:77:f2:de:d8:3b: 8e:db:77:75:44:d0:49:d6:77:47:88:b0:4f:05:85:9c: 5a:a6:07:50:9f:25:11:d6:d7:87:a8:cd:57:83:72:7f Fingerprint (SHA-256): 08:92:31:DA:13:22:CB:7A:8F:34:83:28:5F:54:95:74:B1:82:51:F7:25:B9:3A:50:FE:D7:B9:D8:83:3B:25:BE Fingerprint (SHA1): A2:5E:7F:BE:2B:31:7A:FF:4A:4A:CC:60:90:AB:14:5D:CF:E2:8D:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152188 (0x3cafc4fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:32 2023 Not After : Wed Oct 18 15:23:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:6c:e1:19:91:d3:ab:1a:df:b1:7b:ac:ec:3a:34:7c: e3:89:10:f0:c1:47:d6:2b:51:86:7f:1b:73:f1:19:87: 0f:83:21:90:b1:4a:31:90:c0:57:55:af:97:5b:3b:0c: 09:64:3f:2a:d9:f3:5e:82:9a:60:be:5a:ad:71:ea:23: 63:87:ea:a5:73:05:26:2d:03:db:4c:38:4e:f9:58:6a: 60:55:4c:8e:63:3c:f1:74:3f:92:3f:db:47:d9:c0:e5: e0:01:6a:3d:a0:9d:45:12:df:00:8a:cd:97:08:e6:aa: ae:de:b3:82:95:59:eb:ff:e0:74:7a:3d:29:a2:ed:0a: 8a:1d:f0:ba:d3:c9:56:bc:8e:2f:4e:4f:f1:0b:a4:2b: 7f:e5:4d:b9:0c:d7:31:46:23:ca:df:c8:47:ac:05:09: 1d:aa:fc:a2:e4:7d:d5:6a:ab:99:f0:a1:18:a8:6f:b2: fe:ac:57:58:d9:a9:16:17:a5:81:6c:a8:ab:c8:1d:44: 13:53:55:26:12:93:19:d9:ce:2c:1d:02:90:60:69:80: f7:7d:89:aa:36:71:4b:e9:7e:f4:b0:3b:68:93:f9:10: 62:35:b0:83:74:17:d3:b7:c8:22:c6:92:92:ae:ad:b7: d0:b9:2a:97:bb:9a:4f:d0:33:03:9b:7d:7b:6d:c0:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:b9:c0:cc:19:47:50:37:d5:08:c7:39:9a:92:92:e9: 53:ef:bd:34:50:cc:82:74:87:54:b0:eb:68:88:b7:34: fe:b3:27:5b:25:76:68:21:9a:5c:fb:1e:f0:72:8d:1e: 87:8e:de:bb:9b:3f:1a:4b:16:aa:06:2f:be:77:b2:b0: 31:72:ff:ec:3d:d8:d6:69:09:05:1b:d0:1b:5e:03:7f: fc:e9:7a:cd:ea:08:0f:88:07:09:d0:5d:88:25:d8:0f: fb:c1:13:62:26:99:4c:3d:85:59:1d:a1:8e:8b:6e:33: 4d:ea:59:7e:69:71:99:e8:39:b6:82:5a:bc:e4:9b:e0: 8b:fe:97:0a:8b:ae:ff:1d:5d:1b:8b:64:32:47:d8:8c: 89:74:8d:0d:47:ef:e9:e5:e2:27:da:a1:8f:5e:7d:70: d9:a0:a2:70:1d:68:cc:9b:c2:a5:16:81:4d:57:38:6b: 75:43:3d:09:45:08:30:ca:2e:fd:d6:fe:9f:fe:59:b6: 6c:b0:19:01:97:16:4d:74:92:44:7b:32:22:be:06:b3: e7:e7:2b:41:87:a3:4d:90:e9:62:da:77:f2:de:d8:3b: 8e:db:77:75:44:d0:49:d6:77:47:88:b0:4f:05:85:9c: 5a:a6:07:50:9f:25:11:d6:d7:87:a8:cd:57:83:72:7f Fingerprint (SHA-256): 08:92:31:DA:13:22:CB:7A:8F:34:83:28:5F:54:95:74:B1:82:51:F7:25:B9:3A:50:FE:D7:B9:D8:83:3B:25:BE Fingerprint (SHA1): A2:5E:7F:BE:2B:31:7A:FF:4A:4A:CC:60:90:AB:14:5D:CF:E2:8D:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152189 (0x3cafc4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:33 2023 Not After : Wed Oct 18 15:23:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:50:ca:20:7d:20:65:80:32:1a:ef:82:1b:27:d3:f0: d0:ba:1a:f2:8a:3d:ce:d8:2d:90:03:16:90:c7:6e:37: 57:44:7f:ed:d2:2f:ca:76:34:4d:2b:dc:d2:7f:e3:96: 74:aa:6c:1d:95:20:b5:5b:bc:51:b7:d7:84:2d:2c:18: 06:4f:a2:6d:57:20:86:7f:a7:8f:0e:84:66:c9:51:91: ae:97:0b:5b:35:09:e8:9b:d6:6a:6e:a7:c0:90:24:78: 9b:a4:1a:38:b7:84:d6:6b:0a:a8:5a:ac:b9:64:36:26: 00:04:ed:6b:3c:e1:64:83:b9:8d:00:23:8c:1c:65:bd: 2b:23:da:b4:a4:a8:38:3e:b6:8a:33:9a:12:bd:dd:03: 6d:b4:0d:c4:f9:e2:30:4e:11:97:56:b3:6e:11:8c:72: 12:28:fb:11:5b:74:2f:cf:87:ca:75:b4:90:ad:ce:a3: d1:23:6d:01:c4:94:c2:5b:b7:d4:e0:9d:86:67:2e:08: e2:9c:69:61:c9:96:6c:d0:5c:71:d6:83:e6:9d:68:59: 9a:3e:f9:5c:85:66:21:00:b6:1a:73:95:7a:2f:2e:bf: 15:87:2e:82:ae:ff:e6:8c:4b:68:35:b9:6c:8c:11:38: ed:38:92:5e:b7:69:b1:c5:1e:67:a7:45:87:d3:60:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:33:21:4c:9a:7c:31:ed:8c:79:88:73:8c:bf:7e:c7: c3:72:a7:05:46:1e:7c:42:6c:10:07:6d:f0:7e:ee:33: 7e:1c:08:70:8d:e4:9e:17:52:83:40:c2:f2:47:f4:12: 83:1a:5f:13:11:42:29:f9:e8:1a:6a:68:51:81:f0:f2: de:01:c4:16:25:99:4f:33:9c:32:d4:64:bb:eb:e6:d3: 56:c9:fd:91:4a:75:30:50:03:17:a2:9a:45:ea:68:ee: 24:2f:9c:9c:d1:6d:ca:f7:c2:8f:a2:b8:20:4f:b1:d3: 06:a2:4a:f0:40:64:df:85:35:5f:24:5a:4a:b8:3c:19: d5:50:2e:82:2c:23:38:7e:39:9a:d0:7c:6e:21:49:3b: 3c:75:cc:aa:e6:2d:a9:3c:25:06:d3:c0:3b:5f:a6:7f: b7:c5:b4:a2:92:fa:4d:04:44:c3:61:33:bb:ad:14:18: f4:fa:fb:f2:20:0a:cb:7c:7d:17:35:5e:b7:81:1d:e9: 3a:c9:5e:1e:1f:60:44:54:ca:93:59:c2:9b:ac:f7:95: 8f:96:7b:53:a8:af:84:a4:57:21:21:3a:e8:e3:0e:02: d1:e8:1b:99:a1:84:3b:12:f3:7a:b3:70:55:a2:19:cf: c4:a3:f9:47:dd:52:59:0b:42:93:1b:22:6b:2f:d1:c1 Fingerprint (SHA-256): DE:15:BF:28:38:DD:42:BD:6A:47:D3:A9:90:01:C7:E6:AB:21:FC:7A:78:35:08:3C:79:11:3B:A0:78:DA:69:7A Fingerprint (SHA1): 70:B8:3F:B0:58:D8:F5:99:E1:DE:79:A1:88:87:AE:50:20:DB:46:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152189 (0x3cafc4fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:23:33 2023 Not After : Wed Oct 18 15:23:33 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:50:ca:20:7d:20:65:80:32:1a:ef:82:1b:27:d3:f0: d0:ba:1a:f2:8a:3d:ce:d8:2d:90:03:16:90:c7:6e:37: 57:44:7f:ed:d2:2f:ca:76:34:4d:2b:dc:d2:7f:e3:96: 74:aa:6c:1d:95:20:b5:5b:bc:51:b7:d7:84:2d:2c:18: 06:4f:a2:6d:57:20:86:7f:a7:8f:0e:84:66:c9:51:91: ae:97:0b:5b:35:09:e8:9b:d6:6a:6e:a7:c0:90:24:78: 9b:a4:1a:38:b7:84:d6:6b:0a:a8:5a:ac:b9:64:36:26: 00:04:ed:6b:3c:e1:64:83:b9:8d:00:23:8c:1c:65:bd: 2b:23:da:b4:a4:a8:38:3e:b6:8a:33:9a:12:bd:dd:03: 6d:b4:0d:c4:f9:e2:30:4e:11:97:56:b3:6e:11:8c:72: 12:28:fb:11:5b:74:2f:cf:87:ca:75:b4:90:ad:ce:a3: d1:23:6d:01:c4:94:c2:5b:b7:d4:e0:9d:86:67:2e:08: e2:9c:69:61:c9:96:6c:d0:5c:71:d6:83:e6:9d:68:59: 9a:3e:f9:5c:85:66:21:00:b6:1a:73:95:7a:2f:2e:bf: 15:87:2e:82:ae:ff:e6:8c:4b:68:35:b9:6c:8c:11:38: ed:38:92:5e:b7:69:b1:c5:1e:67:a7:45:87:d3:60:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:33:21:4c:9a:7c:31:ed:8c:79:88:73:8c:bf:7e:c7: c3:72:a7:05:46:1e:7c:42:6c:10:07:6d:f0:7e:ee:33: 7e:1c:08:70:8d:e4:9e:17:52:83:40:c2:f2:47:f4:12: 83:1a:5f:13:11:42:29:f9:e8:1a:6a:68:51:81:f0:f2: de:01:c4:16:25:99:4f:33:9c:32:d4:64:bb:eb:e6:d3: 56:c9:fd:91:4a:75:30:50:03:17:a2:9a:45:ea:68:ee: 24:2f:9c:9c:d1:6d:ca:f7:c2:8f:a2:b8:20:4f:b1:d3: 06:a2:4a:f0:40:64:df:85:35:5f:24:5a:4a:b8:3c:19: d5:50:2e:82:2c:23:38:7e:39:9a:d0:7c:6e:21:49:3b: 3c:75:cc:aa:e6:2d:a9:3c:25:06:d3:c0:3b:5f:a6:7f: b7:c5:b4:a2:92:fa:4d:04:44:c3:61:33:bb:ad:14:18: f4:fa:fb:f2:20:0a:cb:7c:7d:17:35:5e:b7:81:1d:e9: 3a:c9:5e:1e:1f:60:44:54:ca:93:59:c2:9b:ac:f7:95: 8f:96:7b:53:a8:af:84:a4:57:21:21:3a:e8:e3:0e:02: d1:e8:1b:99:a1:84:3b:12:f3:7a:b3:70:55:a2:19:cf: c4:a3:f9:47:dd:52:59:0b:42:93:1b:22:6b:2f:d1:c1 Fingerprint (SHA-256): DE:15:BF:28:38:DD:42:BD:6A:47:D3:A9:90:01:C7:E6:AB:21:FC:7A:78:35:08:3C:79:11:3B:A0:78:DA:69:7A Fingerprint (SHA1): 70:B8:3F:B0:58:D8:F5:99:E1:DE:79:A1:88:87:AE:50:20:DB:46:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152190 (0x3cafc4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:35 2023 Not After : Wed Oct 18 15:23:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:99:72:a8:19:74:9e:f0:cf:8b:6c:6c:a9:3b:69: 3a:bc:17:91:49:56:e5:ee:53:89:85:64:52:e6:6d:a4: ad:a7:f8:d1:fa:62:30:75:8a:b2:9f:49:2e:f9:3a:3e: 0c:27:a5:08:c2:c7:b1:34:84:58:20:14:34:31:df:4c: 46:88:f3:8c:11:9b:6b:07:f5:23:04:af:8d:e0:da:06: 21:ea:26:b9:56:17:d4:fb:5f:0f:ca:4b:de:58:eb:af: ca:f6:78:9c:0f:b1:ad:f0:10:66:4f:a7:2e:f9:fb:ab: 12:aa:09:4e:97:33:3c:1b:74:99:86:18:95:04:2b:6e: ce:d7:97:95:0d:e3:9f:68:45:e7:cf:ea:58:2f:bb:28: d2:65:b1:dc:9f:5d:52:94:ed:e7:03:c4:3b:4c:76:87: 6c:95:f5:fe:f7:f5:ce:3a:49:cb:c3:c8:3b:7d:84:5b: 96:97:d7:d6:9c:d7:87:12:56:b9:71:79:67:84:3e:f5: 7d:76:d0:c4:21:8e:39:f7:b7:1e:97:a2:60:aa:59:8a: 41:87:cb:5c:75:5f:2f:60:93:d2:ff:15:75:c7:1d:72: 4e:4a:b8:6a:54:49:84:b3:d4:09:ce:e6:0a:85:ad:ac: 2c:62:7c:59:98:40:b5:65:e5:4c:cb:85:70:7a:bc:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:91:49:28:4c:85:e6:c1:2f:dc:fe:4c:f2:47:63:29: 11:a0:64:c0:82:89:73:30:e4:69:2b:84:3e:fa:1e:46: f0:81:65:db:fe:05:9e:e7:9a:74:7b:61:00:2f:78:4f: aa:15:5f:fc:f7:84:80:2d:97:3d:85:79:e6:6d:41:31: 6d:b4:95:7e:5d:bf:53:a9:7d:fd:e9:f2:a3:17:92:13: 4a:d5:a4:10:b9:2b:7f:ed:63:c0:3c:d5:ea:8a:a3:a7: 1d:55:6a:1c:30:21:a5:49:28:6f:5c:f9:b2:37:37:d4: 98:9a:4b:97:43:82:26:a4:59:dd:08:4d:8e:21:85:08: 6a:77:a7:a1:7a:77:33:7f:5d:02:14:d9:ef:cd:67:63: 95:65:19:bf:48:4b:67:a6:85:b1:b1:90:5e:d3:ff:62: b3:78:a6:c7:9f:a3:9d:56:db:ec:2c:a3:ea:e9:19:4e: 1e:b0:dd:fc:03:c2:7c:db:b4:1f:ce:44:5f:e4:12:04: 3f:93:81:6e:a8:c0:32:ec:ba:e5:e9:8f:cf:3a:03:37: 11:2b:06:8b:87:a0:16:31:95:74:e2:63:9c:0f:49:e1: 8f:3c:55:a1:d6:d2:ae:66:cf:ae:34:8b:e8:f5:0a:1b: cd:79:4b:da:d7:fe:c6:4f:2e:9a:9e:31:b7:44:7a:da Fingerprint (SHA-256): 32:3E:4B:F5:5E:B8:B6:D5:9B:8A:22:88:5D:F9:FA:16:50:54:90:97:E3:8C:BE:65:5C:49:C2:05:EE:98:32:6C Fingerprint (SHA1): 64:A2:91:04:E7:AC:F9:C0:C6:D8:E8:79:0D:14:DC:8A:31:CE:D5:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152190 (0x3cafc4fe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:23:35 2023 Not After : Wed Oct 18 15:23:35 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:d4:99:72:a8:19:74:9e:f0:cf:8b:6c:6c:a9:3b:69: 3a:bc:17:91:49:56:e5:ee:53:89:85:64:52:e6:6d:a4: ad:a7:f8:d1:fa:62:30:75:8a:b2:9f:49:2e:f9:3a:3e: 0c:27:a5:08:c2:c7:b1:34:84:58:20:14:34:31:df:4c: 46:88:f3:8c:11:9b:6b:07:f5:23:04:af:8d:e0:da:06: 21:ea:26:b9:56:17:d4:fb:5f:0f:ca:4b:de:58:eb:af: ca:f6:78:9c:0f:b1:ad:f0:10:66:4f:a7:2e:f9:fb:ab: 12:aa:09:4e:97:33:3c:1b:74:99:86:18:95:04:2b:6e: ce:d7:97:95:0d:e3:9f:68:45:e7:cf:ea:58:2f:bb:28: d2:65:b1:dc:9f:5d:52:94:ed:e7:03:c4:3b:4c:76:87: 6c:95:f5:fe:f7:f5:ce:3a:49:cb:c3:c8:3b:7d:84:5b: 96:97:d7:d6:9c:d7:87:12:56:b9:71:79:67:84:3e:f5: 7d:76:d0:c4:21:8e:39:f7:b7:1e:97:a2:60:aa:59:8a: 41:87:cb:5c:75:5f:2f:60:93:d2:ff:15:75:c7:1d:72: 4e:4a:b8:6a:54:49:84:b3:d4:09:ce:e6:0a:85:ad:ac: 2c:62:7c:59:98:40:b5:65:e5:4c:cb:85:70:7a:bc:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:91:49:28:4c:85:e6:c1:2f:dc:fe:4c:f2:47:63:29: 11:a0:64:c0:82:89:73:30:e4:69:2b:84:3e:fa:1e:46: f0:81:65:db:fe:05:9e:e7:9a:74:7b:61:00:2f:78:4f: aa:15:5f:fc:f7:84:80:2d:97:3d:85:79:e6:6d:41:31: 6d:b4:95:7e:5d:bf:53:a9:7d:fd:e9:f2:a3:17:92:13: 4a:d5:a4:10:b9:2b:7f:ed:63:c0:3c:d5:ea:8a:a3:a7: 1d:55:6a:1c:30:21:a5:49:28:6f:5c:f9:b2:37:37:d4: 98:9a:4b:97:43:82:26:a4:59:dd:08:4d:8e:21:85:08: 6a:77:a7:a1:7a:77:33:7f:5d:02:14:d9:ef:cd:67:63: 95:65:19:bf:48:4b:67:a6:85:b1:b1:90:5e:d3:ff:62: b3:78:a6:c7:9f:a3:9d:56:db:ec:2c:a3:ea:e9:19:4e: 1e:b0:dd:fc:03:c2:7c:db:b4:1f:ce:44:5f:e4:12:04: 3f:93:81:6e:a8:c0:32:ec:ba:e5:e9:8f:cf:3a:03:37: 11:2b:06:8b:87:a0:16:31:95:74:e2:63:9c:0f:49:e1: 8f:3c:55:a1:d6:d2:ae:66:cf:ae:34:8b:e8:f5:0a:1b: cd:79:4b:da:d7:fe:c6:4f:2e:9a:9e:31:b7:44:7a:da Fingerprint (SHA-256): 32:3E:4B:F5:5E:B8:B6:D5:9B:8A:22:88:5D:F9:FA:16:50:54:90:97:E3:8C:BE:65:5C:49:C2:05:EE:98:32:6C Fingerprint (SHA1): 64:A2:91:04:E7:AC:F9:C0:C6:D8:E8:79:0D:14:DC:8A:31:CE:D5:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152193 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152194 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152195 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018152196 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018152197 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018152198 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018152199 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152193 (0x3cafc501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:42 2023 Not After : Wed Oct 18 15:23:42 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:f8:68:40:2a:61:98:73:3a:02:18:88:a4:18:bf:8a: 55:ee:32:22:7d:15:1b:65:13:53:d6:24:d6:51:85:31: 85:ac:c8:3e:bb:a6:65:f7:df:a3:d9:04:33:d8:bb:ae: ff:51:11:cc:20:d8:f3:5a:ae:a2:48:e7:3d:3d:76:b4: 39:b9:d0:9f:c1:05:ce:38:2a:65:da:03:70:fb:4c:6f: 74:9e:d2:e4:66:e5:88:0e:5f:0b:70:6b:5f:91:ee:0d: 13:99:d7:f4:53:75:b7:dc:0c:ed:65:12:3d:e6:da:ca: 78:6b:c5:e4:fb:ce:f8:87:21:e1:11:07:9f:34:32:d3: 1c:73:3e:d7:4e:02:a7:df:bb:af:09:3d:7f:5b:72:75: 96:e9:22:83:f0:e6:a0:d2:16:5a:98:91:55:bf:a0:df: a9:1f:55:fa:cd:a7:fe:fe:7d:af:ee:4d:b6:40:c9:bc: bc:38:7b:94:b1:ee:3e:41:84:43:3e:58:84:3d:0c:2a: d3:93:c8:92:73:30:d4:98:41:7c:ae:cd:54:43:95:31: 08:f8:fc:01:5a:67:54:20:90:c5:70:44:c0:d6:4b:2c: 78:6c:b9:88:8d:46:a1:a5:e9:ec:6a:c3:9a:d6:d7:6c: 8b:5f:db:d8:cd:68:2e:02:ec:7c:21:ce:a4:10:b4:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:dc:9b:c2:f0:c0:14:88:a8:8c:4d:9b:12:7b:56:0e: 3c:90:d0:10:e8:66:cc:4f:db:fd:b3:d0:80:d4:84:d1: 12:45:77:55:02:bd:94:f8:fa:32:30:2a:13:ea:57:31: bf:2a:ee:fb:bf:7e:6b:bd:32:b5:ad:38:af:b4:74:b9: 79:f1:0c:2b:58:d7:72:71:f1:d2:b6:26:11:b0:2d:41: ce:bd:6f:46:c2:75:b3:41:ad:66:2e:92:fe:17:98:25: 41:3f:12:4c:29:13:04:f5:1a:c8:5c:1b:50:23:4a:e0: a1:28:e0:ad:34:31:2a:c0:26:ba:d2:06:94:68:21:1b: 57:ed:a4:10:e1:68:92:c2:ee:1d:38:7f:18:99:38:bb: d8:b3:3b:4d:39:e0:bc:ea:5e:4c:ce:b2:c1:aa:c6:91: 90:4d:8e:42:d3:c9:cd:17:d6:b1:6f:0e:d1:29:53:59: 9e:47:b2:7b:36:99:00:15:0b:9c:a6:af:a2:d0:1f:7b: 35:66:2c:7f:a1:e5:d9:c2:8b:32:6b:f1:01:a6:80:a5: ad:0c:d2:eb:15:30:57:5d:28:5a:4b:54:99:19:b4:6e: 34:09:f6:27:48:10:09:57:66:f9:5e:ef:c1:49:6f:f4: 3a:51:a1:21:79:49:6b:69:73:e7:b1:30:e1:5f:42:99 Fingerprint (SHA-256): A3:B5:BD:92:73:83:FC:10:9C:C5:58:04:82:95:A7:53:E2:ED:77:AF:DD:05:2E:E3:E2:05:E9:6B:FD:3B:AD:53 Fingerprint (SHA1): 47:D4:AF:D5:E1:81:99:EA:F3:C4:2F:60:F9:5A:6B:32:49:5A:AF:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152193 (0x3cafc501) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:42 2023 Not After : Wed Oct 18 15:23:42 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:f8:68:40:2a:61:98:73:3a:02:18:88:a4:18:bf:8a: 55:ee:32:22:7d:15:1b:65:13:53:d6:24:d6:51:85:31: 85:ac:c8:3e:bb:a6:65:f7:df:a3:d9:04:33:d8:bb:ae: ff:51:11:cc:20:d8:f3:5a:ae:a2:48:e7:3d:3d:76:b4: 39:b9:d0:9f:c1:05:ce:38:2a:65:da:03:70:fb:4c:6f: 74:9e:d2:e4:66:e5:88:0e:5f:0b:70:6b:5f:91:ee:0d: 13:99:d7:f4:53:75:b7:dc:0c:ed:65:12:3d:e6:da:ca: 78:6b:c5:e4:fb:ce:f8:87:21:e1:11:07:9f:34:32:d3: 1c:73:3e:d7:4e:02:a7:df:bb:af:09:3d:7f:5b:72:75: 96:e9:22:83:f0:e6:a0:d2:16:5a:98:91:55:bf:a0:df: a9:1f:55:fa:cd:a7:fe:fe:7d:af:ee:4d:b6:40:c9:bc: bc:38:7b:94:b1:ee:3e:41:84:43:3e:58:84:3d:0c:2a: d3:93:c8:92:73:30:d4:98:41:7c:ae:cd:54:43:95:31: 08:f8:fc:01:5a:67:54:20:90:c5:70:44:c0:d6:4b:2c: 78:6c:b9:88:8d:46:a1:a5:e9:ec:6a:c3:9a:d6:d7:6c: 8b:5f:db:d8:cd:68:2e:02:ec:7c:21:ce:a4:10:b4:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:dc:9b:c2:f0:c0:14:88:a8:8c:4d:9b:12:7b:56:0e: 3c:90:d0:10:e8:66:cc:4f:db:fd:b3:d0:80:d4:84:d1: 12:45:77:55:02:bd:94:f8:fa:32:30:2a:13:ea:57:31: bf:2a:ee:fb:bf:7e:6b:bd:32:b5:ad:38:af:b4:74:b9: 79:f1:0c:2b:58:d7:72:71:f1:d2:b6:26:11:b0:2d:41: ce:bd:6f:46:c2:75:b3:41:ad:66:2e:92:fe:17:98:25: 41:3f:12:4c:29:13:04:f5:1a:c8:5c:1b:50:23:4a:e0: a1:28:e0:ad:34:31:2a:c0:26:ba:d2:06:94:68:21:1b: 57:ed:a4:10:e1:68:92:c2:ee:1d:38:7f:18:99:38:bb: d8:b3:3b:4d:39:e0:bc:ea:5e:4c:ce:b2:c1:aa:c6:91: 90:4d:8e:42:d3:c9:cd:17:d6:b1:6f:0e:d1:29:53:59: 9e:47:b2:7b:36:99:00:15:0b:9c:a6:af:a2:d0:1f:7b: 35:66:2c:7f:a1:e5:d9:c2:8b:32:6b:f1:01:a6:80:a5: ad:0c:d2:eb:15:30:57:5d:28:5a:4b:54:99:19:b4:6e: 34:09:f6:27:48:10:09:57:66:f9:5e:ef:c1:49:6f:f4: 3a:51:a1:21:79:49:6b:69:73:e7:b1:30:e1:5f:42:99 Fingerprint (SHA-256): A3:B5:BD:92:73:83:FC:10:9C:C5:58:04:82:95:A7:53:E2:ED:77:AF:DD:05:2E:E3:E2:05:E9:6B:FD:3B:AD:53 Fingerprint (SHA1): 47:D4:AF:D5:E1:81:99:EA:F3:C4:2F:60:F9:5A:6B:32:49:5A:AF:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152200 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152201 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018152202 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018152203 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018152204 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018152205 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018152206 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018152207 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018152208 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018152209 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018152210 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018152211 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018152212 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018152213 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018152214 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018152215 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018152216 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018152217 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018152218 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018152219 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018152220 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018152221 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018152222 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018152223 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018152224 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018152225 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018152226 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018152227 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018152228 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018152229 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152200 (0x3cafc508) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:23:52 2023 Not After : Wed Oct 18 15:23:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:ea:14:aa:ac:7f:f2:f6:a8:25:ec:45:13:f8:bd:f2: 7f:b8:54:25:13:38:ed:8d:e8:f7:59:2a:ea:ea:c9:d8: f3:a2:a6:ae:91:ee:c6:17:fc:f7:26:4e:c6:41:cb:6b: 10:7b:b5:f3:ee:fe:d4:21:0f:4a:2b:b2:61:73:d2:6e: a2:20:ab:b9:6d:ca:07:71:c9:02:6d:67:07:bb:91:39: 64:97:86:f2:17:d1:c3:6c:96:5d:a7:69:eb:d4:c8:47: e1:11:64:9a:2a:45:48:16:10:4b:f2:fd:2d:d8:49:33: 8d:68:43:b4:e9:25:20:23:c5:42:70:f4:45:07:b6:af: 55:7f:bd:b0:34:71:af:52:db:d7:65:3d:11:d2:84:e5: 93:c0:bb:7b:38:db:c4:89:e6:7a:84:2a:34:d4:d3:bf: 89:ee:0e:c8:ac:6b:cc:35:6f:8a:16:ec:ff:66:4d:52: f7:8c:1d:af:29:e4:4f:d6:96:55:19:cc:67:be:a4:a1: 09:3b:fa:38:ea:33:25:52:41:6a:38:00:02:0a:dd:f9: bd:97:08:82:ac:20:a4:3a:e0:e5:5a:8b:d6:f0:e9:b1: 71:64:26:b0:36:1a:af:be:94:80:b1:f2:01:c5:2d:05: 66:bf:d2:0b:36:78:89:db:f0:ad:5d:f5:6d:35:d5:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:52:f4:e6:f2:63:ea:dc:44:a6:6c:e3:27:90:13:ca: f9:d3:13:ab:2d:41:41:e7:5a:2f:76:90:8d:3b:26:14: 7a:f7:c7:54:dc:8a:c4:be:41:66:76:5b:6e:18:29:70: 45:b7:3f:19:12:6a:0c:70:aa:dc:3e:d2:47:49:9b:5d: 88:29:13:9d:06:6c:d7:cd:de:30:71:cf:47:f9:28:03: 4a:dc:84:68:1b:c8:f0:36:48:12:33:09:19:7b:16:87: e0:a1:b7:f3:84:9b:c1:76:76:d0:e5:ea:2e:c7:6f:7c: aa:56:fe:df:48:51:8c:f1:9f:aa:14:26:8b:0b:e1:a0: 5c:a6:9c:0b:b2:48:20:25:5c:fa:73:3e:64:74:56:fd: fc:a2:e0:0a:d3:5d:3e:1d:b2:2b:b4:fd:aa:98:ff:72: 4b:d6:5f:09:70:12:66:b2:40:6d:a2:8f:33:04:70:8c: 0f:ec:ed:09:eb:da:92:c9:5f:dc:5f:06:2d:af:74:89: 45:26:ea:5a:6e:fc:3b:96:2e:7e:41:3a:d1:98:8f:bb: 91:52:60:66:61:27:66:69:f7:76:5c:cf:43:19:06:95: c8:0e:81:3c:6c:89:41:25:da:70:37:b3:14:89:b3:cf: 25:e0:37:31:da:62:97:bf:09:bb:fa:33:26:02:ae:40 Fingerprint (SHA-256): B6:1A:DB:65:31:F3:FF:41:4D:DB:33:66:E2:06:1B:D6:BA:9D:6D:18:D9:A3:3E:37:B7:3C:22:57:04:37:25:73 Fingerprint (SHA1): 64:B5:60:7B:D6:FC:5F:46:E9:57:57:79:5C:B3:E0:E0:A3:D1:A9:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152230 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018152231 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018152232 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018152233 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018152234 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018152235 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018152236 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152230 (0x3cafc526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:33 2023 Not After : Wed Oct 18 15:24:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:47:3d:e7:92:fd:eb:46:5b:53:ae:70:ef:9e:2d:02: e9:aa:ed:52:b5:f7:0a:70:6c:ec:89:21:8d:03:1c:eb: a8:63:b7:c2:ae:9b:4e:76:fb:f0:55:ca:5b:6e:6e:31: c1:0b:76:95:aa:e3:a2:20:6b:12:96:06:a5:f6:35:2c: 45:89:2e:c4:51:d8:60:fb:db:e4:7f:d1:2a:e3:18:4d: 3a:68:0e:ad:31:1c:7e:a4:32:44:1a:e9:87:27:e9:8c: 2c:26:e5:59:f1:9f:53:9b:b9:e7:86:2f:56:7d:af:e8: a4:18:cf:ca:fa:3c:b7:3b:67:56:62:4d:66:de:6b:7c: e3:89:92:f6:10:54:cb:b4:12:ec:ce:dc:49:0a:0c:99: 01:6a:85:a9:32:f4:14:30:5a:21:b7:a5:ac:65:c3:33: 91:9b:42:83:d1:8a:5d:10:91:95:ee:6f:5b:77:b2:15: 90:76:08:95:9c:b7:8b:75:f5:f2:87:6c:5b:72:fa:47: bd:e0:45:93:c1:dd:6e:fd:c4:d3:5c:2c:b3:7e:85:1a: 7c:b1:70:06:04:94:5d:05:e5:07:8e:ea:ed:e1:f9:8b: 49:f1:fe:8c:df:3f:8f:fe:89:5d:d3:b2:ed:4f:d1:35: 90:29:2e:63:08:8b:d7:d1:f3:66:66:58:f7:c0:76:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:33:9c:6e:4c:e8:7d:b4:7a:7f:ab:19:c5:e7:ef:77: 5e:97:19:87:37:a4:7a:99:92:66:0f:f8:af:36:ea:c2: a5:6a:ef:66:30:f6:79:50:c8:bd:29:9f:7e:be:b3:0e: 0f:21:fc:15:d7:e9:75:4a:5a:35:01:f6:6f:2e:ca:1d: 14:00:5d:77:c1:47:03:8f:ec:08:8b:e8:e3:2f:a7:ed: f0:c3:8f:7f:41:eb:1d:5c:60:96:f0:d7:5b:86:5f:79: d4:c2:3f:bd:33:cf:ce:b8:73:9d:f3:f7:bb:33:d5:09: 29:77:d1:a4:8a:72:55:e3:a4:fd:92:0f:84:a6:d6:ae: 6f:72:c3:18:dd:65:ab:ff:18:d9:74:55:cc:f3:ee:a4: 88:c1:a4:03:d8:fc:41:83:62:11:b3:de:42:70:ea:c7: 88:17:9b:3b:42:7a:db:ba:d2:2d:f1:f2:b0:3a:7e:54: 8c:26:de:52:fe:98:12:58:bb:a0:85:23:6a:d6:22:d9: e7:dc:5d:a0:2a:30:4e:7e:18:09:3c:4d:7d:14:3c:a7: ff:c8:34:7c:0d:5d:82:72:de:69:0a:26:10:10:36:e4: b6:70:da:50:25:d7:51:38:e3:a0:e8:18:f5:c5:bf:19: 1b:d6:5a:35:f9:ff:d4:0d:b3:d4:56:67:47:ed:7b:ce Fingerprint (SHA-256): 42:BA:7B:D8:67:0E:C0:92:98:B4:9E:05:0F:B6:7E:32:09:C8:22:3E:22:D5:79:CD:A5:AC:F7:B6:70:FE:D4:B1 Fingerprint (SHA1): 64:C4:DF:31:7F:A0:2F:07:82:5D:F0:27:E8:90:54:A5:35:0A:28:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152230 (0x3cafc526) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:33 2023 Not After : Wed Oct 18 15:24:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:47:3d:e7:92:fd:eb:46:5b:53:ae:70:ef:9e:2d:02: e9:aa:ed:52:b5:f7:0a:70:6c:ec:89:21:8d:03:1c:eb: a8:63:b7:c2:ae:9b:4e:76:fb:f0:55:ca:5b:6e:6e:31: c1:0b:76:95:aa:e3:a2:20:6b:12:96:06:a5:f6:35:2c: 45:89:2e:c4:51:d8:60:fb:db:e4:7f:d1:2a:e3:18:4d: 3a:68:0e:ad:31:1c:7e:a4:32:44:1a:e9:87:27:e9:8c: 2c:26:e5:59:f1:9f:53:9b:b9:e7:86:2f:56:7d:af:e8: a4:18:cf:ca:fa:3c:b7:3b:67:56:62:4d:66:de:6b:7c: e3:89:92:f6:10:54:cb:b4:12:ec:ce:dc:49:0a:0c:99: 01:6a:85:a9:32:f4:14:30:5a:21:b7:a5:ac:65:c3:33: 91:9b:42:83:d1:8a:5d:10:91:95:ee:6f:5b:77:b2:15: 90:76:08:95:9c:b7:8b:75:f5:f2:87:6c:5b:72:fa:47: bd:e0:45:93:c1:dd:6e:fd:c4:d3:5c:2c:b3:7e:85:1a: 7c:b1:70:06:04:94:5d:05:e5:07:8e:ea:ed:e1:f9:8b: 49:f1:fe:8c:df:3f:8f:fe:89:5d:d3:b2:ed:4f:d1:35: 90:29:2e:63:08:8b:d7:d1:f3:66:66:58:f7:c0:76:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:33:9c:6e:4c:e8:7d:b4:7a:7f:ab:19:c5:e7:ef:77: 5e:97:19:87:37:a4:7a:99:92:66:0f:f8:af:36:ea:c2: a5:6a:ef:66:30:f6:79:50:c8:bd:29:9f:7e:be:b3:0e: 0f:21:fc:15:d7:e9:75:4a:5a:35:01:f6:6f:2e:ca:1d: 14:00:5d:77:c1:47:03:8f:ec:08:8b:e8:e3:2f:a7:ed: f0:c3:8f:7f:41:eb:1d:5c:60:96:f0:d7:5b:86:5f:79: d4:c2:3f:bd:33:cf:ce:b8:73:9d:f3:f7:bb:33:d5:09: 29:77:d1:a4:8a:72:55:e3:a4:fd:92:0f:84:a6:d6:ae: 6f:72:c3:18:dd:65:ab:ff:18:d9:74:55:cc:f3:ee:a4: 88:c1:a4:03:d8:fc:41:83:62:11:b3:de:42:70:ea:c7: 88:17:9b:3b:42:7a:db:ba:d2:2d:f1:f2:b0:3a:7e:54: 8c:26:de:52:fe:98:12:58:bb:a0:85:23:6a:d6:22:d9: e7:dc:5d:a0:2a:30:4e:7e:18:09:3c:4d:7d:14:3c:a7: ff:c8:34:7c:0d:5d:82:72:de:69:0a:26:10:10:36:e4: b6:70:da:50:25:d7:51:38:e3:a0:e8:18:f5:c5:bf:19: 1b:d6:5a:35:f9:ff:d4:0d:b3:d4:56:67:47:ed:7b:ce Fingerprint (SHA-256): 42:BA:7B:D8:67:0E:C0:92:98:B4:9E:05:0F:B6:7E:32:09:C8:22:3E:22:D5:79:CD:A5:AC:F7:B6:70:FE:D4:B1 Fingerprint (SHA1): 64:C4:DF:31:7F:A0:2F:07:82:5D:F0:27:E8:90:54:A5:35:0A:28:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152237 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152238 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152239 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152240 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152237 (0x3cafc52d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:42 2023 Not After : Wed Oct 18 15:24:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:6b:57:42:de:db:58:e2:a6:9f:40:6d:35:b8:64:39: 1a:4a:ce:8b:e7:cc:38:a4:2c:74:53:b4:95:26:03:b4: b7:f4:7b:40:c1:db:03:e1:a2:c7:42:87:b2:93:38:77: 8e:1b:13:c6:9a:c4:9b:9e:92:23:19:1a:4d:de:61:c6: 62:25:d5:2e:a6:d5:5f:f9:7d:d6:6f:41:93:e3:5f:d8: 43:9e:06:16:62:dc:04:f7:bc:19:6e:66:ae:4d:f9:d9: 5d:da:c1:76:d3:89:65:9e:8a:51:49:81:1f:ff:20:b4: 1b:c9:25:a5:e5:b0:3d:17:a0:22:f7:9f:75:d8:6d:20: 72:c1:cc:3d:08:35:96:ab:80:b4:49:d8:84:7c:73:3e: 4c:3b:2c:1c:bd:36:e5:87:23:cd:53:22:15:96:4f:91: 45:5c:e9:ea:9c:74:76:b3:eb:f0:4a:56:a8:5d:cc:51: 6d:e6:05:ae:e0:bb:86:2e:9e:e0:b8:a7:83:64:db:76: 1d:f4:ee:a1:42:5f:c7:3a:35:49:ef:95:94:d1:1a:ee: d5:02:67:fd:da:c2:41:d5:aa:b4:43:5e:65:f1:88:8f: 90:40:ad:a0:69:c0:16:1c:16:ec:a6:aa:08:47:de:49: 72:9d:82:25:b8:82:96:fc:7b:5d:e7:d1:b1:00:25:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:b3:15:1f:f9:16:cc:e1:60:ea:a9:35:d9:71:65:73: 85:95:b6:7b:57:5b:ef:a0:d9:27:c9:bd:61:52:6d:87: fa:3b:49:2c:5e:03:34:4d:99:e4:08:47:9f:ee:21:2c: 1e:5f:5a:c7:44:79:f2:95:2a:8a:2a:e3:48:b3:5f:9b: 1c:fe:4d:36:b3:16:2b:1e:6c:13:41:7c:0e:75:a6:ff: 91:df:3c:a3:92:73:07:0a:9e:dd:a4:1c:2a:83:1d:21: 0e:51:02:9f:a9:8b:a0:70:0e:8c:69:19:8a:87:8d:0f: f9:3b:90:83:6a:c0:41:23:1f:bb:b6:31:c9:df:df:7a: 5f:05:bb:6b:65:fc:90:d1:23:67:33:e4:82:ea:37:a7: 30:44:bd:dc:38:43:71:87:a4:f4:8c:ea:fe:fa:c5:47: bf:35:98:6c:c4:c1:a3:9d:03:59:f5:b0:27:c6:1b:a6: 18:ba:e6:25:cb:5b:84:00:fb:bb:30:e2:8c:e8:2e:f2: 24:2a:f8:61:5b:ba:a2:1d:86:39:8f:8c:f7:ee:74:b6: 9b:80:5e:11:65:9a:b6:59:c2:e9:10:ce:fa:de:49:fa: 74:28:c9:a8:a1:0c:41:35:fb:b4:b0:58:6f:d4:7e:44: 9d:ca:35:33:c0:11:5f:8f:22:38:18:3e:33:ea:e6:08 Fingerprint (SHA-256): 69:9A:58:65:B9:CF:99:48:EA:A0:6E:0D:49:6F:0B:81:47:10:7C:DA:6A:40:AE:29:E4:48:12:45:97:CC:7C:62 Fingerprint (SHA1): B4:D5:D8:9C:33:F5:B5:FA:EC:FC:05:F1:DA:43:46:DA:93:55:AA:70 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152238 (0x3cafc52e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:43 2023 Not After : Wed Oct 18 15:24:43 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:c8:d8:34:9c:be:07:13:bc:65:0e:00:f3:40:fc:f3: 6c:d9:7c:a1:86:54:34:ee:20:2d:d9:87:78:4d:92:44: 6f:61:77:ac:1f:59:81:3d:40:dc:57:76:d1:07:b4:b8: 3f:f0:68:4b:33:91:30:dd:7e:d7:64:ac:89:d4:7b:58: c8:e0:49:92:76:0f:40:01:38:89:78:0d:22:c5:57:4a: 63:88:13:37:39:93:ad:a1:ae:cc:e1:1b:da:2a:56:b4: cf:58:5b:a3:d4:0c:7d:6d:af:d6:04:fd:b3:fe:f9:1b: 63:6c:67:f6:cb:22:20:28:fd:3d:77:27:a1:bd:76:41: e3:94:52:5c:e1:f3:4d:f8:3b:88:a6:1f:97:11:2f:cd: c6:b8:0d:d3:b5:ac:83:9e:8d:bb:2e:0e:73:af:4f:02: a4:ac:96:47:7e:03:9c:19:a0:d5:ac:75:f7:e6:3c:96: f0:42:f8:a2:44:12:1d:24:18:c2:2d:9a:92:79:0a:a8: 2d:66:7b:4c:ee:89:28:ac:45:8b:4f:3e:1e:50:8d:70: 4b:62:f3:05:7f:f5:82:cd:5b:81:e3:e8:60:fb:26:26: 90:b3:ac:27:d1:d2:52:2b:02:61:de:5a:6d:3d:61:fc: 93:b9:06:2b:50:a1:d8:da:c4:d4:16:d6:57:c7:97:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 72:02:8b:3b:67:f9:1c:c5:fc:eb:cb:98:ff:2a:22:80: a2:fa:da:83:09:36:1b:c8:e5:73:5d:84:65:cd:4c:77: 97:2a:01:12:03:0a:00:97:00:77:23:32:49:f6:0f:8d: 64:6c:88:4f:f6:e8:ca:18:b3:b8:fd:c1:f7:4d:15:bd: c6:8a:a1:3b:22:4e:2f:cf:bf:e4:3b:5f:9a:a3:8a:c5: cb:8c:39:97:96:26:32:c3:b9:52:85:f2:94:2e:9b:f7: 3c:45:e2:d3:6e:04:46:80:7b:21:e7:07:0c:4e:86:e0: 97:62:18:13:35:c1:59:e1:88:53:7a:d6:0f:a0:16:47: 83:f6:9d:ae:2a:8c:34:ef:62:e4:e9:92:80:87:80:05: e5:91:bd:f6:fd:aa:8e:1a:73:d7:0e:97:6c:ff:53:36: 3b:ca:83:27:c7:00:85:ca:d6:71:49:b7:39:89:7a:e9: 50:02:95:68:33:5d:ca:74:43:1f:4d:06:a0:cb:48:ce: f3:a7:6e:f7:1e:a1:89:c4:f4:3e:89:62:20:c8:a3:21: fb:36:2a:5a:bd:f6:6d:bf:fc:39:cb:b6:9d:11:b5:99: 56:5d:25:af:8c:8a:b5:68:c7:b5:35:01:3c:43:a9:33: 12:51:b6:09:40:e4:cb:13:5b:8d:0e:0d:9d:ed:07:7e Fingerprint (SHA-256): DD:AB:64:D6:E5:56:06:A3:DF:DC:54:39:F7:96:05:9E:9C:BD:88:B7:27:71:D3:4B:E9:A3:0A:12:B6:52:54:2A Fingerprint (SHA1): D0:F8:59:97:DD:5B:61:21:1F:CC:05:9F:A1:4D:95:6A:D8:3F:FF:DB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152239 (0x3cafc52f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:24:44 2023 Not After : Wed Oct 18 15:24:44 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:90:53:f1:f6:af:d1:5d:12:c4:3e:4e:23:1d:f2:ba: cf:b2:54:76:e6:b5:44:fb:09:c3:79:b0:17:ba:64:5e: ca:84:02:0f:fe:9b:b6:14:87:30:c0:13:12:e8:f4:8f: cf:af:97:e4:31:0b:bd:b4:d4:86:dd:9d:bd:e3:e4:5d: 9f:50:c8:c4:86:a6:8b:dd:08:0a:a0:25:8d:be:79:3f: 4a:94:1b:5c:5e:e5:41:01:45:52:c6:a6:77:0b:a7:3a: da:2a:af:cb:28:5d:dd:b1:07:20:0c:12:d2:6b:fd:5c: 10:0b:85:ea:4b:63:75:9e:b3:c6:ac:ea:74:b6:2d:50: cf:48:38:e2:53:83:c9:d7:20:76:96:4e:8e:39:77:24: 6e:83:c9:f6:47:58:5d:d1:bf:fe:90:3a:d5:96:13:0b: 06:a2:2d:ea:ec:e2:79:4a:5a:9c:7d:e6:e5:a5:a0:30: 88:e0:8f:6a:f2:63:82:04:fb:74:11:46:15:24:bb:f1: 1f:ff:c7:48:e5:55:d6:40:5e:07:b6:27:d6:09:f0:07: dd:59:b4:ed:66:7b:6c:b2:e9:db:d6:79:51:b7:ed:44: 7c:d8:b5:de:fa:06:6c:12:62:ef:16:2b:86:26:83:82: 65:3c:59:3b:b0:f7:29:c4:2d:50:5e:46:09:4e:63:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:75:34:f6:aa:62:5e:81:ad:0b:81:fd:96:f0:59:46: 72:5e:0a:4c:e6:26:1b:8e:11:e7:b0:f5:81:9d:a5:d1: 08:fb:29:c8:9d:11:bc:6f:b0:6d:7b:24:3c:4d:2a:d2: f2:eb:c3:23:0c:33:19:ac:91:d4:cb:12:f1:d0:a0:75: 9a:4b:38:e4:60:0a:5e:76:07:09:0b:a5:e2:c7:8c:5b: e6:ed:84:d0:8d:69:e4:57:00:db:dd:3d:ce:11:6e:84: 0e:d8:46:13:3c:4e:59:c6:ed:16:a6:54:f2:58:1e:7a: 6c:0d:25:46:5f:71:04:1f:b4:90:fd:3a:70:e0:97:6c: d6:dc:aa:2f:35:56:ad:9c:63:01:63:2e:84:07:bb:d5: 86:8f:98:3b:30:4b:4b:22:c0:b4:bf:53:5f:af:6a:e6: 71:30:3f:d6:e2:e2:86:6a:e5:7d:38:63:e1:08:0f:e9: df:a8:86:28:4c:bd:1f:20:f4:0c:12:a1:8c:06:40:2e: b6:f2:59:4f:29:b9:84:ee:1d:e0:6f:00:35:21:d5:55: 58:42:1f:d5:10:3c:9f:03:be:32:25:88:51:9c:22:a9: 90:a1:02:8c:13:ae:3e:e4:94:cf:17:bd:b3:32:67:d7: ce:17:04:82:30:91:8e:06:75:86:34:f2:a1:d1:ba:39 Fingerprint (SHA-256): 9C:9C:9A:5B:85:91:27:03:F3:47:74:D9:78:34:39:32:55:BC:1B:8F:16:95:7F:59:43:3B:28:87:C6:AA:61:73 Fingerprint (SHA1): A5:46:C9:B1:61:0C:E4:05:A4:3F:80:B4:D5:DF:AC:EE:1D:3B:FE:83 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152241 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152242 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152243 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018152244 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018152245 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152241 (0x3cafc531) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:48 2023 Not After : Wed Oct 18 15:24:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:6e:0f:3a:0e:9b:18:08:9a:7f:29:f6:fd:9b:69:81: 8d:21:31:df:df:d3:5a:f9:3a:d1:44:06:a5:5f:ec:d5: 0d:be:74:72:6d:f4:59:fc:f6:86:df:e6:37:04:0c:ec: 60:24:33:08:27:fa:bf:af:29:c5:0d:fd:6f:c4:e0:ab: b9:7f:28:e7:02:74:b3:26:69:1f:09:50:9f:38:88:7e: 99:b9:69:fd:4f:45:7a:27:24:22:1b:03:24:cf:cd:45: cb:58:be:15:71:fe:93:e7:70:e5:e2:63:e4:7a:fa:bf: b7:42:33:79:ba:c4:a2:98:65:73:e0:b9:8c:49:75:6b: 70:a7:c8:1b:c0:07:2d:3c:da:a4:66:8f:c5:15:21:30: 1b:7a:60:c7:36:4b:f6:ff:99:87:fe:7e:c4:24:a3:06: 50:7e:f0:fd:4d:69:a4:a6:d0:2b:fe:c3:3c:41:36:7c: 07:53:fd:dd:58:fa:cf:38:a1:18:b1:b0:2b:f7:ac:e4: 41:13:fb:61:22:1f:df:00:7b:fd:14:54:86:13:14:eb: 9c:4d:b0:a9:4e:18:fa:bc:93:4b:13:1f:a1:af:d5:78: db:11:3b:a1:fd:7f:4a:9d:4b:05:98:63:a9:7f:3c:6a: 16:e9:8d:d4:00:50:9c:41:a6:23:3f:b8:78:68:db:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:80:65:70:3a:94:8f:77:8e:97:2e:e6:da:8d:22:24: 27:98:47:82:83:7e:d0:5a:34:65:43:7a:6a:ae:65:cd: 58:a6:f4:e7:90:d9:0c:9a:44:c9:55:12:70:0b:e7:20: 4e:a4:c8:f3:b4:8a:96:86:9b:ee:b3:ac:3f:c4:a2:05: ff:fb:53:59:9e:49:8f:c8:e8:dd:ac:a6:34:cd:3a:14: 08:e3:52:3d:6d:5f:0b:7e:12:c4:33:46:30:d1:ed:3e: ea:69:d3:85:9c:f7:46:2f:7e:7f:79:00:15:9b:e6:d8: 8c:b4:4d:eb:56:c8:53:14:2d:27:96:7f:81:2a:ee:d4: e5:60:5f:56:ad:91:70:3e:bd:16:a0:50:4d:96:50:37: 9e:ab:66:46:f4:70:3a:e3:74:7f:a2:93:ca:f7:22:19: 3f:b6:92:49:e7:d9:fe:20:67:07:c7:5b:17:47:a7:31: 15:80:7a:60:44:c3:5e:98:dc:79:65:25:5d:70:ef:17: b3:4e:ef:60:95:06:44:0a:b4:b4:96:e6:dc:ff:1c:d9: d8:98:9d:fa:fd:53:09:21:55:53:4f:4f:7d:68:8f:78: 09:ad:c3:5e:31:ec:53:79:4e:79:be:54:68:76:03:8a: ca:d1:fe:b9:b9:54:35:8f:87:6d:c8:70:be:d9:52:2d Fingerprint (SHA-256): 56:EA:C2:FF:6D:E8:F6:AE:EF:C9:EB:1D:4A:23:50:1C:C7:B4:0F:5A:72:78:47:22:94:DF:49:99:18:DE:33:DC Fingerprint (SHA1): 3F:03:7E:E6:32:AF:79:88:36:DB:12:C6:9E:1A:81:5A:AE:76:E1:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152242 (0x3cafc532) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:49 2023 Not After : Wed Oct 18 15:24:49 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:5a:59:cc:07:48:54:9e:f0:0e:23:48:13:80:10:21: 2f:e7:8e:19:52:ed:e4:7e:58:a2:9b:d2:ec:21:0d:ce: cb:57:0a:ef:29:b2:56:94:d5:1f:bf:f5:d0:41:b7:66: 13:8b:84:ee:dd:21:cd:95:19:fd:9b:d9:f2:53:a6:d8: b2:f0:2c:e0:5f:09:af:e4:06:2e:d0:dc:02:41:45:0b: e0:35:e5:64:7b:a8:b7:c3:39:c2:40:c0:df:bc:78:db: c2:00:91:ee:28:f3:f8:13:28:18:88:ee:0b:ad:68:b6: 23:2c:06:4f:0f:ea:d2:c5:80:05:46:97:d0:0b:8e:e9: 0a:db:39:e6:0c:d5:a5:4a:44:79:20:bb:b0:a5:2c:4c: 56:19:ad:05:0c:2e:eb:31:6c:e7:8e:de:76:7e:f3:cb: 2a:a1:91:d5:3e:07:c3:fe:4e:54:06:6e:d0:b7:b4:5d: bb:b5:58:df:b1:54:a0:49:dd:f0:d0:d0:50:be:44:48: 41:74:e2:95:da:42:07:3a:97:19:1c:d6:64:3d:33:3c: 4d:82:34:32:4e:73:46:f5:0c:d1:b1:4d:91:0a:e0:36: 6c:c2:2b:59:cd:3e:72:e5:8d:9e:89:38:d8:7e:31:53: 7d:bd:9d:36:f4:20:bb:36:72:b6:1e:8f:73:43:57:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:a9:db:e2:0b:d5:4a:24:e1:e3:ff:a6:a1:41:89:f5: dd:70:6d:b1:32:40:e0:2b:32:d2:30:41:a7:a9:51:ef: 32:83:70:00:8b:85:97:98:17:9b:f3:eb:4b:e7:a0:e2: db:38:df:dd:f4:66:e1:6d:ab:ce:5a:e8:cd:60:e8:cb: 60:22:76:be:92:0a:d3:1a:d3:c7:09:b7:3b:d8:c8:91: 46:60:47:bb:05:00:e6:7e:0a:58:27:91:4c:49:63:24: 83:dd:9f:07:e1:4a:74:e0:f4:02:a5:32:4a:7b:91:9c: af:47:ce:94:96:58:2b:dd:34:45:05:65:aa:f8:9c:cc: e3:fb:b9:ba:1f:50:41:bf:03:5a:f1:8c:39:dc:12:35: 62:f1:1b:ba:5f:36:55:e6:66:2b:e4:9d:44:d5:bc:9b: e7:83:b4:a0:16:f7:d8:83:dd:b8:c9:6e:ae:ea:14:08: df:d5:ff:f5:c7:73:83:8e:f8:fd:b3:02:a7:68:44:08: b9:8a:c4:c3:d9:76:26:e9:03:c0:7a:5f:8d:ee:d1:ca: ec:21:f7:de:62:dd:47:cf:86:d2:6a:42:6a:ee:3a:6e: 55:af:eb:d8:8e:e7:e4:99:8a:1f:0f:5e:45:2b:0c:7b: cb:29:8e:78:17:6c:8d:d6:d9:29:89:57:79:c9:6f:d5 Fingerprint (SHA-256): 12:F7:98:9C:24:54:6B:DB:0F:94:6E:19:91:E1:9E:BB:64:4B:8C:1F:6A:A9:3D:CC:53:04:2A:81:88:15:11:7A Fingerprint (SHA1): 7C:96:6B:A1:FA:DD:7F:93:D7:63:F7:A4:4A:18:1A:35:4D:88:1E:6C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152243 (0x3cafc533) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:24:50 2023 Not After : Wed Oct 18 15:24:50 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:6f:ac:11:ff:04:8c:0f:9c:e8:8c:2e:4c:06:f4:35: 4b:d4:d5:12:f7:bb:8f:74:95:db:b7:b6:6f:3e:00:8d: 74:21:7a:10:71:a4:00:e9:a6:1c:fd:d0:57:9f:4a:34: c0:29:3e:6b:97:fc:d6:e4:49:85:80:d9:d8:eb:b4:66: 69:a3:ff:b3:ed:e2:26:b0:e8:d0:3c:c0:8e:62:20:63: e9:35:e1:0d:36:ca:1a:f7:e5:94:e7:45:33:fd:58:99: 04:b9:34:0c:d9:f0:af:fc:0a:eb:a1:4b:16:02:de:ed: 7a:03:8d:29:be:d1:cb:99:98:33:fc:7b:0a:2a:5f:69: c7:2d:4e:d6:35:b9:e0:2c:3a:28:53:d1:fa:4a:b2:1e: ec:8e:cb:f0:0d:30:d9:8c:c5:b3:34:19:8d:60:d4:b0: d1:3c:8c:49:c5:23:9b:d3:8c:5b:47:8a:84:16:40:ef: fc:4d:69:4c:36:42:a3:a5:1d:e4:d2:b5:fc:2b:f2:b3: fe:b6:6d:2c:43:aa:45:8e:cb:c6:37:98:79:82:22:e9: 91:7b:b4:cc:4b:1c:f3:49:7d:4f:6e:97:64:30:b8:4f: d8:95:40:3c:52:d4:31:76:be:ed:a0:b6:2c:2b:a1:b8: 46:3b:81:0e:0a:80:b4:19:fa:e7:a0:0c:b5:45:1b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:34:8a:40:03:c9:5e:57:ca:e5:b9:5d:59:a2:78:29: 76:d2:a4:3f:04:df:8c:b6:39:c5:53:15:89:8b:d8:36: 2c:6c:90:ef:94:30:05:93:a2:b6:c2:b2:e1:4f:7b:6b: db:f8:73:e8:0b:be:cc:bd:06:5a:a7:1e:46:3d:57:3e: 89:d7:15:ef:d6:96:5b:21:7d:54:b6:d5:82:7f:f3:da: ef:37:2b:04:16:18:b1:f6:5d:e2:75:7a:f4:54:28:cb: 63:fe:70:d6:ee:41:d3:8e:67:9c:cf:06:33:cf:5f:db: ca:d5:10:fa:14:31:93:0a:32:db:7a:4c:77:05:bd:28: 87:11:b3:65:ad:b4:1a:76:19:36:86:c0:56:5a:1f:35: 69:a1:ec:8b:95:b3:92:4f:2f:d0:42:5c:69:53:f1:09: b4:00:46:68:c2:7f:36:4a:34:7a:66:9c:de:ce:a0:05: 81:cf:60:fb:1f:53:8a:f3:1d:2c:93:59:41:62:ac:79: 52:e4:b5:07:79:1a:f1:59:b9:1e:91:ce:a8:ac:8c:1f: 17:26:8c:6e:92:4c:b8:2c:fb:9b:86:bc:65:68:35:62: d4:2e:d8:3b:df:6e:51:66:08:fc:b5:e9:c8:70:9a:6f: 99:79:64:73:c2:90:7d:25:14:85:d2:e8:d3:50:e2:50 Fingerprint (SHA-256): 56:84:B5:C8:1E:05:B7:14:F6:D4:F8:BD:1D:83:08:0B:30:50:0E:75:9B:7D:9C:A7:B5:8D:C8:E7:00:99:64:EB Fingerprint (SHA1): 8D:0D:25:C7:30:04:5E:6F:D9:52:B8:CF:87:11:41:29:C9:8F:1D:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152246 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152247 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152248 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018152139.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152249 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152246 (0x3cafc536) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:24:55 2023 Not After : Wed Oct 18 15:24:55 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:df:81:3e:9a:9a:62:5f:2d:0f:5d:af:71:03:14:2e: 08:84:2f:da:97:58:1e:99:4d:c6:44:5d:05:1e:99:5a: eb:31:30:9c:2b:f3:02:00:7b:36:47:3f:2f:17:ad:fd: 75:55:59:ab:c3:cd:0f:99:34:eb:b9:47:b3:f9:5b:81: 25:cd:dd:2c:ca:61:e4:13:27:84:88:22:f8:aa:f6:d0: 2a:62:7e:d6:d5:a8:be:67:d8:b3:b5:5e:f2:68:52:70: f2:d9:1f:ac:0a:37:aa:11:c4:f0:08:49:21:15:46:ee: 87:69:98:20:43:0d:70:bb:b3:81:6f:26:3e:f6:76:df: 68:e9:0c:cf:50:92:bf:e1:60:69:35:d6:8c:c3:11:0b: 5a:45:f8:1e:05:b2:1d:89:32:2f:31:66:0a:38:9b:0b: 2e:b5:cd:13:71:ca:b6:f7:7f:9e:54:eb:69:12:36:c8: 27:8e:0e:d4:f8:ab:4a:89:46:30:80:4f:35:5b:88:0b: 67:9b:29:40:4e:e0:de:4e:3d:a2:49:c3:87:ad:50:db: 9d:1d:7d:55:34:69:61:ec:2e:4e:c1:d6:93:13:bf:9b: 9e:be:cf:42:3b:67:4d:ab:91:9c:d2:d2:3c:4a:1c:c2: 0a:fd:b3:93:12:be:12:3c:ca:09:bc:e0:c5:fb:82:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:2c:7a:98:81:ac:3a:42:38:43:8f:28:97:d8:50:11: d1:17:16:b1:e6:15:47:81:8a:54:66:a0:1e:4c:ba:55: c1:f9:d3:b7:c3:64:76:13:5a:21:b9:18:ca:93:31:7e: d7:fc:cb:b5:5d:eb:12:0a:39:8a:3d:c1:ee:52:1f:c0: 7e:99:8a:27:f3:07:77:2a:23:40:12:ce:e5:96:46:18: b6:b4:f1:96:6e:81:62:b4:4c:c8:50:4a:47:73:bc:3c: f7:a9:c5:f1:ab:64:08:56:5e:75:d6:1a:25:5c:06:89: c4:a6:58:88:03:23:3a:be:f4:e4:db:c6:fd:7d:31:a8: b1:93:1e:2d:de:14:59:21:cc:61:98:22:c2:3c:6b:8f: 2e:fa:dc:3f:47:ae:02:ec:f9:d6:4b:7c:ed:0c:4c:56: 25:55:ac:fb:a3:2c:d7:d9:51:9d:f9:72:41:1c:d5:e5: 16:ff:cc:e8:30:35:ad:31:63:44:cf:fe:0a:be:c8:da: a7:a0:77:c9:c7:1f:d2:30:74:f2:3f:b4:ee:40:13:df: 7f:d9:55:3b:b1:cb:55:51:d1:05:ee:ed:7c:85:24:66: df:3b:a2:c7:d6:ab:93:39:b8:16:ae:0a:1e:70:b9:ac: b6:bb:9a:d5:91:76:3d:25:f4:aa:b1:2e:71:53:1b:91 Fingerprint (SHA-256): 03:76:63:06:A1:A6:A6:BD:36:40:B9:49:B1:FC:AA:AF:D2:FB:F1:96:8D:FC:97:9D:79:7E:2C:B5:BF:B7:A4:15 Fingerprint (SHA1): FC:1B:9F:9A:13:CD:F9:3A:5C:C5:C5:0D:74:F2:B5:C3:FC:76:0C:7C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152250 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152251 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152252 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152253 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152254 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018152140.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152255 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152251 (0x3cafc53b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:00 2023 Not After : Wed Oct 18 15:25:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:1c:73:84:80:e3:fc:64:89:11:15:a1:94:71:c0:9b: e3:79:21:eb:a8:36:55:c4:43:4c:09:96:10:ec:93:95: ae:29:3c:e6:30:e6:e1:9d:f4:51:18:3c:fc:11:d5:08: e7:8d:9f:ab:7c:c1:d1:73:eb:dc:f3:2b:06:e2:00:5c: 23:d7:24:e9:60:62:d9:9a:15:54:c7:f2:31:bb:7f:ff: 9b:65:1a:c7:e6:80:13:c2:f3:ef:d0:ca:f7:90:9b:e6: 21:19:79:20:41:c7:c5:b8:8e:b7:0d:62:01:61:0f:1a: d7:36:8e:7e:66:d2:74:9b:a0:93:33:06:5f:2b:7c:f3: 24:4f:05:c4:e5:78:4a:60:b1:67:c1:da:7e:7d:c6:cb: 1d:fa:1f:f8:b1:48:15:d5:18:37:c8:df:0f:e1:77:45: 70:3c:b3:b5:2e:2e:4c:ee:15:fc:ef:e4:fa:4e:cf:ae: 7f:1a:6d:61:80:f5:f6:e1:ea:41:b8:15:11:fc:4c:09: f4:ee:e1:3e:f5:05:35:5e:d5:f3:07:09:43:19:cd:89: 9b:a6:ad:e6:5b:74:e5:86:e2:f2:41:b4:8d:06:44:10: c6:e6:dd:e3:c9:f1:14:66:61:8e:5a:6a:c7:16:0b:55: dd:fe:35:2f:3f:9a:2f:f7:7c:f3:be:8d:70:c2:92:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:59:e9:72:12:f2:bb:b1:4c:88:1b:55:a9:39:37:92: 4c:b9:19:70:a7:32:4e:50:ee:c9:ad:00:42:82:d3:c2: 30:98:21:3c:77:3f:5a:cf:2e:5e:14:e8:6a:cb:f5:b6: 58:4b:82:4c:bf:c4:0e:b0:ab:3b:a9:b4:da:6f:d4:70: 95:67:33:d8:a3:5d:df:43:97:dc:51:53:82:bc:b7:a6: 53:4e:f5:67:e2:9b:13:64:d2:a0:44:fe:c6:98:b5:02: f5:5f:af:0a:64:f1:83:10:34:ef:81:d0:06:2a:91:23: 17:51:79:e6:b5:e5:d5:d2:90:19:40:dd:7c:90:5e:ad: 41:2e:27:97:25:12:63:49:47:a5:41:2c:fe:de:fd:83: 38:b4:82:79:4f:5a:a6:77:9a:48:2a:89:4b:7a:e8:0c: 39:09:97:57:9d:60:ca:96:26:8a:1d:37:61:7f:2a:e1: 26:fb:fa:de:0b:e5:6e:c4:f3:df:20:ff:e1:ce:ea:86: 00:08:3b:8a:c4:44:09:67:d7:b2:cb:af:ba:54:c7:fc: c8:37:5f:bb:76:a9:0a:41:1a:6a:1d:bc:8a:c6:6a:58: 06:6a:2d:b4:92:fc:41:81:35:68:b5:c9:78:57:5c:5b: 07:2a:d6:2a:8c:95:37:ce:e8:02:01:9c:5e:02:ca:61 Fingerprint (SHA-256): F3:E4:5D:09:B3:64:FE:50:7E:11:20:D2:45:9C:34:92:D1:3E:0D:A1:C7:20:F9:4F:93:CD:3A:BF:2B:07:74:30 Fingerprint (SHA1): 26:17:AC:A1:C0:AB:E2:26:F7:4A:41:B1:2B:AF:66:B6:96:81:3E:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152251 (0x3cafc53b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:00 2023 Not After : Wed Oct 18 15:25:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:1c:73:84:80:e3:fc:64:89:11:15:a1:94:71:c0:9b: e3:79:21:eb:a8:36:55:c4:43:4c:09:96:10:ec:93:95: ae:29:3c:e6:30:e6:e1:9d:f4:51:18:3c:fc:11:d5:08: e7:8d:9f:ab:7c:c1:d1:73:eb:dc:f3:2b:06:e2:00:5c: 23:d7:24:e9:60:62:d9:9a:15:54:c7:f2:31:bb:7f:ff: 9b:65:1a:c7:e6:80:13:c2:f3:ef:d0:ca:f7:90:9b:e6: 21:19:79:20:41:c7:c5:b8:8e:b7:0d:62:01:61:0f:1a: d7:36:8e:7e:66:d2:74:9b:a0:93:33:06:5f:2b:7c:f3: 24:4f:05:c4:e5:78:4a:60:b1:67:c1:da:7e:7d:c6:cb: 1d:fa:1f:f8:b1:48:15:d5:18:37:c8:df:0f:e1:77:45: 70:3c:b3:b5:2e:2e:4c:ee:15:fc:ef:e4:fa:4e:cf:ae: 7f:1a:6d:61:80:f5:f6:e1:ea:41:b8:15:11:fc:4c:09: f4:ee:e1:3e:f5:05:35:5e:d5:f3:07:09:43:19:cd:89: 9b:a6:ad:e6:5b:74:e5:86:e2:f2:41:b4:8d:06:44:10: c6:e6:dd:e3:c9:f1:14:66:61:8e:5a:6a:c7:16:0b:55: dd:fe:35:2f:3f:9a:2f:f7:7c:f3:be:8d:70:c2:92:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:59:e9:72:12:f2:bb:b1:4c:88:1b:55:a9:39:37:92: 4c:b9:19:70:a7:32:4e:50:ee:c9:ad:00:42:82:d3:c2: 30:98:21:3c:77:3f:5a:cf:2e:5e:14:e8:6a:cb:f5:b6: 58:4b:82:4c:bf:c4:0e:b0:ab:3b:a9:b4:da:6f:d4:70: 95:67:33:d8:a3:5d:df:43:97:dc:51:53:82:bc:b7:a6: 53:4e:f5:67:e2:9b:13:64:d2:a0:44:fe:c6:98:b5:02: f5:5f:af:0a:64:f1:83:10:34:ef:81:d0:06:2a:91:23: 17:51:79:e6:b5:e5:d5:d2:90:19:40:dd:7c:90:5e:ad: 41:2e:27:97:25:12:63:49:47:a5:41:2c:fe:de:fd:83: 38:b4:82:79:4f:5a:a6:77:9a:48:2a:89:4b:7a:e8:0c: 39:09:97:57:9d:60:ca:96:26:8a:1d:37:61:7f:2a:e1: 26:fb:fa:de:0b:e5:6e:c4:f3:df:20:ff:e1:ce:ea:86: 00:08:3b:8a:c4:44:09:67:d7:b2:cb:af:ba:54:c7:fc: c8:37:5f:bb:76:a9:0a:41:1a:6a:1d:bc:8a:c6:6a:58: 06:6a:2d:b4:92:fc:41:81:35:68:b5:c9:78:57:5c:5b: 07:2a:d6:2a:8c:95:37:ce:e8:02:01:9c:5e:02:ca:61 Fingerprint (SHA-256): F3:E4:5D:09:B3:64:FE:50:7E:11:20:D2:45:9C:34:92:D1:3E:0D:A1:C7:20:F9:4F:93:CD:3A:BF:2B:07:74:30 Fingerprint (SHA1): 26:17:AC:A1:C0:AB:E2:26:F7:4A:41:B1:2B:AF:66:B6:96:81:3E:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152256 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152257 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152258 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152259 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152260 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018152141.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152261 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018152262 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018152142.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152263 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152257 (0x3cafc541) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:07 2023 Not After : Wed Oct 18 15:25:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a7:96:20:4d:11:ea:60:90:97:c4:33:64:0c:3b:9d: 8e:b4:9b:d9:56:aa:ed:49:3c:b8:d7:ac:01:54:29:74: c0:62:de:fd:09:60:e3:a6:ac:f1:b7:a0:6d:0f:88:09: df:2a:88:7d:18:c8:a0:9b:6c:f6:6b:e0:17:db:27:28: 18:dd:50:e0:20:99:bd:66:49:5d:5a:01:22:bd:b1:1e: 4c:7a:43:b8:b2:88:ed:a9:c3:c3:25:43:40:c9:a3:ee: 2b:72:39:26:24:f2:2b:87:b8:ff:da:2f:cb:9c:4a:40: 15:ec:26:a3:1c:1e:a6:4c:d5:d9:80:33:19:cc:db:21: 21:b3:8a:df:e8:4d:a0:16:26:cb:b7:44:9b:38:30:03: 75:ca:45:6c:b1:77:db:e0:80:91:45:76:0d:19:64:49: 5a:aa:1c:5b:5b:91:37:7e:0d:a1:1b:b9:b5:be:80:e3: fd:6c:f5:3d:24:0d:30:b4:07:64:2d:a5:b0:cd:bb:e4: 35:a0:ee:66:37:b1:66:37:39:ae:e3:0f:6d:36:b8:9e: c2:13:94:f3:9d:24:8b:40:06:3b:93:f6:f3:e4:02:43: 53:df:e3:01:e1:e8:bb:f0:87:d3:e3:49:f0:62:29:35: 4e:74:3f:d3:1a:23:ff:2b:34:17:c8:fc:41:5c:75:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:73:fa:b9:c8:8c:c6:59:ae:ea:b7:f7:29:e1:54:44: b5:91:d1:fc:0e:79:b5:21:99:58:bb:79:3b:5a:ca:23: cc:61:00:cf:e0:ee:6c:f4:0d:4f:cb:d2:33:b0:9f:1d: 65:68:82:ed:94:1f:08:17:ad:2f:18:f2:c1:82:d8:96: 89:0d:42:b0:fa:6f:35:26:0e:51:09:39:88:19:72:9d: 5a:75:f0:50:0c:1f:ad:a1:d4:42:26:13:dc:ae:a6:fc: e1:39:81:a8:4b:86:50:1e:0d:58:ef:1f:25:e6:3d:e7: 98:0c:f1:93:12:4f:55:85:f0:fd:6d:84:a9:d1:af:ef: 76:6e:2a:3b:bf:59:30:2f:8c:68:42:70:37:e3:c2:69: fb:e9:49:27:d6:b8:e7:cc:6a:f6:0e:d1:cc:39:ff:bd: db:1b:95:fa:55:0b:78:5f:96:db:87:e3:70:a5:58:32: 63:52:ca:76:ac:12:d0:57:6a:2b:9f:e6:ad:44:a7:52: 0f:27:f6:84:be:64:cf:d7:c1:ba:4e:fd:7d:b7:f0:16: b5:d2:82:5d:e1:fd:33:0c:4d:53:77:8b:7a:a9:9d:e3: f7:82:1a:4d:6c:5a:07:ed:24:66:03:1e:06:55:8c:f6: 70:dd:10:f3:7b:54:75:e9:21:d5:46:e8:0b:5b:d3:2e Fingerprint (SHA-256): EF:29:DB:F2:20:48:6C:B1:AA:C2:02:77:AF:99:4E:BA:80:4D:E2:DC:5E:A6:AB:A0:7E:8F:1C:25:79:13:22:5F Fingerprint (SHA1): 24:41:61:74:71:77:76:59:D0:3F:F5:69:18:81:33:81:39:AA:4A:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152257 (0x3cafc541) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:07 2023 Not After : Wed Oct 18 15:25:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a7:96:20:4d:11:ea:60:90:97:c4:33:64:0c:3b:9d: 8e:b4:9b:d9:56:aa:ed:49:3c:b8:d7:ac:01:54:29:74: c0:62:de:fd:09:60:e3:a6:ac:f1:b7:a0:6d:0f:88:09: df:2a:88:7d:18:c8:a0:9b:6c:f6:6b:e0:17:db:27:28: 18:dd:50:e0:20:99:bd:66:49:5d:5a:01:22:bd:b1:1e: 4c:7a:43:b8:b2:88:ed:a9:c3:c3:25:43:40:c9:a3:ee: 2b:72:39:26:24:f2:2b:87:b8:ff:da:2f:cb:9c:4a:40: 15:ec:26:a3:1c:1e:a6:4c:d5:d9:80:33:19:cc:db:21: 21:b3:8a:df:e8:4d:a0:16:26:cb:b7:44:9b:38:30:03: 75:ca:45:6c:b1:77:db:e0:80:91:45:76:0d:19:64:49: 5a:aa:1c:5b:5b:91:37:7e:0d:a1:1b:b9:b5:be:80:e3: fd:6c:f5:3d:24:0d:30:b4:07:64:2d:a5:b0:cd:bb:e4: 35:a0:ee:66:37:b1:66:37:39:ae:e3:0f:6d:36:b8:9e: c2:13:94:f3:9d:24:8b:40:06:3b:93:f6:f3:e4:02:43: 53:df:e3:01:e1:e8:bb:f0:87:d3:e3:49:f0:62:29:35: 4e:74:3f:d3:1a:23:ff:2b:34:17:c8:fc:41:5c:75:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:73:fa:b9:c8:8c:c6:59:ae:ea:b7:f7:29:e1:54:44: b5:91:d1:fc:0e:79:b5:21:99:58:bb:79:3b:5a:ca:23: cc:61:00:cf:e0:ee:6c:f4:0d:4f:cb:d2:33:b0:9f:1d: 65:68:82:ed:94:1f:08:17:ad:2f:18:f2:c1:82:d8:96: 89:0d:42:b0:fa:6f:35:26:0e:51:09:39:88:19:72:9d: 5a:75:f0:50:0c:1f:ad:a1:d4:42:26:13:dc:ae:a6:fc: e1:39:81:a8:4b:86:50:1e:0d:58:ef:1f:25:e6:3d:e7: 98:0c:f1:93:12:4f:55:85:f0:fd:6d:84:a9:d1:af:ef: 76:6e:2a:3b:bf:59:30:2f:8c:68:42:70:37:e3:c2:69: fb:e9:49:27:d6:b8:e7:cc:6a:f6:0e:d1:cc:39:ff:bd: db:1b:95:fa:55:0b:78:5f:96:db:87:e3:70:a5:58:32: 63:52:ca:76:ac:12:d0:57:6a:2b:9f:e6:ad:44:a7:52: 0f:27:f6:84:be:64:cf:d7:c1:ba:4e:fd:7d:b7:f0:16: b5:d2:82:5d:e1:fd:33:0c:4d:53:77:8b:7a:a9:9d:e3: f7:82:1a:4d:6c:5a:07:ed:24:66:03:1e:06:55:8c:f6: 70:dd:10:f3:7b:54:75:e9:21:d5:46:e8:0b:5b:d3:2e Fingerprint (SHA-256): EF:29:DB:F2:20:48:6C:B1:AA:C2:02:77:AF:99:4E:BA:80:4D:E2:DC:5E:A6:AB:A0:7E:8F:1C:25:79:13:22:5F Fingerprint (SHA1): 24:41:61:74:71:77:76:59:D0:3F:F5:69:18:81:33:81:39:AA:4A:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152256 (0x3cafc540) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:25:06 2023 Not After : Wed Oct 18 15:25:06 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:d9:8a:bd:dd:71:28:eb:5f:54:17:e7:c7:5a:2e:cd: 96:54:70:9b:e0:0a:a0:04:50:7e:7a:d1:01:9c:80:28: dc:c1:1c:0c:53:a7:47:8f:db:39:3c:ef:16:38:ce:fd: 34:ed:5d:47:26:87:ad:fe:42:63:9e:75:62:94:3d:ca: 0f:03:68:e0:ac:b4:77:27:42:59:e1:d1:3e:5e:b0:b9: f7:fa:cb:ba:ca:82:70:a6:ee:86:c2:e0:64:f2:b3:f1: 8d:f4:58:12:ba:42:f2:22:06:44:cf:d3:cf:c1:38:5c: a3:2a:80:1d:98:09:0b:32:a6:7a:ce:83:98:66:6c:62: 52:d7:6b:f1:ba:c3:f4:85:f0:13:2e:ee:27:27:d6:26: 8c:2d:5e:26:b6:a9:9c:a1:ab:69:03:93:c8:c3:c7:4a: 0c:6b:df:f2:cb:7b:24:9d:87:80:68:73:68:03:12:f2: 80:6d:c7:ec:84:af:aa:9e:f0:cd:dd:55:45:c4:66:23: 26:5b:e7:b9:d7:32:26:1c:a3:ce:4a:3d:aa:21:ab:5c: ce:6d:66:79:ff:01:ac:d9:27:78:ae:bc:61:0b:63:7f: 56:36:ca:b9:a5:cf:e5:ec:e5:a2:64:23:9e:00:a4:97: b0:4b:35:25:aa:18:d2:0b:97:67:fc:b1:5f:52:80:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:5b:e9:ed:ec:28:a8:6d:d9:1a:bc:ee:fc:15:8a:e8: 8f:da:61:a4:3e:c9:12:6f:ff:ad:6c:28:c5:09:cd:b8: eb:d3:8b:7a:30:4c:e4:67:69:13:56:cd:bc:11:83:37: 6c:75:7b:3c:20:7f:d9:e4:20:31:0e:ea:51:35:19:32: 6f:f7:76:59:cb:7e:0d:a2:f6:cd:02:c6:23:ba:54:07: a5:e8:49:9f:46:d2:06:bc:02:9a:c8:a0:1d:b6:8e:fe: 1d:b0:5c:7c:7f:12:a2:d5:89:57:35:bc:e5:4f:7a:b9: 13:92:26:31:0f:f3:66:31:2d:b2:1e:3a:07:b0:42:e3: b1:3b:51:f3:c0:f3:db:45:ee:ed:cc:c2:61:ae:f4:cd: fc:9e:d8:dc:15:a1:3d:ba:44:18:5d:84:e0:2d:07:58: a6:8e:6d:b6:b0:aa:91:af:85:cb:52:73:38:38:25:0f: 1d:e2:8c:59:50:8f:55:49:ea:73:96:2f:57:16:44:71: c1:9d:2e:1c:82:71:3a:76:24:5c:44:14:c0:26:9b:af: af:a2:1e:4f:82:d6:87:da:ea:9e:0c:76:a1:83:0d:2c: 29:42:1f:44:62:2b:8b:54:a7:c2:78:01:a3:d7:eb:da: c7:89:d6:33:5e:01:ed:d2:97:d4:3e:1b:3d:01:28:0c Fingerprint (SHA-256): 91:1E:B4:37:85:36:12:24:84:AB:9A:77:69:11:B4:D0:F9:30:CF:6E:A7:2A:82:C4:2C:D0:1B:DF:72:A0:FA:80 Fingerprint (SHA1): 53:4A:8B:9E:7F:98:4F:5C:A4:BF:98:8A:72:63:7D:5A:BA:AD:1B:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152257 (0x3cafc541) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:07 2023 Not After : Wed Oct 18 15:25:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a7:96:20:4d:11:ea:60:90:97:c4:33:64:0c:3b:9d: 8e:b4:9b:d9:56:aa:ed:49:3c:b8:d7:ac:01:54:29:74: c0:62:de:fd:09:60:e3:a6:ac:f1:b7:a0:6d:0f:88:09: df:2a:88:7d:18:c8:a0:9b:6c:f6:6b:e0:17:db:27:28: 18:dd:50:e0:20:99:bd:66:49:5d:5a:01:22:bd:b1:1e: 4c:7a:43:b8:b2:88:ed:a9:c3:c3:25:43:40:c9:a3:ee: 2b:72:39:26:24:f2:2b:87:b8:ff:da:2f:cb:9c:4a:40: 15:ec:26:a3:1c:1e:a6:4c:d5:d9:80:33:19:cc:db:21: 21:b3:8a:df:e8:4d:a0:16:26:cb:b7:44:9b:38:30:03: 75:ca:45:6c:b1:77:db:e0:80:91:45:76:0d:19:64:49: 5a:aa:1c:5b:5b:91:37:7e:0d:a1:1b:b9:b5:be:80:e3: fd:6c:f5:3d:24:0d:30:b4:07:64:2d:a5:b0:cd:bb:e4: 35:a0:ee:66:37:b1:66:37:39:ae:e3:0f:6d:36:b8:9e: c2:13:94:f3:9d:24:8b:40:06:3b:93:f6:f3:e4:02:43: 53:df:e3:01:e1:e8:bb:f0:87:d3:e3:49:f0:62:29:35: 4e:74:3f:d3:1a:23:ff:2b:34:17:c8:fc:41:5c:75:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:73:fa:b9:c8:8c:c6:59:ae:ea:b7:f7:29:e1:54:44: b5:91:d1:fc:0e:79:b5:21:99:58:bb:79:3b:5a:ca:23: cc:61:00:cf:e0:ee:6c:f4:0d:4f:cb:d2:33:b0:9f:1d: 65:68:82:ed:94:1f:08:17:ad:2f:18:f2:c1:82:d8:96: 89:0d:42:b0:fa:6f:35:26:0e:51:09:39:88:19:72:9d: 5a:75:f0:50:0c:1f:ad:a1:d4:42:26:13:dc:ae:a6:fc: e1:39:81:a8:4b:86:50:1e:0d:58:ef:1f:25:e6:3d:e7: 98:0c:f1:93:12:4f:55:85:f0:fd:6d:84:a9:d1:af:ef: 76:6e:2a:3b:bf:59:30:2f:8c:68:42:70:37:e3:c2:69: fb:e9:49:27:d6:b8:e7:cc:6a:f6:0e:d1:cc:39:ff:bd: db:1b:95:fa:55:0b:78:5f:96:db:87:e3:70:a5:58:32: 63:52:ca:76:ac:12:d0:57:6a:2b:9f:e6:ad:44:a7:52: 0f:27:f6:84:be:64:cf:d7:c1:ba:4e:fd:7d:b7:f0:16: b5:d2:82:5d:e1:fd:33:0c:4d:53:77:8b:7a:a9:9d:e3: f7:82:1a:4d:6c:5a:07:ed:24:66:03:1e:06:55:8c:f6: 70:dd:10:f3:7b:54:75:e9:21:d5:46:e8:0b:5b:d3:2e Fingerprint (SHA-256): EF:29:DB:F2:20:48:6C:B1:AA:C2:02:77:AF:99:4E:BA:80:4D:E2:DC:5E:A6:AB:A0:7E:8F:1C:25:79:13:22:5F Fingerprint (SHA1): 24:41:61:74:71:77:76:59:D0:3F:F5:69:18:81:33:81:39:AA:4A:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152257 (0x3cafc541) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:07 2023 Not After : Wed Oct 18 15:25:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:a7:96:20:4d:11:ea:60:90:97:c4:33:64:0c:3b:9d: 8e:b4:9b:d9:56:aa:ed:49:3c:b8:d7:ac:01:54:29:74: c0:62:de:fd:09:60:e3:a6:ac:f1:b7:a0:6d:0f:88:09: df:2a:88:7d:18:c8:a0:9b:6c:f6:6b:e0:17:db:27:28: 18:dd:50:e0:20:99:bd:66:49:5d:5a:01:22:bd:b1:1e: 4c:7a:43:b8:b2:88:ed:a9:c3:c3:25:43:40:c9:a3:ee: 2b:72:39:26:24:f2:2b:87:b8:ff:da:2f:cb:9c:4a:40: 15:ec:26:a3:1c:1e:a6:4c:d5:d9:80:33:19:cc:db:21: 21:b3:8a:df:e8:4d:a0:16:26:cb:b7:44:9b:38:30:03: 75:ca:45:6c:b1:77:db:e0:80:91:45:76:0d:19:64:49: 5a:aa:1c:5b:5b:91:37:7e:0d:a1:1b:b9:b5:be:80:e3: fd:6c:f5:3d:24:0d:30:b4:07:64:2d:a5:b0:cd:bb:e4: 35:a0:ee:66:37:b1:66:37:39:ae:e3:0f:6d:36:b8:9e: c2:13:94:f3:9d:24:8b:40:06:3b:93:f6:f3:e4:02:43: 53:df:e3:01:e1:e8:bb:f0:87:d3:e3:49:f0:62:29:35: 4e:74:3f:d3:1a:23:ff:2b:34:17:c8:fc:41:5c:75:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:73:fa:b9:c8:8c:c6:59:ae:ea:b7:f7:29:e1:54:44: b5:91:d1:fc:0e:79:b5:21:99:58:bb:79:3b:5a:ca:23: cc:61:00:cf:e0:ee:6c:f4:0d:4f:cb:d2:33:b0:9f:1d: 65:68:82:ed:94:1f:08:17:ad:2f:18:f2:c1:82:d8:96: 89:0d:42:b0:fa:6f:35:26:0e:51:09:39:88:19:72:9d: 5a:75:f0:50:0c:1f:ad:a1:d4:42:26:13:dc:ae:a6:fc: e1:39:81:a8:4b:86:50:1e:0d:58:ef:1f:25:e6:3d:e7: 98:0c:f1:93:12:4f:55:85:f0:fd:6d:84:a9:d1:af:ef: 76:6e:2a:3b:bf:59:30:2f:8c:68:42:70:37:e3:c2:69: fb:e9:49:27:d6:b8:e7:cc:6a:f6:0e:d1:cc:39:ff:bd: db:1b:95:fa:55:0b:78:5f:96:db:87:e3:70:a5:58:32: 63:52:ca:76:ac:12:d0:57:6a:2b:9f:e6:ad:44:a7:52: 0f:27:f6:84:be:64:cf:d7:c1:ba:4e:fd:7d:b7:f0:16: b5:d2:82:5d:e1:fd:33:0c:4d:53:77:8b:7a:a9:9d:e3: f7:82:1a:4d:6c:5a:07:ed:24:66:03:1e:06:55:8c:f6: 70:dd:10:f3:7b:54:75:e9:21:d5:46:e8:0b:5b:d3:2e Fingerprint (SHA-256): EF:29:DB:F2:20:48:6C:B1:AA:C2:02:77:AF:99:4E:BA:80:4D:E2:DC:5E:A6:AB:A0:7E:8F:1C:25:79:13:22:5F Fingerprint (SHA1): 24:41:61:74:71:77:76:59:D0:3F:F5:69:18:81:33:81:39:AA:4A:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152264 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152265 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018152266 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018152267 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018152268 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018152269 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152270 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018152271 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152272 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152273 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152264 (0x3cafc548) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:25:17 2023 Not After : Wed Oct 18 15:25:17 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c4:80:b7:43:13:92:19:fc:d1:68:b3:be:59:eb:ce: ee:bb:6b:dd:95:b0:55:50:4a:1c:bc:10:cb:9e:d2:bd: 2c:2d:d2:d0:be:4d:bd:1c:73:68:db:18:92:97:ec:e8: a9:12:69:93:95:ef:c5:5d:2e:ce:0d:12:f4:f1:ad:fc: bc:fb:bb:4b:2c:b1:ca:17:04:77:d6:22:c7:9d:a3:7d: 4b:08:f5:d9:17:88:b2:6a:72:b4:8a:5a:68:02:86:14: bf:ef:57:3e:8a:3d:56:e4:fb:75:e0:1f:42:41:04:29: b7:7e:59:0f:e5:41:56:9c:9b:8d:d2:f0:43:20:d1:e9: 3b:47:67:53:66:4f:84:a9:f9:3a:3e:b6:ee:dc:5f:03: 40:cc:c4:20:a6:53:03:96:49:ee:06:16:fc:04:53:24: 09:8d:29:f5:a9:d0:a8:fe:cc:68:9a:31:12:f4:9d:31: 6f:58:50:c0:c3:df:ea:27:ee:cd:6e:29:d2:73:c5:a3: f1:3c:99:4c:07:75:72:fb:52:3a:34:c8:07:16:76:8c: 60:99:e3:98:92:94:6c:59:10:13:cf:7d:f2:c4:39:34: 69:bb:2b:a3:1d:ef:06:45:4b:49:05:0f:6c:f3:84:64: 44:78:d0:4c:3e:15:cf:ab:11:e0:29:09:12:07:1c:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:4c:07:bb:0d:38:04:ee:ca:c9:cc:cd:30:e9:03:19: 50:3a:a5:db:8e:c4:35:fa:46:31:29:be:79:f9:d0:57: 93:30:e1:62:40:af:6c:2c:73:f9:53:12:5b:39:12:39: dd:e4:18:36:be:20:90:fe:1d:8c:07:34:0a:f4:5f:6c: 0b:7f:82:d2:c8:0d:33:04:78:9b:b9:26:f4:5e:aa:65: 38:52:51:a0:5e:3f:c2:1c:d9:28:c8:b0:09:54:e3:1a: ae:aa:d3:32:40:96:8f:8c:18:d7:3d:1a:7e:65:c5:d2: 4d:08:91:1d:f3:c9:40:2d:a3:3e:02:0b:39:a5:bb:78: 77:3b:78:2f:27:76:33:5a:5d:9e:2f:eb:6e:46:45:9f: e8:9b:cc:f3:aa:5e:d7:89:a7:d6:c0:68:f8:a6:e2:b1: 89:aa:66:44:3d:72:97:90:31:9b:df:ca:bd:5f:d0:5d: 59:e1:a5:8c:4c:41:a5:22:03:ca:26:37:b8:97:7e:83: 8a:6b:38:28:99:56:ef:32:c9:7b:db:b0:83:52:e9:92: 54:19:fe:e0:34:84:88:d1:32:20:d6:15:0a:07:85:02: fa:9d:9e:62:6e:13:4c:ad:e3:93:18:df:36:7f:a9:55: a1:da:8b:3b:64:e0:b2:e9:5d:8e:c5:84:ec:42:a0:ca Fingerprint (SHA-256): 9C:2B:72:86:26:D6:45:FD:91:8A:88:83:85:02:55:FB:A0:B2:6B:01:3F:48:82:06:0A:5A:4F:E8:C3:9C:A1:B1 Fingerprint (SHA1): BB:84:DD:EF:54:DF:86:85:AF:94:C1:20:64:7D:1B:20:F8:BA:BF:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152265 (0x3cafc549) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:25:18 2023 Not After : Wed Oct 18 15:25:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:68:63:f1:69:49:40:1b:6f:59:c0:6e:eb:be:58:b7: 77:f3:2e:a9:8f:74:b5:32:9c:e9:5c:83:69:8b:c9:34: 78:70:28:4a:54:30:f7:38:4d:54:e4:a9:db:ae:f5:06: c7:86:5f:2e:1c:ef:a0:8c:a5:0d:22:45:29:48:ee:6c: c1:1f:ed:fe:8a:af:f4:41:db:2f:e3:cc:85:cf:51:de: d1:a3:da:ab:ea:4b:3d:8a:fe:a7:8c:08:82:9e:57:df: ce:26:c2:60:a6:b1:9c:e2:42:82:f6:72:09:0a:1c:d8: ce:1c:e3:31:45:4a:c2:1b:28:90:bc:4b:d1:46:6b:7d: 32:1d:ef:3a:34:a7:68:29:85:8e:1f:47:4a:95:04:a5: 46:ea:b9:93:9d:c5:b6:b7:73:f9:07:db:15:04:b8:fe: fc:fb:c5:8f:de:4a:9a:5c:b8:3e:56:10:98:28:2f:39: a3:63:ad:48:22:04:94:2d:d3:51:7b:29:8d:54:b7:81: 7b:19:c0:6b:e5:cf:df:77:70:82:a7:19:73:7a:b7:c3: fa:aa:7a:c2:a8:4f:b8:cf:a4:06:37:29:4e:1e:9c:5e: 67:eb:16:d5:27:5f:4c:13:a6:8f:64:09:e7:83:7a:15: 16:f2:35:be:58:33:ec:97:fe:5c:cb:be:40:25:7e:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:e8:89:d9:41:82:70:4c:0f:61:17:d2:c7:5c:e9:cc: fb:ac:a8:be:9a:4e:4b:65:3e:3d:40:29:24:ce:22:71: 78:87:2a:9a:f3:43:35:c9:6b:80:09:0e:bd:b4:6f:23: 1b:48:d8:89:52:68:1c:a6:19:bb:bc:a2:10:c7:02:7b: 5b:f1:b1:51:89:57:2c:09:fb:d6:3b:c4:f1:7d:e4:a1: 46:66:91:49:32:bb:35:b0:e8:ba:c0:a9:46:5d:65:77: 71:29:f1:c5:b0:52:21:e9:3f:b2:92:c8:0b:43:61:d1: 09:a4:ad:cb:d9:a5:e8:2f:41:43:e1:a5:1f:44:d0:db: dc:2c:af:40:e6:33:66:b5:6a:62:26:5a:db:fa:fc:c8: cd:d3:d7:6f:af:9a:d8:4e:bf:ab:bd:af:72:bb:a2:ac: b3:fc:2b:d9:8c:93:54:11:d4:3b:14:e9:e4:d2:82:b1: 16:e5:d5:f0:18:41:b3:34:84:9f:63:d8:d0:5b:49:98: da:3f:0b:e1:51:a4:c4:8b:06:84:95:60:26:87:af:10: b0:f7:e0:45:c0:46:df:eb:3e:df:d6:a2:48:25:3e:e2: 24:59:d3:d1:e8:99:76:2d:3f:15:4a:7b:7f:76:97:b7: 89:c0:49:f3:bf:67:1d:69:28:19:50:cb:36:f5:b3:1b Fingerprint (SHA-256): 0C:6C:18:7B:56:45:48:4D:D8:B6:77:32:D9:44:F6:C3:32:73:4F:08:04:15:5C:CA:DD:64:97:C1:AC:BC:1B:AF Fingerprint (SHA1): B3:0E:1B:5F:8A:E9:27:33:BC:10:02:CD:D7:91:92:4B:66:BE:0B:4D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152274 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152275 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152276 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018152277 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152278 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018152279 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018152280 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018152281 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018152282 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152274 (0x3cafc552) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:31 2023 Not After : Wed Oct 18 15:25:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:8b:a3:d5:6f:07:63:fc:ae:77:11:d6:a5:7e:8a:bc: fe:67:9d:59:20:a6:08:11:c6:5b:1d:6c:99:e6:10:bf: ed:38:d9:5c:a2:de:e0:6d:3f:02:64:c0:dc:4c:d3:75: e6:73:c5:fb:dd:47:d1:fb:7d:83:15:cc:4f:1a:5b:52: c8:32:30:ee:4e:d8:53:bd:52:d9:6c:85:fd:1a:a9:26: f9:e1:cb:14:72:d5:9e:c8:e9:66:2a:c4:a9:b4:c2:7d: 53:58:1d:25:91:8a:49:ed:96:c9:07:a1:83:64:fb:70: 27:71:1c:17:55:71:cf:02:ce:a5:1c:1c:14:cd:d4:f8: 44:94:2d:03:77:cb:76:33:d1:11:51:3e:7d:5a:9f:dd: 66:32:da:60:9e:b4:55:35:b0:98:be:30:d9:1d:3a:b8: 68:4c:1b:03:59:33:f3:0e:81:b0:0a:2e:5a:43:bd:61: 87:78:c2:bc:2d:91:9d:b5:ce:76:14:88:39:97:71:0e: 64:42:f0:34:01:38:1c:c2:2b:b2:74:0f:33:8f:81:53: ef:ab:7d:c7:59:af:24:b9:27:3c:3c:4b:61:7b:94:e3: 68:11:d6:20:da:41:53:98:c7:ab:9d:cb:ad:a2:01:20: 58:96:3a:b0:1a:3e:df:75:ad:50:dd:fc:2c:05:22:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:02:d2:a0:2b:8e:31:9c:2a:8a:57:82:a1: 36:75:30:1e:fa:34:dc:9d:44:86:c2:19:94:3a:47:18: 02:1d:00:bb:7b:da:0d:33:e8:3a:b0:15:0c:85:e2:63: c8:14:fb:af:b9:e6:25:28:80:d9:39:69:64:0a:cb Fingerprint (SHA-256): D2:B0:F4:71:17:95:09:C9:21:9C:35:0A:BA:C9:3C:D0:A1:A1:0F:EE:F5:D9:70:CE:32:D2:AF:22:1B:E6:E1:8D Fingerprint (SHA1): 85:D2:57:A6:56:C6:9E:4A:F9:7A:B3:67:BF:81:B4:DB:46:01:0A:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152274 (0x3cafc552) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:31 2023 Not After : Wed Oct 18 15:25:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:8b:a3:d5:6f:07:63:fc:ae:77:11:d6:a5:7e:8a:bc: fe:67:9d:59:20:a6:08:11:c6:5b:1d:6c:99:e6:10:bf: ed:38:d9:5c:a2:de:e0:6d:3f:02:64:c0:dc:4c:d3:75: e6:73:c5:fb:dd:47:d1:fb:7d:83:15:cc:4f:1a:5b:52: c8:32:30:ee:4e:d8:53:bd:52:d9:6c:85:fd:1a:a9:26: f9:e1:cb:14:72:d5:9e:c8:e9:66:2a:c4:a9:b4:c2:7d: 53:58:1d:25:91:8a:49:ed:96:c9:07:a1:83:64:fb:70: 27:71:1c:17:55:71:cf:02:ce:a5:1c:1c:14:cd:d4:f8: 44:94:2d:03:77:cb:76:33:d1:11:51:3e:7d:5a:9f:dd: 66:32:da:60:9e:b4:55:35:b0:98:be:30:d9:1d:3a:b8: 68:4c:1b:03:59:33:f3:0e:81:b0:0a:2e:5a:43:bd:61: 87:78:c2:bc:2d:91:9d:b5:ce:76:14:88:39:97:71:0e: 64:42:f0:34:01:38:1c:c2:2b:b2:74:0f:33:8f:81:53: ef:ab:7d:c7:59:af:24:b9:27:3c:3c:4b:61:7b:94:e3: 68:11:d6:20:da:41:53:98:c7:ab:9d:cb:ad:a2:01:20: 58:96:3a:b0:1a:3e:df:75:ad:50:dd:fc:2c:05:22:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:02:d2:a0:2b:8e:31:9c:2a:8a:57:82:a1: 36:75:30:1e:fa:34:dc:9d:44:86:c2:19:94:3a:47:18: 02:1d:00:bb:7b:da:0d:33:e8:3a:b0:15:0c:85:e2:63: c8:14:fb:af:b9:e6:25:28:80:d9:39:69:64:0a:cb Fingerprint (SHA-256): D2:B0:F4:71:17:95:09:C9:21:9C:35:0A:BA:C9:3C:D0:A1:A1:0F:EE:F5:D9:70:CE:32:D2:AF:22:1B:E6:E1:8D Fingerprint (SHA1): 85:D2:57:A6:56:C6:9E:4A:F9:7A:B3:67:BF:81:B4:DB:46:01:0A:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152274 (0x3cafc552) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:31 2023 Not After : Wed Oct 18 15:25:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:8b:a3:d5:6f:07:63:fc:ae:77:11:d6:a5:7e:8a:bc: fe:67:9d:59:20:a6:08:11:c6:5b:1d:6c:99:e6:10:bf: ed:38:d9:5c:a2:de:e0:6d:3f:02:64:c0:dc:4c:d3:75: e6:73:c5:fb:dd:47:d1:fb:7d:83:15:cc:4f:1a:5b:52: c8:32:30:ee:4e:d8:53:bd:52:d9:6c:85:fd:1a:a9:26: f9:e1:cb:14:72:d5:9e:c8:e9:66:2a:c4:a9:b4:c2:7d: 53:58:1d:25:91:8a:49:ed:96:c9:07:a1:83:64:fb:70: 27:71:1c:17:55:71:cf:02:ce:a5:1c:1c:14:cd:d4:f8: 44:94:2d:03:77:cb:76:33:d1:11:51:3e:7d:5a:9f:dd: 66:32:da:60:9e:b4:55:35:b0:98:be:30:d9:1d:3a:b8: 68:4c:1b:03:59:33:f3:0e:81:b0:0a:2e:5a:43:bd:61: 87:78:c2:bc:2d:91:9d:b5:ce:76:14:88:39:97:71:0e: 64:42:f0:34:01:38:1c:c2:2b:b2:74:0f:33:8f:81:53: ef:ab:7d:c7:59:af:24:b9:27:3c:3c:4b:61:7b:94:e3: 68:11:d6:20:da:41:53:98:c7:ab:9d:cb:ad:a2:01:20: 58:96:3a:b0:1a:3e:df:75:ad:50:dd:fc:2c:05:22:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:02:d2:a0:2b:8e:31:9c:2a:8a:57:82:a1: 36:75:30:1e:fa:34:dc:9d:44:86:c2:19:94:3a:47:18: 02:1d:00:bb:7b:da:0d:33:e8:3a:b0:15:0c:85:e2:63: c8:14:fb:af:b9:e6:25:28:80:d9:39:69:64:0a:cb Fingerprint (SHA-256): D2:B0:F4:71:17:95:09:C9:21:9C:35:0A:BA:C9:3C:D0:A1:A1:0F:EE:F5:D9:70:CE:32:D2:AF:22:1B:E6:E1:8D Fingerprint (SHA1): 85:D2:57:A6:56:C6:9E:4A:F9:7A:B3:67:BF:81:B4:DB:46:01:0A:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152274 (0x3cafc552) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:31 2023 Not After : Wed Oct 18 15:25:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 4c:8b:a3:d5:6f:07:63:fc:ae:77:11:d6:a5:7e:8a:bc: fe:67:9d:59:20:a6:08:11:c6:5b:1d:6c:99:e6:10:bf: ed:38:d9:5c:a2:de:e0:6d:3f:02:64:c0:dc:4c:d3:75: e6:73:c5:fb:dd:47:d1:fb:7d:83:15:cc:4f:1a:5b:52: c8:32:30:ee:4e:d8:53:bd:52:d9:6c:85:fd:1a:a9:26: f9:e1:cb:14:72:d5:9e:c8:e9:66:2a:c4:a9:b4:c2:7d: 53:58:1d:25:91:8a:49:ed:96:c9:07:a1:83:64:fb:70: 27:71:1c:17:55:71:cf:02:ce:a5:1c:1c:14:cd:d4:f8: 44:94:2d:03:77:cb:76:33:d1:11:51:3e:7d:5a:9f:dd: 66:32:da:60:9e:b4:55:35:b0:98:be:30:d9:1d:3a:b8: 68:4c:1b:03:59:33:f3:0e:81:b0:0a:2e:5a:43:bd:61: 87:78:c2:bc:2d:91:9d:b5:ce:76:14:88:39:97:71:0e: 64:42:f0:34:01:38:1c:c2:2b:b2:74:0f:33:8f:81:53: ef:ab:7d:c7:59:af:24:b9:27:3c:3c:4b:61:7b:94:e3: 68:11:d6:20:da:41:53:98:c7:ab:9d:cb:ad:a2:01:20: 58:96:3a:b0:1a:3e:df:75:ad:50:dd:fc:2c:05:22:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:02:d2:a0:2b:8e:31:9c:2a:8a:57:82:a1: 36:75:30:1e:fa:34:dc:9d:44:86:c2:19:94:3a:47:18: 02:1d:00:bb:7b:da:0d:33:e8:3a:b0:15:0c:85:e2:63: c8:14:fb:af:b9:e6:25:28:80:d9:39:69:64:0a:cb Fingerprint (SHA-256): D2:B0:F4:71:17:95:09:C9:21:9C:35:0A:BA:C9:3C:D0:A1:A1:0F:EE:F5:D9:70:CE:32:D2:AF:22:1B:E6:E1:8D Fingerprint (SHA1): 85:D2:57:A6:56:C6:9E:4A:F9:7A:B3:67:BF:81:B4:DB:46:01:0A:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018152547Z nextupdate=20241018152547Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 15:25:47 2023 Next Update: Fri Oct 18 15:25:47 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152547Z nextupdate=20241018152547Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:25:47 2023 Next Update: Fri Oct 18 15:25:47 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152547Z nextupdate=20241018152547Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:25:47 2023 Next Update: Fri Oct 18 15:25:47 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018152547Z nextupdate=20241018152547Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 15:25:47 2023 Next Update: Fri Oct 18 15:25:47 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152548Z addcert 14 20231018152548Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:25:48 2023 Next Update: Fri Oct 18 15:25:47 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 15:25:48 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152550Z addcert 15 20231018152550Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:25:50 2023 Next Update: Fri Oct 18 15:25:47 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 15:25:50 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:40 2023 Not After : Wed Oct 18 15:25:40 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:5a:91:8a:7b:ff:1b:e5:65:b2:5c:26:6f:e4:f5:cc: 95:52:b5:6c:37:80:6c:ea:bc:4b:4e:bf:60:8b:6a:da: 33:16:d0:16:2e:7f:93:14:e8:14:c4:aa:e4:ab:d2:62: 84:b3:a8:c4:d8:a3:d0:28:5d:35:ab:c0:bf:4f:a8:be: f3:d8:1f:39:81:23:65:30:94:24:22:0b:ca:6a:76:58: 79:ec:25:7b:b9:83:e1:70:f8:f0:83:35:88:09:0f:d4: 97:f7:eb:e2:57:bc:34:32:68:0c:3d:04:41:00:57:df: 16:80:c6:b0:8a:7b:6b:eb:0d:aa:db:3a:60:af:8e:57: 5b:b7:af:63:41:db:2d:85:a9:bc:aa:d7:e7:a4:9e:e8: b1:ef:12:6b:77:4a:a9:0d:5f:b4:94:28:f8:a6:ab:ae: 48:0c:fb:c7:9d:a5:ee:c1:2a:45:e0:86:3f:21:9b:92: fa:3e:67:bd:23:f9:53:11:08:62:c3:0c:a6:4b:c1:7c: b1:56:50:5e:a4:8d:3c:17:b7:90:54:ce:f8:a2:8b:d1: cc:e3:8d:e8:16:e0:09:21:64:b5:3d:61:56:6e:f6:fe: cb:79:d2:3c:87:5a:d4:64:ae:77:61:39:48:a7:a8:5a: e7:d1:98:9b:a6:72:91:16:05:26:aa:bb:3f:c7:69:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:49:dc:62:e7:a4:59:07:fb:71:29:12:40:5a:a2:5e: cc:41:d7:6f:81:9b:61:dc:69:a1:f2:ef:e5:fe:41:3d: f2:62:34:7b:94:7c:34:c5:70:00:e3:0d:37:de:08:7f: 9a:8f:69:a1:27:20:b2:0c:4b:58:a2:06:d0:4c:c9:a2: d7:7d:41:93:2a:ec:1c:96:93:37:aa:e7:5f:d9:70:c1: 29:cb:3a:5a:ea:00:59:aa:c8:54:bb:93:ee:b7:54:6b: 97:a3:b1:0c:98:0d:4f:d3:36:8a:f3:c6:f4:4b:9d:23: 43:00:ea:52:04:cc:f4:48:af:bb:cb:00:8b:65:40:b7: d2:88:03:fa:c5:14:cb:d8:0b:bf:3c:de:44:5b:4d:de: 9a:54:6a:69:08:2e:46:f8:c6:c4:11:27:a8:90:70:e4: 7b:ad:35:c2:a8:85:67:47:53:f0:b8:37:93:ed:60:70: b1:a8:78:f5:87:64:a6:7c:c7:a4:e3:86:e9:60:e9:ce: 66:34:71:82:4b:3a:af:39:00:27:36:80:0f:30:52:3f: bb:16:2d:a5:27:0d:7c:29:e6:aa:27:80:e7:ac:4b:ab: 39:73:34:7e:38:70:6c:e5:c9:ff:94:5e:b1:a0:a8:c9: 3a:58:e2:cf:a7:9b:40:29:95:5d:ea:28:18:31:4d:f6 Fingerprint (SHA-256): 05:8A:EB:02:55:6C:3C:BE:7D:E8:9F:76:E5:47:23:E7:64:3E:2B:85:7A:93:2C:44:DC:65:DC:78:5C:95:E3:4B Fingerprint (SHA1): 1A:63:F1:1E:5A:0C:5A:41:1F:B0:DA:12:6C:A3:D2:CE:FF:B1:87:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:40 2023 Not After : Wed Oct 18 15:25:40 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:5a:91:8a:7b:ff:1b:e5:65:b2:5c:26:6f:e4:f5:cc: 95:52:b5:6c:37:80:6c:ea:bc:4b:4e:bf:60:8b:6a:da: 33:16:d0:16:2e:7f:93:14:e8:14:c4:aa:e4:ab:d2:62: 84:b3:a8:c4:d8:a3:d0:28:5d:35:ab:c0:bf:4f:a8:be: f3:d8:1f:39:81:23:65:30:94:24:22:0b:ca:6a:76:58: 79:ec:25:7b:b9:83:e1:70:f8:f0:83:35:88:09:0f:d4: 97:f7:eb:e2:57:bc:34:32:68:0c:3d:04:41:00:57:df: 16:80:c6:b0:8a:7b:6b:eb:0d:aa:db:3a:60:af:8e:57: 5b:b7:af:63:41:db:2d:85:a9:bc:aa:d7:e7:a4:9e:e8: b1:ef:12:6b:77:4a:a9:0d:5f:b4:94:28:f8:a6:ab:ae: 48:0c:fb:c7:9d:a5:ee:c1:2a:45:e0:86:3f:21:9b:92: fa:3e:67:bd:23:f9:53:11:08:62:c3:0c:a6:4b:c1:7c: b1:56:50:5e:a4:8d:3c:17:b7:90:54:ce:f8:a2:8b:d1: cc:e3:8d:e8:16:e0:09:21:64:b5:3d:61:56:6e:f6:fe: cb:79:d2:3c:87:5a:d4:64:ae:77:61:39:48:a7:a8:5a: e7:d1:98:9b:a6:72:91:16:05:26:aa:bb:3f:c7:69:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:49:dc:62:e7:a4:59:07:fb:71:29:12:40:5a:a2:5e: cc:41:d7:6f:81:9b:61:dc:69:a1:f2:ef:e5:fe:41:3d: f2:62:34:7b:94:7c:34:c5:70:00:e3:0d:37:de:08:7f: 9a:8f:69:a1:27:20:b2:0c:4b:58:a2:06:d0:4c:c9:a2: d7:7d:41:93:2a:ec:1c:96:93:37:aa:e7:5f:d9:70:c1: 29:cb:3a:5a:ea:00:59:aa:c8:54:bb:93:ee:b7:54:6b: 97:a3:b1:0c:98:0d:4f:d3:36:8a:f3:c6:f4:4b:9d:23: 43:00:ea:52:04:cc:f4:48:af:bb:cb:00:8b:65:40:b7: d2:88:03:fa:c5:14:cb:d8:0b:bf:3c:de:44:5b:4d:de: 9a:54:6a:69:08:2e:46:f8:c6:c4:11:27:a8:90:70:e4: 7b:ad:35:c2:a8:85:67:47:53:f0:b8:37:93:ed:60:70: b1:a8:78:f5:87:64:a6:7c:c7:a4:e3:86:e9:60:e9:ce: 66:34:71:82:4b:3a:af:39:00:27:36:80:0f:30:52:3f: bb:16:2d:a5:27:0d:7c:29:e6:aa:27:80:e7:ac:4b:ab: 39:73:34:7e:38:70:6c:e5:c9:ff:94:5e:b1:a0:a8:c9: 3a:58:e2:cf:a7:9b:40:29:95:5d:ea:28:18:31:4d:f6 Fingerprint (SHA-256): 05:8A:EB:02:55:6C:3C:BE:7D:E8:9F:76:E5:47:23:E7:64:3E:2B:85:7A:93:2C:44:DC:65:DC:78:5C:95:E3:4B Fingerprint (SHA1): 1A:63:F1:1E:5A:0C:5A:41:1F:B0:DA:12:6C:A3:D2:CE:FF:B1:87:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152283 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018152284 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152159.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152143.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152159.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018152285 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152159.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152144.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018152286 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152159.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152145.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152159.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152146.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018152602Z nextupdate=20241018152602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 15:26:02 2023 Next Update: Fri Oct 18 15:26:02 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152602Z nextupdate=20241018152602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:26:02 2023 Next Update: Fri Oct 18 15:26:02 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152602Z nextupdate=20241018152602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:26:02 2023 Next Update: Fri Oct 18 15:26:02 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018152602Z nextupdate=20241018152602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 15:26:02 2023 Next Update: Fri Oct 18 15:26:02 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152603Z addcert 20 20231018152603Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:26:03 2023 Next Update: Fri Oct 18 15:26:02 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 15:26:03 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152604Z addcert 40 20231018152604Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:26:04 2023 Next Update: Fri Oct 18 15:26:02 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 15:26:03 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 15:26:04 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152283 (0x3cafc55b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:52 2023 Not After : Wed Oct 18 15:25:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:66:a4:da:e4:f4:79:c4:bb:7f:11:47:75:92:e5:0c: 99:62:23:da:10:4a:66:79:ee:55:a9:d9:5d:b3:cd:46: 0d:96:10:2e:6c:90:a4:cf:06:58:36:b1:c3:99:0b:0f: 55:e5:11:d5:14:23:79:bf:6a:71:44:02:dc:84:af:cf: 6d:6a:ed:00:a2:94:e4:a5:54:a7:a8:0c:75:57:94:20: 96:83:22:0c:af:4f:c0:ca:b1:49:bf:7c:e6:a4:ce:fd: 70:1e:af:7d:60:17:a5:22:fc:47:47:e7:48:ab:5b:39: a5:28:e6:b5:a7:24:68:92:df:cf:32:27:e7:9b:57:fb: d4:b9:21:9d:ab:32:1c:19:69:72:b0:ef:19:d9:9f:23: 6a:cd:2c:3a:bd:65:65:6d:8a:35:02:37:09:cd:84:4a: af:49:b7:91:de:2e:d0:45:fa:c0:d2:dc:f8:1d:cf:60: 4c:37:70:da:b1:5e:7b:ad:da:17:f6:9f:69:0b:c2:f1: dd:87:f7:9b:8a:39:41:c3:13:68:e8:45:83:f9:41:d2: 84:cd:8a:f3:88:ae:43:3c:ca:25:59:23:9b:45:8e:29: 19:66:93:ef:5e:a9:60:7c:c2:50:a7:03:86:d8:e3:fc: 1e:42:9d:06:90:9d:de:57:d9:43:8c:03:c2:c5:d9:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:80:8a:56:4f:d3:9b:f6:ec:47:27:13:3a:bd:e7:67: a0:93:c7:98:43:66:f5:52:cf:37:13:02:ad:d5:21:91: 0f:6c:a6:66:ba:49:34:0d:e8:13:17:12:a2:dc:eb:f6: 5e:ef:2f:0d:29:e2:84:5c:82:37:3c:4c:ba:9c:5f:eb: 30:60:a3:63:bf:a3:bf:d6:10:a0:9b:f0:fa:4c:3a:14: ab:cf:09:d8:b0:cf:99:38:43:da:cf:e1:5d:18:9f:bd: ba:09:11:30:29:bd:b0:eb:4a:ab:5b:17:dd:1a:af:a9: b5:df:e0:27:b7:b3:9f:40:0b:b9:e7:67:8a:0b:1d:00: 85:64:fc:dc:6a:cf:85:fb:3c:42:1d:cd:b1:a4:20:d8: db:84:86:b7:3a:9b:d9:80:db:b1:66:fb:87:24:f8:e5: 4a:c1:b9:24:ad:0e:de:4b:ff:05:a2:ff:75:1f:b0:32: 24:b6:d8:87:1a:8c:d4:a7:d0:9c:8d:e4:79:5e:ba:f3: 21:9a:e8:79:bf:0d:35:09:ad:d2:93:f2:38:48:69:da: 22:58:7a:49:e4:ec:7a:80:fb:94:08:e6:08:68:ac:1b: bc:7c:57:4f:0d:fe:0c:15:a4:46:e0:7a:46:95:45:c5: ed:d8:a2:91:0b:f5:c3:f9:dd:3a:47:f7:ea:75:af:9f Fingerprint (SHA-256): 9A:D7:3B:3C:BC:25:66:C1:7A:4D:95:8F:78:36:01:84:C8:4D:21:30:C0:D9:08:AA:05:40:22:C4:83:EA:B3:E0 Fingerprint (SHA1): 0A:6C:6E:5C:C1:8C:0E:E5:B3:FA:19:89:3C:C6:0E:75:15:0C:D6:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152283 (0x3cafc55b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:25:52 2023 Not After : Wed Oct 18 15:25:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:66:a4:da:e4:f4:79:c4:bb:7f:11:47:75:92:e5:0c: 99:62:23:da:10:4a:66:79:ee:55:a9:d9:5d:b3:cd:46: 0d:96:10:2e:6c:90:a4:cf:06:58:36:b1:c3:99:0b:0f: 55:e5:11:d5:14:23:79:bf:6a:71:44:02:dc:84:af:cf: 6d:6a:ed:00:a2:94:e4:a5:54:a7:a8:0c:75:57:94:20: 96:83:22:0c:af:4f:c0:ca:b1:49:bf:7c:e6:a4:ce:fd: 70:1e:af:7d:60:17:a5:22:fc:47:47:e7:48:ab:5b:39: a5:28:e6:b5:a7:24:68:92:df:cf:32:27:e7:9b:57:fb: d4:b9:21:9d:ab:32:1c:19:69:72:b0:ef:19:d9:9f:23: 6a:cd:2c:3a:bd:65:65:6d:8a:35:02:37:09:cd:84:4a: af:49:b7:91:de:2e:d0:45:fa:c0:d2:dc:f8:1d:cf:60: 4c:37:70:da:b1:5e:7b:ad:da:17:f6:9f:69:0b:c2:f1: dd:87:f7:9b:8a:39:41:c3:13:68:e8:45:83:f9:41:d2: 84:cd:8a:f3:88:ae:43:3c:ca:25:59:23:9b:45:8e:29: 19:66:93:ef:5e:a9:60:7c:c2:50:a7:03:86:d8:e3:fc: 1e:42:9d:06:90:9d:de:57:d9:43:8c:03:c2:c5:d9:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:80:8a:56:4f:d3:9b:f6:ec:47:27:13:3a:bd:e7:67: a0:93:c7:98:43:66:f5:52:cf:37:13:02:ad:d5:21:91: 0f:6c:a6:66:ba:49:34:0d:e8:13:17:12:a2:dc:eb:f6: 5e:ef:2f:0d:29:e2:84:5c:82:37:3c:4c:ba:9c:5f:eb: 30:60:a3:63:bf:a3:bf:d6:10:a0:9b:f0:fa:4c:3a:14: ab:cf:09:d8:b0:cf:99:38:43:da:cf:e1:5d:18:9f:bd: ba:09:11:30:29:bd:b0:eb:4a:ab:5b:17:dd:1a:af:a9: b5:df:e0:27:b7:b3:9f:40:0b:b9:e7:67:8a:0b:1d:00: 85:64:fc:dc:6a:cf:85:fb:3c:42:1d:cd:b1:a4:20:d8: db:84:86:b7:3a:9b:d9:80:db:b1:66:fb:87:24:f8:e5: 4a:c1:b9:24:ad:0e:de:4b:ff:05:a2:ff:75:1f:b0:32: 24:b6:d8:87:1a:8c:d4:a7:d0:9c:8d:e4:79:5e:ba:f3: 21:9a:e8:79:bf:0d:35:09:ad:d2:93:f2:38:48:69:da: 22:58:7a:49:e4:ec:7a:80:fb:94:08:e6:08:68:ac:1b: bc:7c:57:4f:0d:fe:0c:15:a4:46:e0:7a:46:95:45:c5: ed:d8:a2:91:0b:f5:c3:f9:dd:3a:47:f7:ea:75:af:9f Fingerprint (SHA-256): 9A:D7:3B:3C:BC:25:66:C1:7A:4D:95:8F:78:36:01:84:C8:4D:21:30:C0:D9:08:AA:05:40:22:C4:83:EA:B3:E0 Fingerprint (SHA1): 0A:6C:6E:5C:C1:8C:0E:E5:B3:FA:19:89:3C:C6:0E:75:15:0C:D6:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152287 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152288 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152289 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018152290 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152291 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018152292 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018152293 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152287 (0x3cafc55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:26:06 2023 Not After : Wed Oct 18 15:26:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b7:25:a1:35:e2:64:11:4d:0a:86:ac:6e:07:f7:ec: 6e:fa:47:2e:08:e4:db:e6:e6:d2:b0:1f:73:57:1c:f5: 4a:f0:9c:db:16:a9:1c:10:db:93:50:12:fe:c4:0d:fb: 64:11:0e:34:0e:23:36:c8:cb:b3:2d:ae:7b:ca:d6:68: bc:1d:1e:54:c5:5c:e1:f7:f2:d6:c5:93:07:89:b0:df: c4:8d:4f:1a:6d:60:a4:7b:a6:81:61:fc:ce:24:d8:22: 38:4b:a7:38:73:2d:7c:53:b5:12:47:80:de:3f:b9:da: 35:94:91:1b:4e:b2:9e:0b:ea:90:09:12:e2:0d:2f:f2: 0b:48:49:e3:56:91:40:a6:9d:bf:c8:ba:b9:2d:a6:0e: 5a:97:ca:11:c9:9d:6f:7a:82:68:11:ed:ad:f4:47:c6: 25:20:9c:1e:b7:87:d4:3e:cd:a4:ba:a5:c8:f3:1b:ef: 44:dc:49:db:26:76:bb:4f:b8:ac:27:42:1b:91:d1:30: 46:70:5c:39:a8:ea:0b:fd:ae:99:87:0d:d9:5f:bc:7e: a7:82:df:39:3f:e7:9c:03:ef:b4:2f:b8:37:c3:ec:e4: 7d:34:4d:b5:39:e1:0a:7c:cf:5f:d4:05:a6:75:c5:b1: 90:63:be:1e:e7:c8:fb:47:79:f9:0d:c0:97:13:0b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:7a:00:6b:5d:fc:26:0d:ef:0d:c6:89:10:03:24:7d: 28:6b:8e:77:7a:e4:11:bb:96:47:f3:77:fd:ae:d9:07: 1a:28:0f:3d:3d:ae:9c:d4:ad:5d:f4:d1:b5:f9:5b:ba: 26:71:7a:d6:11:ab:fb:f6:6e:39:5b:dc:d9:7a:f9:a2: bf:6b:a5:5f:24:2a:b0:20:7f:81:c3:63:54:20:2f:27: 01:26:0a:9a:d9:34:16:39:db:34:ba:45:4e:a1:ef:36: 55:68:67:97:c0:c5:43:04:64:b1:24:79:c7:77:64:d5: 25:84:d0:f3:cd:1c:69:77:42:af:57:91:75:fd:3b:40: f0:4d:5f:c5:ae:2f:e7:15:dd:14:68:00:2f:49:dc:38: 43:6b:6f:2b:57:30:78:74:c1:e2:23:a1:cc:59:20:02: 76:7a:f5:ac:98:81:dc:4f:0b:eb:96:ba:1b:9f:74:7b: 28:31:db:be:1e:2c:ed:53:a6:28:ac:e6:41:48:c1:88: 69:56:9e:b4:7f:d6:92:e6:45:f7:48:7f:ae:dc:28:cb: 1f:9c:bd:76:56:73:49:91:10:b6:cf:14:b0:43:9f:72: 04:36:09:16:3a:b2:4c:7c:df:9e:7a:43:0c:13:59:47: eb:b2:26:22:bd:92:69:a0:0c:61:e1:f6:ce:19:e5:4d Fingerprint (SHA-256): 7A:B3:80:5F:42:B1:D3:10:4B:8D:1F:1D:47:0A:1E:8E:A5:6C:4D:A0:8F:42:D0:0B:51:7C:A1:94:A9:25:87:EA Fingerprint (SHA1): 8C:FB:BA:30:1E:2C:02:1E:F3:CE:BD:23:8E:6B:6E:3D:82:04:58:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152289 (0x3cafc561) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:26:09 2023 Not After : Wed Oct 18 15:26:09 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c9:ca:6e:c0:4a:32:be:7d:54:ab:2b:94:7f:7b:8d: 9d:57:17:47:40:66:23:5b:9e:9b:29:e3:38:9e:58:2c: 80:d5:1e:87:87:28:6b:e9:d0:af:f3:c6:8d:8d:b4:10: 4e:a6:46:c6:a4:0f:a2:d2:16:55:04:8c:20:c4:13:ef: 98:a4:c0:83:6b:bf:7f:56:64:08:93:b1:d1:68:75:96: 1c:b7:10:73:18:d8:3a:eb:04:80:2b:9a:a1:62:f3:2a: 48:aa:fd:7d:98:26:94:9b:9c:94:b9:1e:84:60:57:8e: c8:11:29:eb:8c:57:7a:0c:b3:77:46:7b:ce:fe:58:12: ba:34:e7:28:61:bc:6e:e2:ca:df:0c:74:bc:ca:9b:63: 09:9d:a6:d2:6d:35:a1:ef:f2:7e:c0:7b:1a:be:07:1e: d6:2a:16:b5:e6:f0:45:52:c0:75:3f:da:fa:8a:da:3b: 11:44:c0:c9:11:5d:61:a7:5c:9e:99:dc:c1:a7:0e:cd: 2b:7a:76:c3:ac:65:e2:de:22:c0:01:e8:48:ab:da:2a: cd:28:5c:96:e8:28:dc:8e:61:49:cd:fc:13:98:d5:5b: 8b:36:b1:11:b3:c9:f9:68:42:94:d2:b3:d5:25:f7:46: 04:a4:31:ba:6a:fd:fb:15:e2:38:b1:08:dd:b6:28:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:98:32:b3:55:44:2f:b1:ae:b2:b3:4e:13:e7:bf:22: 57:a6:e0:fe:5c:ad:c0:99:a9:08:cf:e3:30:8f:5e:9e: 6c:32:b7:70:58:a6:3e:74:b7:70:55:bd:24:26:5b:6e: 42:ec:f2:f6:84:2e:c0:6c:a6:b6:7e:b4:08:f5:ef:32: 45:8f:83:97:8e:9a:52:92:65:c1:16:58:c3:14:9a:44: 8f:79:af:ac:d6:89:bc:e0:70:04:96:d7:61:15:18:aa: 48:27:23:2c:e7:87:e0:bd:85:09:10:85:56:ea:52:26: 41:e7:0d:25:c6:8b:4b:49:7c:0a:9b:97:72:ba:03:79: 79:ce:fc:26:6b:bf:5a:01:dd:5f:d0:7e:93:47:27:99: 2b:22:6d:c6:d5:b2:a2:c1:3a:57:3f:73:a8:ef:79:98: fc:45:68:24:32:9c:94:6c:3c:e1:2d:31:a6:f1:a6:30: f7:05:11:f6:69:e1:6d:52:9d:43:15:2a:e3:ce:d2:ff: fd:d2:c9:07:f0:fa:a3:3c:bd:35:e0:e2:74:53:3c:df: ed:8c:a9:9c:79:74:fb:e3:3a:3b:87:57:b2:22:99:73: ed:e8:bf:d4:57:0d:aa:33:b3:08:12:bf:47:f6:1a:3a: a7:74:69:77:a2:c4:8f:fd:a9:6c:4b:12:d8:92:3d:73 Fingerprint (SHA-256): 90:A7:CC:6F:4F:9A:FC:BA:0A:DF:7A:98:56:05:6B:1C:3A:CA:46:CD:7F:A5:44:D4:7A:67:15:5D:97:BE:87:F4 Fingerprint (SHA1): 39:56:85:D9:DA:C9:7A:15:91:DB:40:9A:7D:12:3A:21:69:7F:80:48 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152287 (0x3cafc55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:26:06 2023 Not After : Wed Oct 18 15:26:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b7:25:a1:35:e2:64:11:4d:0a:86:ac:6e:07:f7:ec: 6e:fa:47:2e:08:e4:db:e6:e6:d2:b0:1f:73:57:1c:f5: 4a:f0:9c:db:16:a9:1c:10:db:93:50:12:fe:c4:0d:fb: 64:11:0e:34:0e:23:36:c8:cb:b3:2d:ae:7b:ca:d6:68: bc:1d:1e:54:c5:5c:e1:f7:f2:d6:c5:93:07:89:b0:df: c4:8d:4f:1a:6d:60:a4:7b:a6:81:61:fc:ce:24:d8:22: 38:4b:a7:38:73:2d:7c:53:b5:12:47:80:de:3f:b9:da: 35:94:91:1b:4e:b2:9e:0b:ea:90:09:12:e2:0d:2f:f2: 0b:48:49:e3:56:91:40:a6:9d:bf:c8:ba:b9:2d:a6:0e: 5a:97:ca:11:c9:9d:6f:7a:82:68:11:ed:ad:f4:47:c6: 25:20:9c:1e:b7:87:d4:3e:cd:a4:ba:a5:c8:f3:1b:ef: 44:dc:49:db:26:76:bb:4f:b8:ac:27:42:1b:91:d1:30: 46:70:5c:39:a8:ea:0b:fd:ae:99:87:0d:d9:5f:bc:7e: a7:82:df:39:3f:e7:9c:03:ef:b4:2f:b8:37:c3:ec:e4: 7d:34:4d:b5:39:e1:0a:7c:cf:5f:d4:05:a6:75:c5:b1: 90:63:be:1e:e7:c8:fb:47:79:f9:0d:c0:97:13:0b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:7a:00:6b:5d:fc:26:0d:ef:0d:c6:89:10:03:24:7d: 28:6b:8e:77:7a:e4:11:bb:96:47:f3:77:fd:ae:d9:07: 1a:28:0f:3d:3d:ae:9c:d4:ad:5d:f4:d1:b5:f9:5b:ba: 26:71:7a:d6:11:ab:fb:f6:6e:39:5b:dc:d9:7a:f9:a2: bf:6b:a5:5f:24:2a:b0:20:7f:81:c3:63:54:20:2f:27: 01:26:0a:9a:d9:34:16:39:db:34:ba:45:4e:a1:ef:36: 55:68:67:97:c0:c5:43:04:64:b1:24:79:c7:77:64:d5: 25:84:d0:f3:cd:1c:69:77:42:af:57:91:75:fd:3b:40: f0:4d:5f:c5:ae:2f:e7:15:dd:14:68:00:2f:49:dc:38: 43:6b:6f:2b:57:30:78:74:c1:e2:23:a1:cc:59:20:02: 76:7a:f5:ac:98:81:dc:4f:0b:eb:96:ba:1b:9f:74:7b: 28:31:db:be:1e:2c:ed:53:a6:28:ac:e6:41:48:c1:88: 69:56:9e:b4:7f:d6:92:e6:45:f7:48:7f:ae:dc:28:cb: 1f:9c:bd:76:56:73:49:91:10:b6:cf:14:b0:43:9f:72: 04:36:09:16:3a:b2:4c:7c:df:9e:7a:43:0c:13:59:47: eb:b2:26:22:bd:92:69:a0:0c:61:e1:f6:ce:19:e5:4d Fingerprint (SHA-256): 7A:B3:80:5F:42:B1:D3:10:4B:8D:1F:1D:47:0A:1E:8E:A5:6C:4D:A0:8F:42:D0:0B:51:7C:A1:94:A9:25:87:EA Fingerprint (SHA1): 8C:FB:BA:30:1E:2C:02:1E:F3:CE:BD:23:8E:6B:6E:3D:82:04:58:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152287 (0x3cafc55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:26:06 2023 Not After : Wed Oct 18 15:26:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b7:25:a1:35:e2:64:11:4d:0a:86:ac:6e:07:f7:ec: 6e:fa:47:2e:08:e4:db:e6:e6:d2:b0:1f:73:57:1c:f5: 4a:f0:9c:db:16:a9:1c:10:db:93:50:12:fe:c4:0d:fb: 64:11:0e:34:0e:23:36:c8:cb:b3:2d:ae:7b:ca:d6:68: bc:1d:1e:54:c5:5c:e1:f7:f2:d6:c5:93:07:89:b0:df: c4:8d:4f:1a:6d:60:a4:7b:a6:81:61:fc:ce:24:d8:22: 38:4b:a7:38:73:2d:7c:53:b5:12:47:80:de:3f:b9:da: 35:94:91:1b:4e:b2:9e:0b:ea:90:09:12:e2:0d:2f:f2: 0b:48:49:e3:56:91:40:a6:9d:bf:c8:ba:b9:2d:a6:0e: 5a:97:ca:11:c9:9d:6f:7a:82:68:11:ed:ad:f4:47:c6: 25:20:9c:1e:b7:87:d4:3e:cd:a4:ba:a5:c8:f3:1b:ef: 44:dc:49:db:26:76:bb:4f:b8:ac:27:42:1b:91:d1:30: 46:70:5c:39:a8:ea:0b:fd:ae:99:87:0d:d9:5f:bc:7e: a7:82:df:39:3f:e7:9c:03:ef:b4:2f:b8:37:c3:ec:e4: 7d:34:4d:b5:39:e1:0a:7c:cf:5f:d4:05:a6:75:c5:b1: 90:63:be:1e:e7:c8:fb:47:79:f9:0d:c0:97:13:0b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:7a:00:6b:5d:fc:26:0d:ef:0d:c6:89:10:03:24:7d: 28:6b:8e:77:7a:e4:11:bb:96:47:f3:77:fd:ae:d9:07: 1a:28:0f:3d:3d:ae:9c:d4:ad:5d:f4:d1:b5:f9:5b:ba: 26:71:7a:d6:11:ab:fb:f6:6e:39:5b:dc:d9:7a:f9:a2: bf:6b:a5:5f:24:2a:b0:20:7f:81:c3:63:54:20:2f:27: 01:26:0a:9a:d9:34:16:39:db:34:ba:45:4e:a1:ef:36: 55:68:67:97:c0:c5:43:04:64:b1:24:79:c7:77:64:d5: 25:84:d0:f3:cd:1c:69:77:42:af:57:91:75:fd:3b:40: f0:4d:5f:c5:ae:2f:e7:15:dd:14:68:00:2f:49:dc:38: 43:6b:6f:2b:57:30:78:74:c1:e2:23:a1:cc:59:20:02: 76:7a:f5:ac:98:81:dc:4f:0b:eb:96:ba:1b:9f:74:7b: 28:31:db:be:1e:2c:ed:53:a6:28:ac:e6:41:48:c1:88: 69:56:9e:b4:7f:d6:92:e6:45:f7:48:7f:ae:dc:28:cb: 1f:9c:bd:76:56:73:49:91:10:b6:cf:14:b0:43:9f:72: 04:36:09:16:3a:b2:4c:7c:df:9e:7a:43:0c:13:59:47: eb:b2:26:22:bd:92:69:a0:0c:61:e1:f6:ce:19:e5:4d Fingerprint (SHA-256): 7A:B3:80:5F:42:B1:D3:10:4B:8D:1F:1D:47:0A:1E:8E:A5:6C:4D:A0:8F:42:D0:0B:51:7C:A1:94:A9:25:87:EA Fingerprint (SHA1): 8C:FB:BA:30:1E:2C:02:1E:F3:CE:BD:23:8E:6B:6E:3D:82:04:58:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152289 (0x3cafc561) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:26:09 2023 Not After : Wed Oct 18 15:26:09 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c9:ca:6e:c0:4a:32:be:7d:54:ab:2b:94:7f:7b:8d: 9d:57:17:47:40:66:23:5b:9e:9b:29:e3:38:9e:58:2c: 80:d5:1e:87:87:28:6b:e9:d0:af:f3:c6:8d:8d:b4:10: 4e:a6:46:c6:a4:0f:a2:d2:16:55:04:8c:20:c4:13:ef: 98:a4:c0:83:6b:bf:7f:56:64:08:93:b1:d1:68:75:96: 1c:b7:10:73:18:d8:3a:eb:04:80:2b:9a:a1:62:f3:2a: 48:aa:fd:7d:98:26:94:9b:9c:94:b9:1e:84:60:57:8e: c8:11:29:eb:8c:57:7a:0c:b3:77:46:7b:ce:fe:58:12: ba:34:e7:28:61:bc:6e:e2:ca:df:0c:74:bc:ca:9b:63: 09:9d:a6:d2:6d:35:a1:ef:f2:7e:c0:7b:1a:be:07:1e: d6:2a:16:b5:e6:f0:45:52:c0:75:3f:da:fa:8a:da:3b: 11:44:c0:c9:11:5d:61:a7:5c:9e:99:dc:c1:a7:0e:cd: 2b:7a:76:c3:ac:65:e2:de:22:c0:01:e8:48:ab:da:2a: cd:28:5c:96:e8:28:dc:8e:61:49:cd:fc:13:98:d5:5b: 8b:36:b1:11:b3:c9:f9:68:42:94:d2:b3:d5:25:f7:46: 04:a4:31:ba:6a:fd:fb:15:e2:38:b1:08:dd:b6:28:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:98:32:b3:55:44:2f:b1:ae:b2:b3:4e:13:e7:bf:22: 57:a6:e0:fe:5c:ad:c0:99:a9:08:cf:e3:30:8f:5e:9e: 6c:32:b7:70:58:a6:3e:74:b7:70:55:bd:24:26:5b:6e: 42:ec:f2:f6:84:2e:c0:6c:a6:b6:7e:b4:08:f5:ef:32: 45:8f:83:97:8e:9a:52:92:65:c1:16:58:c3:14:9a:44: 8f:79:af:ac:d6:89:bc:e0:70:04:96:d7:61:15:18:aa: 48:27:23:2c:e7:87:e0:bd:85:09:10:85:56:ea:52:26: 41:e7:0d:25:c6:8b:4b:49:7c:0a:9b:97:72:ba:03:79: 79:ce:fc:26:6b:bf:5a:01:dd:5f:d0:7e:93:47:27:99: 2b:22:6d:c6:d5:b2:a2:c1:3a:57:3f:73:a8:ef:79:98: fc:45:68:24:32:9c:94:6c:3c:e1:2d:31:a6:f1:a6:30: f7:05:11:f6:69:e1:6d:52:9d:43:15:2a:e3:ce:d2:ff: fd:d2:c9:07:f0:fa:a3:3c:bd:35:e0:e2:74:53:3c:df: ed:8c:a9:9c:79:74:fb:e3:3a:3b:87:57:b2:22:99:73: ed:e8:bf:d4:57:0d:aa:33:b3:08:12:bf:47:f6:1a:3a: a7:74:69:77:a2:c4:8f:fd:a9:6c:4b:12:d8:92:3d:73 Fingerprint (SHA-256): 90:A7:CC:6F:4F:9A:FC:BA:0A:DF:7A:98:56:05:6B:1C:3A:CA:46:CD:7F:A5:44:D4:7A:67:15:5D:97:BE:87:F4 Fingerprint (SHA1): 39:56:85:D9:DA:C9:7A:15:91:DB:40:9A:7D:12:3A:21:69:7F:80:48 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152287 (0x3cafc55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:26:06 2023 Not After : Wed Oct 18 15:26:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b7:25:a1:35:e2:64:11:4d:0a:86:ac:6e:07:f7:ec: 6e:fa:47:2e:08:e4:db:e6:e6:d2:b0:1f:73:57:1c:f5: 4a:f0:9c:db:16:a9:1c:10:db:93:50:12:fe:c4:0d:fb: 64:11:0e:34:0e:23:36:c8:cb:b3:2d:ae:7b:ca:d6:68: bc:1d:1e:54:c5:5c:e1:f7:f2:d6:c5:93:07:89:b0:df: c4:8d:4f:1a:6d:60:a4:7b:a6:81:61:fc:ce:24:d8:22: 38:4b:a7:38:73:2d:7c:53:b5:12:47:80:de:3f:b9:da: 35:94:91:1b:4e:b2:9e:0b:ea:90:09:12:e2:0d:2f:f2: 0b:48:49:e3:56:91:40:a6:9d:bf:c8:ba:b9:2d:a6:0e: 5a:97:ca:11:c9:9d:6f:7a:82:68:11:ed:ad:f4:47:c6: 25:20:9c:1e:b7:87:d4:3e:cd:a4:ba:a5:c8:f3:1b:ef: 44:dc:49:db:26:76:bb:4f:b8:ac:27:42:1b:91:d1:30: 46:70:5c:39:a8:ea:0b:fd:ae:99:87:0d:d9:5f:bc:7e: a7:82:df:39:3f:e7:9c:03:ef:b4:2f:b8:37:c3:ec:e4: 7d:34:4d:b5:39:e1:0a:7c:cf:5f:d4:05:a6:75:c5:b1: 90:63:be:1e:e7:c8:fb:47:79:f9:0d:c0:97:13:0b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:7a:00:6b:5d:fc:26:0d:ef:0d:c6:89:10:03:24:7d: 28:6b:8e:77:7a:e4:11:bb:96:47:f3:77:fd:ae:d9:07: 1a:28:0f:3d:3d:ae:9c:d4:ad:5d:f4:d1:b5:f9:5b:ba: 26:71:7a:d6:11:ab:fb:f6:6e:39:5b:dc:d9:7a:f9:a2: bf:6b:a5:5f:24:2a:b0:20:7f:81:c3:63:54:20:2f:27: 01:26:0a:9a:d9:34:16:39:db:34:ba:45:4e:a1:ef:36: 55:68:67:97:c0:c5:43:04:64:b1:24:79:c7:77:64:d5: 25:84:d0:f3:cd:1c:69:77:42:af:57:91:75:fd:3b:40: f0:4d:5f:c5:ae:2f:e7:15:dd:14:68:00:2f:49:dc:38: 43:6b:6f:2b:57:30:78:74:c1:e2:23:a1:cc:59:20:02: 76:7a:f5:ac:98:81:dc:4f:0b:eb:96:ba:1b:9f:74:7b: 28:31:db:be:1e:2c:ed:53:a6:28:ac:e6:41:48:c1:88: 69:56:9e:b4:7f:d6:92:e6:45:f7:48:7f:ae:dc:28:cb: 1f:9c:bd:76:56:73:49:91:10:b6:cf:14:b0:43:9f:72: 04:36:09:16:3a:b2:4c:7c:df:9e:7a:43:0c:13:59:47: eb:b2:26:22:bd:92:69:a0:0c:61:e1:f6:ce:19:e5:4d Fingerprint (SHA-256): 7A:B3:80:5F:42:B1:D3:10:4B:8D:1F:1D:47:0A:1E:8E:A5:6C:4D:A0:8F:42:D0:0B:51:7C:A1:94:A9:25:87:EA Fingerprint (SHA1): 8C:FB:BA:30:1E:2C:02:1E:F3:CE:BD:23:8E:6B:6E:3D:82:04:58:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152291 (0x3cafc563) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 15:26:11 2023 Not After : Wed Oct 18 15:26:11 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:28:b6:95:9f:b2:93:3a:34:90:a8:33:25:d7:0c:d5: 4f:5d:b4:39:ee:ed:9b:e6:53:af:db:e1:a8:d6:22:f8: 00:e2:34:c9:69:78:d5:f3:8c:4c:c8:d1:34:20:34:6f: b7:c8:a5:07:69:84:9f:97:78:4d:e2:5c:c8:ac:71:e6: 54:40:13:4f:71:6b:45:94:30:36:04:e6:83:4a:10:17: 53:ec:12:88:07:ca:a6:c2:60:cc:d0:5a:c3:e1:25:bf: a3:f1:d5:48:48:e7:31:47:09:6b:d6:82:f2:25:4d:76: 66:51:59:56:48:64:8a:68:bf:24:76:a1:09:22:b6:38: b5:2f:eb:69:f3:df:4f:2d:61:03:80:d6:e5:99:4b:eb: 0f:29:e1:f9:c8:75:94:34:d9:15:40:76:e9:03:14:36: 8d:5c:c2:20:02:08:74:4b:06:06:97:69:1f:e5:d1:c0: 49:90:ae:7f:76:00:e3:47:8d:04:3a:4f:dc:c0:1d:87: ec:6e:2b:05:bd:5b:1c:d4:2d:0a:5b:c2:ae:b2:7a:83: a8:cf:47:a1:a4:61:ec:14:df:af:65:29:f3:02:c0:a5: 46:65:f8:1b:9b:60:4c:f3:7c:19:c4:5a:05:81:95:ab: 5b:50:ae:32:ca:0b:e8:ad:75:37:bc:7e:80:44:56:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:5c:4e:a6:8f:c2:fa:a5:29:20:19:b2:d2:ca:7b:1d: f1:f8:03:d9:b3:f1:12:46:b2:b8:82:d9:3a:26:7e:56: 8c:1a:5d:6f:67:17:21:d1:c4:a4:88:48:bb:91:fc:f6: d1:7a:b0:03:2e:56:2a:b2:26:9d:c4:43:d5:49:c5:79: a0:91:59:4c:a8:53:b0:51:ff:d1:24:1d:2d:36:40:6c: e1:ee:cb:b9:da:a1:9e:3a:1d:a5:23:9d:95:2a:bf:52: 91:d2:48:b1:9a:91:92:3b:5c:6f:27:6b:d1:65:52:75: ac:b2:8e:83:0f:28:93:48:19:be:88:fb:a7:7e:fa:84: c5:65:25:a0:32:b2:d3:26:1e:2e:b8:94:32:ad:d9:7f: 31:a6:d2:f1:26:f1:5a:2e:bf:28:b6:1c:c5:fc:9c:c2: 40:58:27:e0:65:a9:53:45:f5:43:a9:00:51:b1:35:f4: 1b:d7:39:6a:04:c7:c9:37:47:af:a2:c1:81:15:29:f3: fa:b4:7e:e7:9a:dc:40:f9:24:d3:33:21:85:f3:f6:40: 14:18:56:63:85:25:1e:8e:2e:9e:36:85:b7:cb:93:c0: 39:0a:dc:cb:9c:c7:6d:b2:02:a3:0b:c8:8c:dc:33:de: ad:7e:e8:85:84:9e:11:81:f5:78:78:0a:f8:23:e1:83 Fingerprint (SHA-256): CD:7C:29:C5:BF:10:BD:C5:B4:A0:8A:E4:D7:2D:CB:1F:EE:E4:D5:2E:91:03:27:B9:31:0F:4B:BA:51:B7:AA:E6 Fingerprint (SHA1): 2B:9C:F2:E3:5E:C9:31:07:1C:42:EF:12:05:42:1E:FE:C1:95:07:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152287 (0x3cafc55f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:26:06 2023 Not After : Wed Oct 18 15:26:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:b7:25:a1:35:e2:64:11:4d:0a:86:ac:6e:07:f7:ec: 6e:fa:47:2e:08:e4:db:e6:e6:d2:b0:1f:73:57:1c:f5: 4a:f0:9c:db:16:a9:1c:10:db:93:50:12:fe:c4:0d:fb: 64:11:0e:34:0e:23:36:c8:cb:b3:2d:ae:7b:ca:d6:68: bc:1d:1e:54:c5:5c:e1:f7:f2:d6:c5:93:07:89:b0:df: c4:8d:4f:1a:6d:60:a4:7b:a6:81:61:fc:ce:24:d8:22: 38:4b:a7:38:73:2d:7c:53:b5:12:47:80:de:3f:b9:da: 35:94:91:1b:4e:b2:9e:0b:ea:90:09:12:e2:0d:2f:f2: 0b:48:49:e3:56:91:40:a6:9d:bf:c8:ba:b9:2d:a6:0e: 5a:97:ca:11:c9:9d:6f:7a:82:68:11:ed:ad:f4:47:c6: 25:20:9c:1e:b7:87:d4:3e:cd:a4:ba:a5:c8:f3:1b:ef: 44:dc:49:db:26:76:bb:4f:b8:ac:27:42:1b:91:d1:30: 46:70:5c:39:a8:ea:0b:fd:ae:99:87:0d:d9:5f:bc:7e: a7:82:df:39:3f:e7:9c:03:ef:b4:2f:b8:37:c3:ec:e4: 7d:34:4d:b5:39:e1:0a:7c:cf:5f:d4:05:a6:75:c5:b1: 90:63:be:1e:e7:c8:fb:47:79:f9:0d:c0:97:13:0b:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:7a:00:6b:5d:fc:26:0d:ef:0d:c6:89:10:03:24:7d: 28:6b:8e:77:7a:e4:11:bb:96:47:f3:77:fd:ae:d9:07: 1a:28:0f:3d:3d:ae:9c:d4:ad:5d:f4:d1:b5:f9:5b:ba: 26:71:7a:d6:11:ab:fb:f6:6e:39:5b:dc:d9:7a:f9:a2: bf:6b:a5:5f:24:2a:b0:20:7f:81:c3:63:54:20:2f:27: 01:26:0a:9a:d9:34:16:39:db:34:ba:45:4e:a1:ef:36: 55:68:67:97:c0:c5:43:04:64:b1:24:79:c7:77:64:d5: 25:84:d0:f3:cd:1c:69:77:42:af:57:91:75:fd:3b:40: f0:4d:5f:c5:ae:2f:e7:15:dd:14:68:00:2f:49:dc:38: 43:6b:6f:2b:57:30:78:74:c1:e2:23:a1:cc:59:20:02: 76:7a:f5:ac:98:81:dc:4f:0b:eb:96:ba:1b:9f:74:7b: 28:31:db:be:1e:2c:ed:53:a6:28:ac:e6:41:48:c1:88: 69:56:9e:b4:7f:d6:92:e6:45:f7:48:7f:ae:dc:28:cb: 1f:9c:bd:76:56:73:49:91:10:b6:cf:14:b0:43:9f:72: 04:36:09:16:3a:b2:4c:7c:df:9e:7a:43:0c:13:59:47: eb:b2:26:22:bd:92:69:a0:0c:61:e1:f6:ce:19:e5:4d Fingerprint (SHA-256): 7A:B3:80:5F:42:B1:D3:10:4B:8D:1F:1D:47:0A:1E:8E:A5:6C:4D:A0:8F:42:D0:0B:51:7C:A1:94:A9:25:87:EA Fingerprint (SHA1): 8C:FB:BA:30:1E:2C:02:1E:F3:CE:BD:23:8E:6B:6E:3D:82:04:58:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152292 (0x3cafc564) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 15:26:12 2023 Not After : Wed Oct 18 15:26:12 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:fd:b3:30:a1:80:0a:d0:b6:bd:96:99:67:80:3f:de: 4c:b6:d3:d1:b7:97:f1:0e:c0:1d:17:39:48:0f:91:90: d7:a1:a4:f0:a0:d0:07:6d:f4:3c:a1:4f:78:bd:bd:42: d5:e0:d9:3a:92:46:99:93:da:3c:e3:94:8f:01:17:6b: 64:96:c2:ca:38:c3:d1:7a:aa:c1:d5:94:e1:d0:50:9e: 88:91:d0:7f:5c:27:44:d0:d6:0e:98:86:04:41:64:96: f2:7a:2d:58:1a:93:29:93:d3:33:e1:e7:6c:cd:eb:2a: 5a:00:87:19:82:3a:ea:97:17:8b:27:76:43:b9:69:d2: 3d:73:6f:72:5c:20:66:a6:46:39:f4:5d:af:be:92:ed: 2e:c7:c0:75:55:d9:82:6d:6a:c6:52:8d:c5:85:c3:e1: a9:44:3f:de:a7:9f:18:c5:51:e5:07:7d:f6:28:d5:cf: ea:4e:d3:c5:da:1e:5d:47:4d:8e:fe:80:e0:44:9a:63: 02:4e:b3:61:d5:90:91:09:e8:39:39:11:a8:1b:ee:10: 22:8b:f7:8d:62:43:0f:32:67:58:6b:10:b5:4b:32:d5: fc:ef:aa:48:a0:51:87:ca:1d:fd:63:80:1d:8d:9f:4f: 8a:9f:69:49:19:4a:97:9a:7f:a2:27:86:6c:b6:16:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:28:8f:51:b1:17:11:1e:80:26:44:ef:54:cb:a9:80: 67:fa:e2:30:d3:33:1d:0b:58:44:66:b7:e1:f2:d4:97: 77:81:e4:f6:66:b4:86:dc:08:19:92:43:f0:ae:d1:f5: 33:d0:1a:98:48:fe:cb:ed:d8:63:e1:c1:2a:4a:9b:6b: 1a:e2:ad:ea:0c:04:ca:b8:23:bd:f0:a0:26:3f:28:88: a0:fb:d6:55:52:ed:79:89:25:30:6c:dc:78:40:15:f1: 6f:36:08:ba:7f:44:c3:89:b3:b3:24:ae:c1:19:b3:2c: 37:3a:de:3c:e8:ea:9e:a4:6d:67:77:ef:1c:3b:4e:01: 74:51:1c:ce:e0:05:8a:29:cb:ad:8a:86:2a:ca:2e:8f: 7a:37:26:f0:16:7e:17:d2:fa:0c:da:8c:39:d1:4c:e3: 10:5e:ff:63:14:3a:33:75:7b:54:5c:0b:99:31:c8:4a: 96:87:eb:c8:5d:9e:65:fe:06:2b:57:af:f8:93:fe:47: 74:88:23:33:55:1a:5b:fb:01:34:28:c0:71:ee:85:cf: ef:f5:f1:40:92:ea:9d:9d:58:a5:e0:24:86:cb:7e:5f: f4:ad:d2:e0:83:9a:03:07:d1:eb:8d:62:e6:a0:6e:ce: 36:23:e8:7f:02:fd:61:3b:06:61:0a:7d:24:f2:64:fe Fingerprint (SHA-256): 17:86:37:16:7F:A9:82:23:2A:3A:88:5E:57:31:D6:A0:D5:1B:91:5B:28:CA:C9:00:6D:19:1D:D5:9C:8B:6E:75 Fingerprint (SHA1): 9E:50:05:A6:BD:CF:FE:76:E2:9B:82:83:34:19:1A:89:0D:6F:D5:7B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 10264 at Wed Oct 18 15:26:22 UTC 2023 kill -USR1 10264 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 10264 killed at Wed Oct 18 15:26:22 UTC 2023 httpserv starting at Wed Oct 18 15:26:22 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 15:26:22 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 22542 >/dev/null 2>/dev/null httpserv with PID 22542 found at Wed Oct 18 15:26:22 UTC 2023 httpserv with PID 22542 started at Wed Oct 18 15:26:22 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152294 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152295 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152296 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152297 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018152298 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152295 (0x3cafc567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:26:26 2023 Not After : Wed Oct 18 15:26:26 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:86:e4:3b:50:fe:83:85:07:5c:18:4e:94:b9:cb:40: 11:32:10:ed:f4:7f:22:d6:e4:5e:8f:b6:6f:29:22:6a: fa:b8:4a:b9:a4:ff:37:2d:ca:56:ca:d2:92:e5:24:6b: 06:20:23:a5:6b:ab:72:22:59:70:6a:79:8e:bd:a5:ca: 9d:de:29:1a:52:22:16:51:5c:b6:87:ac:c5:3f:75:67: 5a:9a:b4:8d:c2:9e:16:1d:f4:93:90:f9:6f:9a:09:0f: fa:b7:ba:28:1c:71:2c:87:6d:b7:bd:6b:23:84:b6:2f: ec:dc:1d:cc:1d:75:c5:83:66:a2:ce:88:f2:95:9b:44: 7d:6d:a8:f3:ca:1a:0e:87:96:4a:65:13:90:05:39:03: 2f:ea:d3:f3:7a:20:d5:a9:de:da:e9:20:54:14:7f:8f: 94:1b:53:f5:91:50:ae:03:34:f2:b6:ea:a8:28:4a:c8: e0:4b:38:2d:1c:bb:b1:d5:8a:03:b6:16:c5:e7:68:f7: 83:33:68:f9:1f:2b:06:9c:7a:e5:67:79:c0:f2:ff:c9: 85:cd:95:61:36:1a:06:88:1b:6c:52:1c:46:5c:f2:d4: 69:04:f4:ad:be:28:19:1b:38:ec:87:77:ef:79:83:06: d1:39:f7:0d:6f:02:73:57:1e:1d:87:9b:eb:b8:3e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:9f:79:bf:08:3f:69:00:a5:2c:bb:e2:3b:bb:04:34: 91:bc:a8:8a:98:8b:44:39:eb:1b:6c:5d:77:ef:96:e6: 4d:f8:69:82:27:b4:eb:13:ff:57:90:58:8f:0f:b6:33: d4:96:fd:b3:03:e4:52:fd:e3:93:12:7e:d5:80:05:af: c2:92:25:df:80:51:42:19:42:52:11:5e:b7:04:95:76: 97:4a:13:bb:d8:19:41:09:db:ca:0e:7d:d3:26:d8:c1: 1d:ea:53:9a:54:7e:74:d1:af:6e:e7:4f:25:e5:46:d4: 6c:0b:b2:9b:4e:10:36:27:a9:88:ef:08:b2:f5:ee:01: cc:db:25:6e:51:8c:d9:96:fa:18:0d:45:a2:f7:ee:7a: 48:72:3d:fd:f8:76:98:8d:69:4d:3e:60:ff:f6:86:54: fc:61:ee:3d:f6:97:7e:73:5f:5e:c4:af:4a:43:a6:aa: a6:ee:f7:af:3f:bb:bd:77:a3:45:eb:42:86:10:af:18: 54:65:e7:6d:82:7e:dd:85:48:30:ae:92:17:bc:09:31: 9c:cf:cb:5d:70:a0:e4:01:fa:b7:27:1f:29:2a:92:4e: 9c:f0:1b:e6:2e:67:60:b6:2a:2c:bb:84:14:32:cd:ef: 2a:e1:76:49:b9:2b:b1:2d:a4:aa:75:db:bc:ab:ca:5e Fingerprint (SHA-256): FC:95:31:9C:06:65:31:FE:B9:A7:6D:A9:51:99:B9:1B:2A:2E:2B:B3:F3:DB:C7:06:12:91:80:0B:4A:87:32:A2 Fingerprint (SHA1): 63:8B:11:F4:E5:B2:47:B1:26:C9:B3:9C:17:91:A5:64:C8:2A:2B:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152294 (0x3cafc566) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:26:24 2023 Not After : Wed Oct 18 15:26:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:77:f7:78:3d:8f:e1:44:00:f8:b7:77:8f:e3:f7:57: 0b:98:ed:ce:f0:fc:a4:4a:3f:3a:d0:d1:5e:b5:7c:ff: 7f:11:9b:fd:ff:01:be:79:19:ed:d4:a3:33:23:1b:d8: 32:27:8f:04:25:0d:75:83:76:1c:f4:75:25:8c:9d:83: ff:63:50:d9:59:8f:da:7e:0d:3b:f7:4f:2b:b2:5e:1d: 69:02:d3:bf:6a:34:c3:61:42:ea:b2:5e:32:98:93:e9: 71:89:9e:e4:da:e6:d3:d7:e2:7a:06:aa:4f:09:58:87: 48:74:20:79:57:3e:4c:f2:18:a6:84:3d:12:8d:84:a8: 73:5a:fa:77:e0:d8:84:3f:fd:6a:ec:99:f5:7a:9b:97: 54:d4:f4:96:fc:93:64:92:c7:52:d9:07:1e:5a:3c:12: 64:bc:39:0c:9f:f1:bd:67:fa:59:d2:88:1e:93:25:a3: 98:2b:9e:92:f7:23:8b:ae:21:85:ea:e8:a8:92:93:04: 5f:ec:e6:fe:25:33:95:d8:b1:57:81:91:8e:65:1c:b6: 2f:b4:02:98:fc:d0:58:04:50:4e:1a:07:22:da:c4:c2: 9c:fd:fb:86:01:92:ae:33:1b:38:66:7d:87:db:72:4c: 69:68:3a:5f:48:6a:de:b0:8c:79:29:40:74:1e:99:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:66:af:30:6d:34:de:02:fb:3e:1a:42:79:3b:df:c1: 7c:72:36:41:57:d7:7d:6f:ca:73:8e:66:5b:fc:b9:25: ac:40:44:e9:48:39:3f:65:3a:8e:61:e5:6c:6e:31:84: 4a:8d:cf:2a:34:ef:df:8b:74:da:34:5c:b0:d6:e6:3b: e9:8e:42:72:9a:b6:78:2f:28:ba:14:a1:31:69:dd:43: a8:bd:27:77:a6:2f:d7:f7:af:35:fc:6f:94:90:a7:9c: c1:77:e0:4d:4d:4e:87:79:f3:7b:9d:bd:61:47:77:cc: a8:a5:33:39:99:e6:3d:00:1c:64:18:08:21:4a:f1:9c: 48:17:a6:d8:c9:78:ab:b8:3a:ee:39:f4:6a:77:b0:83: 42:3f:0f:5e:c5:49:66:b2:c7:31:1d:31:7f:89:d4:6a: 54:16:40:1f:43:9b:f0:b1:7a:db:82:78:34:35:05:0d: 6b:54:d6:85:50:c3:45:40:39:55:2b:c8:52:a7:b3:86: 3b:9d:65:d1:10:3e:b3:8f:3a:6d:e3:08:b3:92:ee:d2: d2:82:7a:89:49:7e:78:35:26:eb:a3:19:a4:31:31:09: 97:21:ff:57:63:0e:be:15:44:6d:b4:d6:ca:1b:39:53: 16:e7:40:68:d8:d1:35:24:ff:dd:b7:42:0b:16:17:70 Fingerprint (SHA-256): 2C:10:0A:98:64:64:71:FD:94:58:98:C4:F8:56:D4:62:CC:EB:9B:93:B6:97:F4:88:0C:CE:01:77:5E:47:0D:EB Fingerprint (SHA1): FE:07:34:FD:10:0F:D5:BA:A9:A1:99:C2:99:9D:31:F7:83:1E:90:04 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152294 (0x3cafc566) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:26:24 2023 Not After : Wed Oct 18 15:26:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:77:f7:78:3d:8f:e1:44:00:f8:b7:77:8f:e3:f7:57: 0b:98:ed:ce:f0:fc:a4:4a:3f:3a:d0:d1:5e:b5:7c:ff: 7f:11:9b:fd:ff:01:be:79:19:ed:d4:a3:33:23:1b:d8: 32:27:8f:04:25:0d:75:83:76:1c:f4:75:25:8c:9d:83: ff:63:50:d9:59:8f:da:7e:0d:3b:f7:4f:2b:b2:5e:1d: 69:02:d3:bf:6a:34:c3:61:42:ea:b2:5e:32:98:93:e9: 71:89:9e:e4:da:e6:d3:d7:e2:7a:06:aa:4f:09:58:87: 48:74:20:79:57:3e:4c:f2:18:a6:84:3d:12:8d:84:a8: 73:5a:fa:77:e0:d8:84:3f:fd:6a:ec:99:f5:7a:9b:97: 54:d4:f4:96:fc:93:64:92:c7:52:d9:07:1e:5a:3c:12: 64:bc:39:0c:9f:f1:bd:67:fa:59:d2:88:1e:93:25:a3: 98:2b:9e:92:f7:23:8b:ae:21:85:ea:e8:a8:92:93:04: 5f:ec:e6:fe:25:33:95:d8:b1:57:81:91:8e:65:1c:b6: 2f:b4:02:98:fc:d0:58:04:50:4e:1a:07:22:da:c4:c2: 9c:fd:fb:86:01:92:ae:33:1b:38:66:7d:87:db:72:4c: 69:68:3a:5f:48:6a:de:b0:8c:79:29:40:74:1e:99:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:66:af:30:6d:34:de:02:fb:3e:1a:42:79:3b:df:c1: 7c:72:36:41:57:d7:7d:6f:ca:73:8e:66:5b:fc:b9:25: ac:40:44:e9:48:39:3f:65:3a:8e:61:e5:6c:6e:31:84: 4a:8d:cf:2a:34:ef:df:8b:74:da:34:5c:b0:d6:e6:3b: e9:8e:42:72:9a:b6:78:2f:28:ba:14:a1:31:69:dd:43: a8:bd:27:77:a6:2f:d7:f7:af:35:fc:6f:94:90:a7:9c: c1:77:e0:4d:4d:4e:87:79:f3:7b:9d:bd:61:47:77:cc: a8:a5:33:39:99:e6:3d:00:1c:64:18:08:21:4a:f1:9c: 48:17:a6:d8:c9:78:ab:b8:3a:ee:39:f4:6a:77:b0:83: 42:3f:0f:5e:c5:49:66:b2:c7:31:1d:31:7f:89:d4:6a: 54:16:40:1f:43:9b:f0:b1:7a:db:82:78:34:35:05:0d: 6b:54:d6:85:50:c3:45:40:39:55:2b:c8:52:a7:b3:86: 3b:9d:65:d1:10:3e:b3:8f:3a:6d:e3:08:b3:92:ee:d2: d2:82:7a:89:49:7e:78:35:26:eb:a3:19:a4:31:31:09: 97:21:ff:57:63:0e:be:15:44:6d:b4:d6:ca:1b:39:53: 16:e7:40:68:d8:d1:35:24:ff:dd:b7:42:0b:16:17:70 Fingerprint (SHA-256): 2C:10:0A:98:64:64:71:FD:94:58:98:C4:F8:56:D4:62:CC:EB:9B:93:B6:97:F4:88:0C:CE:01:77:5E:47:0D:EB Fingerprint (SHA1): FE:07:34:FD:10:0F:D5:BA:A9:A1:99:C2:99:9D:31:F7:83:1E:90:04 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152295 (0x3cafc567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:26:26 2023 Not After : Wed Oct 18 15:26:26 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:86:e4:3b:50:fe:83:85:07:5c:18:4e:94:b9:cb:40: 11:32:10:ed:f4:7f:22:d6:e4:5e:8f:b6:6f:29:22:6a: fa:b8:4a:b9:a4:ff:37:2d:ca:56:ca:d2:92:e5:24:6b: 06:20:23:a5:6b:ab:72:22:59:70:6a:79:8e:bd:a5:ca: 9d:de:29:1a:52:22:16:51:5c:b6:87:ac:c5:3f:75:67: 5a:9a:b4:8d:c2:9e:16:1d:f4:93:90:f9:6f:9a:09:0f: fa:b7:ba:28:1c:71:2c:87:6d:b7:bd:6b:23:84:b6:2f: ec:dc:1d:cc:1d:75:c5:83:66:a2:ce:88:f2:95:9b:44: 7d:6d:a8:f3:ca:1a:0e:87:96:4a:65:13:90:05:39:03: 2f:ea:d3:f3:7a:20:d5:a9:de:da:e9:20:54:14:7f:8f: 94:1b:53:f5:91:50:ae:03:34:f2:b6:ea:a8:28:4a:c8: e0:4b:38:2d:1c:bb:b1:d5:8a:03:b6:16:c5:e7:68:f7: 83:33:68:f9:1f:2b:06:9c:7a:e5:67:79:c0:f2:ff:c9: 85:cd:95:61:36:1a:06:88:1b:6c:52:1c:46:5c:f2:d4: 69:04:f4:ad:be:28:19:1b:38:ec:87:77:ef:79:83:06: d1:39:f7:0d:6f:02:73:57:1e:1d:87:9b:eb:b8:3e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:9f:79:bf:08:3f:69:00:a5:2c:bb:e2:3b:bb:04:34: 91:bc:a8:8a:98:8b:44:39:eb:1b:6c:5d:77:ef:96:e6: 4d:f8:69:82:27:b4:eb:13:ff:57:90:58:8f:0f:b6:33: d4:96:fd:b3:03:e4:52:fd:e3:93:12:7e:d5:80:05:af: c2:92:25:df:80:51:42:19:42:52:11:5e:b7:04:95:76: 97:4a:13:bb:d8:19:41:09:db:ca:0e:7d:d3:26:d8:c1: 1d:ea:53:9a:54:7e:74:d1:af:6e:e7:4f:25:e5:46:d4: 6c:0b:b2:9b:4e:10:36:27:a9:88:ef:08:b2:f5:ee:01: cc:db:25:6e:51:8c:d9:96:fa:18:0d:45:a2:f7:ee:7a: 48:72:3d:fd:f8:76:98:8d:69:4d:3e:60:ff:f6:86:54: fc:61:ee:3d:f6:97:7e:73:5f:5e:c4:af:4a:43:a6:aa: a6:ee:f7:af:3f:bb:bd:77:a3:45:eb:42:86:10:af:18: 54:65:e7:6d:82:7e:dd:85:48:30:ae:92:17:bc:09:31: 9c:cf:cb:5d:70:a0:e4:01:fa:b7:27:1f:29:2a:92:4e: 9c:f0:1b:e6:2e:67:60:b6:2a:2c:bb:84:14:32:cd:ef: 2a:e1:76:49:b9:2b:b1:2d:a4:aa:75:db:bc:ab:ca:5e Fingerprint (SHA-256): FC:95:31:9C:06:65:31:FE:B9:A7:6D:A9:51:99:B9:1B:2A:2E:2B:B3:F3:DB:C7:06:12:91:80:0B:4A:87:32:A2 Fingerprint (SHA1): 63:8B:11:F4:E5:B2:47:B1:26:C9:B3:9C:17:91:A5:64:C8:2A:2B:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152295 (0x3cafc567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:26:26 2023 Not After : Wed Oct 18 15:26:26 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:86:e4:3b:50:fe:83:85:07:5c:18:4e:94:b9:cb:40: 11:32:10:ed:f4:7f:22:d6:e4:5e:8f:b6:6f:29:22:6a: fa:b8:4a:b9:a4:ff:37:2d:ca:56:ca:d2:92:e5:24:6b: 06:20:23:a5:6b:ab:72:22:59:70:6a:79:8e:bd:a5:ca: 9d:de:29:1a:52:22:16:51:5c:b6:87:ac:c5:3f:75:67: 5a:9a:b4:8d:c2:9e:16:1d:f4:93:90:f9:6f:9a:09:0f: fa:b7:ba:28:1c:71:2c:87:6d:b7:bd:6b:23:84:b6:2f: ec:dc:1d:cc:1d:75:c5:83:66:a2:ce:88:f2:95:9b:44: 7d:6d:a8:f3:ca:1a:0e:87:96:4a:65:13:90:05:39:03: 2f:ea:d3:f3:7a:20:d5:a9:de:da:e9:20:54:14:7f:8f: 94:1b:53:f5:91:50:ae:03:34:f2:b6:ea:a8:28:4a:c8: e0:4b:38:2d:1c:bb:b1:d5:8a:03:b6:16:c5:e7:68:f7: 83:33:68:f9:1f:2b:06:9c:7a:e5:67:79:c0:f2:ff:c9: 85:cd:95:61:36:1a:06:88:1b:6c:52:1c:46:5c:f2:d4: 69:04:f4:ad:be:28:19:1b:38:ec:87:77:ef:79:83:06: d1:39:f7:0d:6f:02:73:57:1e:1d:87:9b:eb:b8:3e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:9f:79:bf:08:3f:69:00:a5:2c:bb:e2:3b:bb:04:34: 91:bc:a8:8a:98:8b:44:39:eb:1b:6c:5d:77:ef:96:e6: 4d:f8:69:82:27:b4:eb:13:ff:57:90:58:8f:0f:b6:33: d4:96:fd:b3:03:e4:52:fd:e3:93:12:7e:d5:80:05:af: c2:92:25:df:80:51:42:19:42:52:11:5e:b7:04:95:76: 97:4a:13:bb:d8:19:41:09:db:ca:0e:7d:d3:26:d8:c1: 1d:ea:53:9a:54:7e:74:d1:af:6e:e7:4f:25:e5:46:d4: 6c:0b:b2:9b:4e:10:36:27:a9:88:ef:08:b2:f5:ee:01: cc:db:25:6e:51:8c:d9:96:fa:18:0d:45:a2:f7:ee:7a: 48:72:3d:fd:f8:76:98:8d:69:4d:3e:60:ff:f6:86:54: fc:61:ee:3d:f6:97:7e:73:5f:5e:c4:af:4a:43:a6:aa: a6:ee:f7:af:3f:bb:bd:77:a3:45:eb:42:86:10:af:18: 54:65:e7:6d:82:7e:dd:85:48:30:ae:92:17:bc:09:31: 9c:cf:cb:5d:70:a0:e4:01:fa:b7:27:1f:29:2a:92:4e: 9c:f0:1b:e6:2e:67:60:b6:2a:2c:bb:84:14:32:cd:ef: 2a:e1:76:49:b9:2b:b1:2d:a4:aa:75:db:bc:ab:ca:5e Fingerprint (SHA-256): FC:95:31:9C:06:65:31:FE:B9:A7:6D:A9:51:99:B9:1B:2A:2E:2B:B3:F3:DB:C7:06:12:91:80:0B:4A:87:32:A2 Fingerprint (SHA1): 63:8B:11:F4:E5:B2:47:B1:26:C9:B3:9C:17:91:A5:64:C8:2A:2B:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152295 (0x3cafc567) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:26:26 2023 Not After : Wed Oct 18 15:26:26 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:86:e4:3b:50:fe:83:85:07:5c:18:4e:94:b9:cb:40: 11:32:10:ed:f4:7f:22:d6:e4:5e:8f:b6:6f:29:22:6a: fa:b8:4a:b9:a4:ff:37:2d:ca:56:ca:d2:92:e5:24:6b: 06:20:23:a5:6b:ab:72:22:59:70:6a:79:8e:bd:a5:ca: 9d:de:29:1a:52:22:16:51:5c:b6:87:ac:c5:3f:75:67: 5a:9a:b4:8d:c2:9e:16:1d:f4:93:90:f9:6f:9a:09:0f: fa:b7:ba:28:1c:71:2c:87:6d:b7:bd:6b:23:84:b6:2f: ec:dc:1d:cc:1d:75:c5:83:66:a2:ce:88:f2:95:9b:44: 7d:6d:a8:f3:ca:1a:0e:87:96:4a:65:13:90:05:39:03: 2f:ea:d3:f3:7a:20:d5:a9:de:da:e9:20:54:14:7f:8f: 94:1b:53:f5:91:50:ae:03:34:f2:b6:ea:a8:28:4a:c8: e0:4b:38:2d:1c:bb:b1:d5:8a:03:b6:16:c5:e7:68:f7: 83:33:68:f9:1f:2b:06:9c:7a:e5:67:79:c0:f2:ff:c9: 85:cd:95:61:36:1a:06:88:1b:6c:52:1c:46:5c:f2:d4: 69:04:f4:ad:be:28:19:1b:38:ec:87:77:ef:79:83:06: d1:39:f7:0d:6f:02:73:57:1e:1d:87:9b:eb:b8:3e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b5:9f:79:bf:08:3f:69:00:a5:2c:bb:e2:3b:bb:04:34: 91:bc:a8:8a:98:8b:44:39:eb:1b:6c:5d:77:ef:96:e6: 4d:f8:69:82:27:b4:eb:13:ff:57:90:58:8f:0f:b6:33: d4:96:fd:b3:03:e4:52:fd:e3:93:12:7e:d5:80:05:af: c2:92:25:df:80:51:42:19:42:52:11:5e:b7:04:95:76: 97:4a:13:bb:d8:19:41:09:db:ca:0e:7d:d3:26:d8:c1: 1d:ea:53:9a:54:7e:74:d1:af:6e:e7:4f:25:e5:46:d4: 6c:0b:b2:9b:4e:10:36:27:a9:88:ef:08:b2:f5:ee:01: cc:db:25:6e:51:8c:d9:96:fa:18:0d:45:a2:f7:ee:7a: 48:72:3d:fd:f8:76:98:8d:69:4d:3e:60:ff:f6:86:54: fc:61:ee:3d:f6:97:7e:73:5f:5e:c4:af:4a:43:a6:aa: a6:ee:f7:af:3f:bb:bd:77:a3:45:eb:42:86:10:af:18: 54:65:e7:6d:82:7e:dd:85:48:30:ae:92:17:bc:09:31: 9c:cf:cb:5d:70:a0:e4:01:fa:b7:27:1f:29:2a:92:4e: 9c:f0:1b:e6:2e:67:60:b6:2a:2c:bb:84:14:32:cd:ef: 2a:e1:76:49:b9:2b:b1:2d:a4:aa:75:db:bc:ab:ca:5e Fingerprint (SHA-256): FC:95:31:9C:06:65:31:FE:B9:A7:6D:A9:51:99:B9:1B:2A:2E:2B:B3:F3:DB:C7:06:12:91:80:0B:4A:87:32:A2 Fingerprint (SHA1): 63:8B:11:F4:E5:B2:47:B1:26:C9:B3:9C:17:91:A5:64:C8:2A:2B:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152294 (0x3cafc566) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:26:24 2023 Not After : Wed Oct 18 15:26:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:77:f7:78:3d:8f:e1:44:00:f8:b7:77:8f:e3:f7:57: 0b:98:ed:ce:f0:fc:a4:4a:3f:3a:d0:d1:5e:b5:7c:ff: 7f:11:9b:fd:ff:01:be:79:19:ed:d4:a3:33:23:1b:d8: 32:27:8f:04:25:0d:75:83:76:1c:f4:75:25:8c:9d:83: ff:63:50:d9:59:8f:da:7e:0d:3b:f7:4f:2b:b2:5e:1d: 69:02:d3:bf:6a:34:c3:61:42:ea:b2:5e:32:98:93:e9: 71:89:9e:e4:da:e6:d3:d7:e2:7a:06:aa:4f:09:58:87: 48:74:20:79:57:3e:4c:f2:18:a6:84:3d:12:8d:84:a8: 73:5a:fa:77:e0:d8:84:3f:fd:6a:ec:99:f5:7a:9b:97: 54:d4:f4:96:fc:93:64:92:c7:52:d9:07:1e:5a:3c:12: 64:bc:39:0c:9f:f1:bd:67:fa:59:d2:88:1e:93:25:a3: 98:2b:9e:92:f7:23:8b:ae:21:85:ea:e8:a8:92:93:04: 5f:ec:e6:fe:25:33:95:d8:b1:57:81:91:8e:65:1c:b6: 2f:b4:02:98:fc:d0:58:04:50:4e:1a:07:22:da:c4:c2: 9c:fd:fb:86:01:92:ae:33:1b:38:66:7d:87:db:72:4c: 69:68:3a:5f:48:6a:de:b0:8c:79:29:40:74:1e:99:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:66:af:30:6d:34:de:02:fb:3e:1a:42:79:3b:df:c1: 7c:72:36:41:57:d7:7d:6f:ca:73:8e:66:5b:fc:b9:25: ac:40:44:e9:48:39:3f:65:3a:8e:61:e5:6c:6e:31:84: 4a:8d:cf:2a:34:ef:df:8b:74:da:34:5c:b0:d6:e6:3b: e9:8e:42:72:9a:b6:78:2f:28:ba:14:a1:31:69:dd:43: a8:bd:27:77:a6:2f:d7:f7:af:35:fc:6f:94:90:a7:9c: c1:77:e0:4d:4d:4e:87:79:f3:7b:9d:bd:61:47:77:cc: a8:a5:33:39:99:e6:3d:00:1c:64:18:08:21:4a:f1:9c: 48:17:a6:d8:c9:78:ab:b8:3a:ee:39:f4:6a:77:b0:83: 42:3f:0f:5e:c5:49:66:b2:c7:31:1d:31:7f:89:d4:6a: 54:16:40:1f:43:9b:f0:b1:7a:db:82:78:34:35:05:0d: 6b:54:d6:85:50:c3:45:40:39:55:2b:c8:52:a7:b3:86: 3b:9d:65:d1:10:3e:b3:8f:3a:6d:e3:08:b3:92:ee:d2: d2:82:7a:89:49:7e:78:35:26:eb:a3:19:a4:31:31:09: 97:21:ff:57:63:0e:be:15:44:6d:b4:d6:ca:1b:39:53: 16:e7:40:68:d8:d1:35:24:ff:dd:b7:42:0b:16:17:70 Fingerprint (SHA-256): 2C:10:0A:98:64:64:71:FD:94:58:98:C4:F8:56:D4:62:CC:EB:9B:93:B6:97:F4:88:0C:CE:01:77:5E:47:0D:EB Fingerprint (SHA1): FE:07:34:FD:10:0F:D5:BA:A9:A1:99:C2:99:9D:31:F7:83:1E:90:04 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152294 (0x3cafc566) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:26:24 2023 Not After : Wed Oct 18 15:26:24 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:77:f7:78:3d:8f:e1:44:00:f8:b7:77:8f:e3:f7:57: 0b:98:ed:ce:f0:fc:a4:4a:3f:3a:d0:d1:5e:b5:7c:ff: 7f:11:9b:fd:ff:01:be:79:19:ed:d4:a3:33:23:1b:d8: 32:27:8f:04:25:0d:75:83:76:1c:f4:75:25:8c:9d:83: ff:63:50:d9:59:8f:da:7e:0d:3b:f7:4f:2b:b2:5e:1d: 69:02:d3:bf:6a:34:c3:61:42:ea:b2:5e:32:98:93:e9: 71:89:9e:e4:da:e6:d3:d7:e2:7a:06:aa:4f:09:58:87: 48:74:20:79:57:3e:4c:f2:18:a6:84:3d:12:8d:84:a8: 73:5a:fa:77:e0:d8:84:3f:fd:6a:ec:99:f5:7a:9b:97: 54:d4:f4:96:fc:93:64:92:c7:52:d9:07:1e:5a:3c:12: 64:bc:39:0c:9f:f1:bd:67:fa:59:d2:88:1e:93:25:a3: 98:2b:9e:92:f7:23:8b:ae:21:85:ea:e8:a8:92:93:04: 5f:ec:e6:fe:25:33:95:d8:b1:57:81:91:8e:65:1c:b6: 2f:b4:02:98:fc:d0:58:04:50:4e:1a:07:22:da:c4:c2: 9c:fd:fb:86:01:92:ae:33:1b:38:66:7d:87:db:72:4c: 69:68:3a:5f:48:6a:de:b0:8c:79:29:40:74:1e:99:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:66:af:30:6d:34:de:02:fb:3e:1a:42:79:3b:df:c1: 7c:72:36:41:57:d7:7d:6f:ca:73:8e:66:5b:fc:b9:25: ac:40:44:e9:48:39:3f:65:3a:8e:61:e5:6c:6e:31:84: 4a:8d:cf:2a:34:ef:df:8b:74:da:34:5c:b0:d6:e6:3b: e9:8e:42:72:9a:b6:78:2f:28:ba:14:a1:31:69:dd:43: a8:bd:27:77:a6:2f:d7:f7:af:35:fc:6f:94:90:a7:9c: c1:77:e0:4d:4d:4e:87:79:f3:7b:9d:bd:61:47:77:cc: a8:a5:33:39:99:e6:3d:00:1c:64:18:08:21:4a:f1:9c: 48:17:a6:d8:c9:78:ab:b8:3a:ee:39:f4:6a:77:b0:83: 42:3f:0f:5e:c5:49:66:b2:c7:31:1d:31:7f:89:d4:6a: 54:16:40:1f:43:9b:f0:b1:7a:db:82:78:34:35:05:0d: 6b:54:d6:85:50:c3:45:40:39:55:2b:c8:52:a7:b3:86: 3b:9d:65:d1:10:3e:b3:8f:3a:6d:e3:08:b3:92:ee:d2: d2:82:7a:89:49:7e:78:35:26:eb:a3:19:a4:31:31:09: 97:21:ff:57:63:0e:be:15:44:6d:b4:d6:ca:1b:39:53: 16:e7:40:68:d8:d1:35:24:ff:dd:b7:42:0b:16:17:70 Fingerprint (SHA-256): 2C:10:0A:98:64:64:71:FD:94:58:98:C4:F8:56:D4:62:CC:EB:9B:93:B6:97:F4:88:0C:CE:01:77:5E:47:0D:EB Fingerprint (SHA1): FE:07:34:FD:10:0F:D5:BA:A9:A1:99:C2:99:9D:31:F7:83:1E:90:04 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152299 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152300 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152301 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152302 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152303 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152304 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152305 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152306 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152307 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018152308 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018152309 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018152310 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018152311 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018152312 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018152313 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018152314 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018152315 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018152316 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018152317 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018152318 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018152319 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018152320 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152321 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152299 (0x3cafc56b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 15:26:33 2023 Not After : Wed Oct 18 15:26:33 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:4a:bb:1b:90:2b:3a:5a:dc:c7:9b:df:fc:97:51:dc: a3:2e:77:5e:7b:f1:ef:bd:22:be:db:e4:fe:71:1d:11: 34:d5:c9:93:94:95:43:6f:e2:9f:47:9b:76:cc:4f:cb: a7:dc:09:32:07:12:62:e6:73:54:8c:b5:db:42:93:98: e9:5f:57:3e:80:b1:3b:00:c5:97:46:b3:30:50:9e:d0: bc:38:07:f7:09:fb:2b:af:00:64:cd:30:9e:6a:75:e9: 4f:ad:79:48:0a:18:19:b5:df:39:dc:b8:e1:c3:ad:d7: 32:b0:55:c8:b9:74:36:8b:7b:af:77:24:70:6d:a1:d6: 2c:93:ac:70:49:85:f6:30:63:0a:b1:be:54:ae:92:f1: cd:9e:8f:ea:96:5c:7c:18:e9:76:62:8b:8b:4f:bc:58: b6:b3:12:ad:59:be:16:be:7d:a2:08:48:9b:c1:fb:99: 91:df:66:aa:1a:17:a1:ff:84:39:8f:a2:6c:30:08:35: 07:ea:df:64:52:06:4c:19:2f:de:ef:bb:6b:ab:a8:2f: 6d:3e:7e:03:b1:22:30:15:e3:be:62:6a:c2:60:bb:dc: b4:02:10:fc:72:ca:cd:22:f8:6d:b7:37:30:1b:ea:05: 90:6f:19:4e:39:46:5c:d5:60:f7:86:9a:74:93:f7:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:e2:bf:f6:00:b4:a5:b3:f8:c1:91:3a:df:1d:32:ed: da:ad:91:94:5f:00:84:66:84:70:92:3e:a9:be:9e:49: d3:a9:71:e4:8f:cf:85:56:b3:0d:09:47:23:1c:91:7b: 5b:09:27:87:c0:47:97:f0:56:41:05:07:f1:b5:5b:fa: 4c:cd:63:03:dc:94:d4:30:e7:46:fc:ca:6b:ab:95:40: 50:87:36:09:e1:b5:a5:49:cf:ae:20:16:83:07:9d:24: 75:30:cb:dc:1e:05:29:df:18:5f:8d:7d:6c:cc:5e:1f: 47:e5:3b:c6:18:f9:63:17:b5:95:90:9c:4c:32:78:05: e7:0b:03:3a:4c:73:28:15:c3:27:2c:bb:33:87:20:19: 77:6b:ea:25:d8:13:6d:63:2a:5a:97:5f:e7:2a:6c:b4: 66:e2:eb:0c:eb:e5:a0:5e:d7:eb:65:fd:bd:1c:0b:b7: bb:3d:84:34:ef:8d:26:48:6e:4a:87:ad:f2:f5:5a:5e: 21:1a:df:f2:9d:0d:94:fd:0f:76:44:ea:f3:ae:c5:82: 63:fd:41:34:21:89:8b:8e:d1:90:7c:20:0f:9b:fc:9b: 4e:3e:ac:1e:17:92:64:35:29:b8:ce:44:dd:80:f2:9a: f2:3d:24:1a:5f:67:4c:0e:25:42:62:22:5b:e2:2a:24 Fingerprint (SHA-256): E3:01:89:D1:48:72:B4:AD:CB:1E:D7:68:A2:A1:D6:40:E7:2B:13:07:62:8E:80:62:26:83:98:35:FD:8D:3D:6B Fingerprint (SHA1): 69:42:42:14:F0:A7:DF:47:92:73:19:05:23:62:7B:CB:33:8B:85:5D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152300 (0x3cafc56c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 15:26:34 2023 Not After : Wed Oct 18 15:26:34 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:8c:09:65:27:55:db:7f:1d:61:0c:89:27:a1:58:ca: 65:19:5e:d0:20:11:70:b7:62:61:d3:ab:6f:e6:98:45: bd:98:90:a1:9c:be:8c:00:42:9f:75:f9:fc:db:3b:71: 23:5f:3d:fb:76:9c:26:6c:82:a0:eb:58:28:bb:bd:0e: 67:a9:9a:ca:8a:b4:2e:77:0c:e9:3f:60:c5:66:f0:f3: de:6c:25:59:2a:bf:ac:d9:5d:c6:6f:62:b2:c8:0a:51: f6:eb:e4:63:11:dd:36:d1:42:40:f2:3c:25:32:df:79: 6f:e2:93:dd:21:5b:35:be:8e:67:9b:21:04:4b:0e:c8: 1f:82:30:d3:61:07:d3:23:a7:51:9e:be:a7:3f:f1:b6: e4:6b:48:15:4d:92:d0:4d:ae:6d:64:67:b9:e6:b0:e9: b2:02:fa:0e:e4:27:d9:30:17:cd:ab:38:d3:ba:97:75: cc:bc:b5:d7:54:87:1d:53:71:d7:bb:89:42:16:a8:49: e9:f0:37:4d:ff:f0:db:7b:44:b0:0c:e7:d2:c3:01:1b: a0:4d:b5:e3:af:80:86:5d:24:ef:62:79:97:76:55:53: 9b:3d:5f:15:2e:34:25:af:64:62:17:08:66:22:39:13: 11:7b:b0:5b:1b:52:98:8e:9f:30:8c:83:f1:4b:f1:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:27:5d:b7:f9:c4:60:2d:31:19:c8:06:ac:82:0a:c5: eb:68:9e:28:80:99:36:9b:5e:4d:f7:91:d9:61:8f:d4: fa:09:24:9d:f8:35:06:dc:29:4a:bd:6c:ee:08:aa:0d: 49:14:bf:b2:01:eb:8e:b6:a4:78:56:79:c3:11:37:c8: 98:39:cb:29:f6:09:27:17:27:ab:a4:1c:0d:d0:03:69: 6a:7f:c0:5b:1b:e5:a0:c9:ed:36:64:32:e2:ec:3b:ff: d8:51:69:8c:51:96:cb:08:cd:4c:18:c8:f8:56:a5:db: b6:aa:16:f0:34:fd:33:d5:d2:9e:22:da:28:8a:42:b3: 95:8e:7b:f0:93:93:70:9d:1f:0c:8d:cd:a1:bc:cc:b2: 03:5b:03:36:9e:09:76:c1:95:bf:9c:0b:82:63:84:b1: a6:07:7c:80:f1:ed:2f:55:9b:f6:f2:c8:05:9c:2f:5f: 6b:37:ed:4c:f0:eb:79:4a:43:0f:7d:19:eb:46:79:d0: d1:87:5e:58:f3:0d:af:ef:be:ec:6c:a6:70:37:e4:fe: a3:7c:c4:d2:39:f7:c0:55:ba:b8:9f:28:a9:d4:50:7d: 41:c8:f1:80:10:ee:ca:e7:5b:96:b3:50:bb:14:21:0f: f0:39:67:0d:c9:ad:8a:76:74:da:06:95:4b:f7:2c:2f Fingerprint (SHA-256): 2E:CB:67:17:A4:D2:94:50:59:62:2D:3B:2D:2B:DB:E5:2C:30:63:34:A4:7B:C9:33:D5:24:08:F1:C5:A2:BB:53 Fingerprint (SHA1): 12:D9:93:AB:DF:BE:26:FC:8C:F5:C7:AF:93:FE:41:30:60:70:29:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152301 (0x3cafc56d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 15:26:35 2023 Not After : Wed Oct 18 15:26:35 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4f:7a:15:bc:8b:ce:23:6b:57:d8:2a:49:65:04:35: 07:90:b6:42:c1:3b:26:29:3c:24:a3:4f:44:2f:43:1d: 85:51:8c:d1:da:a1:e7:7a:b0:4c:c5:57:61:32:7c:a1: 04:a0:76:a9:be:da:a7:4e:0f:d2:a2:c6:fa:d1:82:e5: 3a:64:22:f7:af:1e:da:de:45:86:15:f5:53:8b:b0:07: 0d:e0:b9:17:30:9f:5c:2a:56:86:1a:d5:23:ae:6d:4e: 6c:b0:cb:12:6b:76:03:89:7b:de:26:6b:45:0f:25:be: f8:6a:e0:4b:74:12:ac:10:06:c7:a8:54:0e:35:7d:69: c5:5e:47:d4:c0:14:9a:26:0c:85:25:be:24:5c:cd:d2: 34:ae:2e:15:02:04:a2:39:75:96:dd:58:75:d2:a4:a9: 8f:7a:b2:a8:6a:41:a4:e4:d7:ec:ce:e1:46:a1:e9:89: f8:7e:fd:60:c5:88:81:51:19:68:a4:43:96:92:9e:47: 73:5a:77:3c:ee:61:f9:63:18:da:04:fb:89:70:46:34: 2e:e3:10:da:9f:83:12:be:49:ab:13:76:6a:dd:75:12: 9f:fd:44:2b:4f:f1:ba:45:59:9d:f3:f1:6c:1f:ad:60: b5:b4:dc:38:ff:30:22:ac:76:b0:38:f8:e2:76:c9:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:a8:92:23:f9:51:67:b1:39:11:d3:26:aa:28:f4:97: 0f:70:25:fa:ce:28:34:b4:57:75:61:b8:3f:94:05:ae: 47:2d:e6:1e:4b:89:37:63:8c:bd:fd:79:e3:f8:e6:1f: 3c:84:7b:0c:44:e1:13:d8:b8:e5:99:46:71:d6:e6:34: 3a:2d:14:ca:11:8d:d7:cf:78:d2:32:b2:50:86:95:13: 0c:10:2b:18:a4:ee:d6:ed:f9:f7:f2:d6:83:bc:c2:47: 43:13:81:32:4d:85:ee:c2:11:28:b2:44:3b:15:e0:16: ba:45:dd:0e:6d:3e:11:18:50:ae:43:4a:9e:2f:e8:5e: 38:fe:f6:2b:72:37:ca:5b:17:82:f8:0f:19:00:3c:68: 2c:ba:3e:97:1a:a3:5d:8d:53:cc:28:e4:ea:7d:49:53: e3:97:51:22:64:dc:cc:04:45:29:5f:96:80:8f:a0:7e: 23:d0:3b:b2:d0:d7:e2:56:3e:bc:f6:15:78:2f:67:9c: ed:2b:f3:7a:6e:1a:6a:0d:00:5d:6e:de:85:97:4d:6a: fb:1c:10:47:b1:08:ba:df:13:00:5a:e8:99:a5:0d:fc: 1d:d6:24:f4:66:92:52:0c:e5:17:da:77:86:fa:3c:fa: 9a:6d:63:71:b6:a3:2d:de:1f:cf:21:20:44:9b:de:8e Fingerprint (SHA-256): 7C:A6:C8:B8:C6:6C:C9:B2:37:E1:6C:B8:AC:D8:38:98:B2:55:C5:D9:C8:FA:25:C6:04:AE:36:25:86:FA:57:44 Fingerprint (SHA1): E5:64:04:5A:0F:D8:F2:4C:D6:F4:D1:49:E3:A3:7D:37:A4:DE:6F:0D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152302 (0x3cafc56e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 15:26:36 2023 Not After : Wed Oct 18 15:26:36 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:c4:0a:83:ab:77:42:ad:1e:2f:03:fc:3e:f5:82:d1: 0b:f6:ec:7a:30:27:49:2b:1b:be:f8:9d:9a:8a:d0:47: 93:04:ba:25:eb:4c:27:fb:30:c4:74:0b:86:22:a9:47: 03:6e:4a:69:fd:bf:ae:bb:1b:f7:ae:18:11:2a:83:1a: de:7e:5e:d6:f4:66:7d:8e:71:03:a9:2d:5b:33:7b:5b: 8b:4f:41:76:f2:05:5b:0b:5e:19:07:c6:08:80:b1:97: 39:4c:8b:04:18:8a:aa:c4:0c:e1:af:b5:65:2e:90:68: 6c:e5:a7:4a:34:19:f8:35:19:e2:11:61:38:65:b9:9b: 04:40:75:2b:25:be:4f:d2:c5:73:b5:2f:5b:d2:1a:c0: d8:85:01:3f:54:90:cc:b6:d2:75:0f:38:b1:19:b0:a4: 75:4c:9e:94:81:f4:74:e8:d5:27:2d:2e:af:4f:8d:f7: 7e:02:07:22:ed:44:1d:1c:b8:55:16:76:1d:da:70:59: 6a:4f:bd:aa:2b:35:ec:3e:04:f1:7d:bb:1a:ac:48:42: 19:b6:ae:dd:80:bc:1f:36:c6:51:96:cb:83:02:8f:0f: 79:1b:4c:2e:bc:16:5d:87:5a:d3:48:3b:43:32:e1:e4: d5:ef:11:69:73:41:6d:d9:ee:43:d4:25:7c:ad:a2:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:7a:9f:eb:9b:b7:27:87:f5:94:2a:b8:f4:1e:a4:e6: 9e:31:21:a5:25:66:9e:de:86:dc:9c:73:04:18:30:57: 50:c1:2c:c4:cd:a1:f5:1b:73:22:a1:ee:6a:1a:86:87: dc:c0:3f:8c:f6:e4:c5:53:ff:eb:39:5c:36:aa:f3:0b: be:c8:c7:4d:91:24:1b:80:ff:95:5d:42:03:9b:95:c4: 39:87:36:df:25:90:1a:ae:38:42:42:7d:61:c3:19:e4: 98:60:df:68:4e:11:87:e0:d7:1b:a6:ea:9a:d0:f2:94: da:dc:6a:6d:c4:37:44:0c:e1:c2:9d:1f:da:6b:ce:2d: 25:d8:d8:39:a7:53:74:63:e1:e2:5d:39:6a:9a:44:cb: ff:39:4f:f0:6e:12:24:27:a3:de:b9:34:36:6a:a4:13: c9:88:24:49:74:b3:8e:87:6c:b1:2c:72:fa:db:11:51: 42:98:e4:3f:7c:f3:56:10:92:92:19:c9:08:aa:62:eb: 19:2a:bd:51:6f:cc:95:08:7b:20:7a:65:0e:5a:54:07: f7:69:0b:02:71:e2:9c:53:31:79:d7:e5:3f:ea:07:73: 66:d8:55:67:15:d2:1b:58:8a:d5:aa:1f:15:c0:42:63: 4a:40:98:05:87:2b:06:5f:2e:af:c6:67:1e:44:d0:00 Fingerprint (SHA-256): 1D:7F:44:AF:54:44:27:E5:8E:AB:8C:D5:49:D3:5D:F9:A7:9D:06:25:2E:7F:71:E5:7A:2C:4D:0B:8E:B6:2B:56 Fingerprint (SHA1): 8B:61:A7:D0:E1:B7:50:5E:B7:7B:34:C8:CC:37:17:E7:75:F8:D8:44 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152303 (0x3cafc56f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 15:26:37 2023 Not After : Wed Oct 18 15:26:37 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:10:c3:d7:27:e0:2f:8d:ec:ce:e6:19:2b:f7:2e:4c: 23:39:25:a2:5c:61:e9:99:0f:0a:fa:28:a8:4d:35:38: 48:f9:e1:70:bf:59:96:f9:a6:b1:5d:e9:5a:f6:6e:49: 6e:f9:5c:b1:92:7a:b9:1e:9c:23:08:f2:f6:fb:6b:b8: 1e:ce:11:90:63:2e:f2:c7:5f:0a:57:cf:52:63:a9:c8: fc:54:72:d8:fd:d0:87:5f:84:d4:3a:05:d5:10:70:90: 10:90:e9:d5:21:f4:70:7c:5e:08:49:c2:9b:e9:97:f2: 5a:32:7d:30:df:fa:5e:bb:68:3d:a1:47:46:62:3f:8e: e2:05:dc:d9:ea:1a:85:86:e6:66:0d:4d:1c:f9:6f:d1: ce:de:a1:b6:d1:fe:66:f1:99:b5:ca:98:e8:cc:47:e1: 49:0b:0e:ed:77:cf:f2:e2:7d:c0:6a:4e:0c:c9:9e:12: 8d:e1:26:07:7a:3b:cb:6f:7b:d3:f1:d4:82:5f:25:74: 59:27:63:4c:89:c3:23:15:75:96:21:59:1d:3f:ab:d9: 47:94:5b:64:e5:de:b1:3a:c3:da:2e:31:08:71:df:99: 02:6d:94:c7:5a:75:23:66:c1:45:2d:62:d9:52:3e:1b: cc:49:b9:14:fe:83:aa:3d:89:67:74:2e:48:9d:c8:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:2e:23:f5:24:05:ab:a3:0e:a7:6e:6e:2f:06:d2:53: b6:0f:7d:1d:46:63:d5:b0:3d:f1:d6:f7:94:c1:a5:7b: d1:b6:63:d7:21:81:08:43:33:df:b7:a4:fe:17:02:b4: 05:42:83:c1:22:a5:97:97:3f:53:d1:57:1c:19:82:68: 66:61:ed:ad:2b:b8:ad:27:d3:fb:ff:2b:91:20:36:b4: f8:ab:34:b1:4d:b6:c7:b7:10:59:ab:9f:70:04:8f:de: 77:4b:01:15:d3:29:56:db:8c:88:99:18:9b:35:41:77: ed:8f:0a:fb:61:04:47:1e:f2:da:33:48:37:ff:e3:79: 07:80:dc:c3:5a:cd:c9:fd:56:88:a0:14:50:0b:64:a5: 81:62:ec:ec:7e:7f:ea:f8:35:e8:88:e3:aa:c0:ed:17: 22:f6:98:8a:7b:b0:e3:27:b8:c5:a8:b9:de:fa:23:ee: ea:4c:ec:22:66:28:23:57:f7:40:7f:f8:7b:8e:ad:a8: c1:20:c3:8f:95:cf:df:69:b2:3c:c4:3c:e5:16:e4:3e: a4:34:5b:d2:a8:a7:8b:7c:b3:7a:a6:56:7b:bf:c8:62: 49:91:25:47:03:c6:6c:fa:63:03:a8:6a:7f:53:aa:dd: 24:ed:09:dd:3d:b1:1c:ec:9e:37:6c:6f:ed:95:57:e2 Fingerprint (SHA-256): 29:7B:89:C0:CF:0B:F5:6C:C4:3B:C9:63:3D:9D:4D:24:DE:43:E4:9D:31:2D:A6:7F:22:D7:41:99:19:3F:DE:A1 Fingerprint (SHA1): 3B:9C:C4:68:7B:A3:B1:BE:B4:DA:8F:9E:DB:A3:4D:A1:F5:41:FA:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152304 (0x3cafc570) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 15:26:38 2023 Not After : Wed Oct 18 15:26:38 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:36:86:45:4c:86:d6:a9:fa:ff:d9:42:bb:eb:5f:f9: b2:67:57:0b:a3:57:a3:12:d3:c0:08:5d:af:83:1d:b2: 54:55:84:55:82:0c:94:32:44:38:72:2e:e4:ea:e6:bb: 3a:1d:58:c6:dc:26:a2:44:65:7a:fc:61:04:52:f8:c0: 6d:c0:d6:c0:ef:44:4d:75:7e:03:04:c4:b6:50:ad:bf: ae:7d:33:46:be:7c:2e:0b:98:9d:f6:98:90:f5:87:6f: 7a:4c:18:11:1f:19:7b:cd:20:6b:0a:ed:00:19:d1:f9: 5a:4a:20:9b:42:05:99:f0:90:3a:fe:26:27:57:99:5b: 67:4e:0d:e2:2a:eb:ae:6e:24:70:2a:53:9c:38:36:82: fa:2e:74:97:fc:04:0d:23:e7:e0:ce:3e:95:be:c5:fd: af:5d:8f:d7:6b:11:8a:4d:cc:6a:7d:99:ac:0f:00:dd: 86:3c:10:82:1d:c0:48:95:a3:cc:e9:8f:42:d6:f0:50: 59:78:28:ad:15:36:af:55:33:1c:ce:61:c8:0c:d1:f9: 20:c6:b4:dd:2e:c3:0d:00:fa:19:0e:ca:8b:d1:f7:7d: cc:8a:16:b2:6d:ea:e9:66:bc:38:0b:05:32:e9:0e:51: da:52:73:ff:6c:42:b0:4d:ec:0c:b3:f8:7a:8d:3f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:a0:f2:91:74:20:73:86:64:58:09:1a:44:29:34:74: ce:35:e3:84:06:a3:11:30:01:d2:b9:15:7d:cd:24:ff: 14:42:31:b1:5c:b6:99:86:68:45:c1:da:1b:a8:0e:ce: 89:19:95:67:9c:85:df:5d:b3:d9:61:51:97:5b:bb:80: 41:6e:de:fd:76:49:c6:6b:c3:d8:38:93:d2:c7:b3:05: 4b:2d:ef:de:4f:c5:b4:3c:0c:ec:a8:66:fa:22:d1:2c: f9:b7:fe:e1:52:d2:38:ea:0f:4f:75:8b:27:7f:c5:d8: 88:07:f9:7d:08:86:58:89:ce:f7:46:5b:12:e7:f5:bb: 44:eb:05:93:93:86:d3:4a:4a:f5:d6:61:6a:4f:c8:49: 0d:60:fe:e1:f8:b3:f9:62:78:2e:8d:00:6f:57:6a:20: ac:75:c6:b5:fa:4d:ce:04:f2:ba:95:ee:8c:90:d4:2b: bb:82:75:b4:a9:fd:6c:5e:80:ad:58:b8:fb:42:7d:de: e1:c5:8b:ed:c1:09:c9:a3:ec:c7:17:82:f5:80:5e:fe: 67:83:45:4a:4f:dd:76:d1:17:80:fe:e1:35:d8:cd:db: 4f:2c:4a:49:56:b2:ea:3a:22:5b:c2:8c:5e:af:d2:c7: 3a:35:3c:0e:0f:70:f7:01:13:13:a5:ff:f3:9c:62:1f Fingerprint (SHA-256): 50:7A:64:17:F3:68:B6:D6:F8:8D:97:76:8D:8D:27:8E:21:8C:47:27:19:93:AF:82:B9:E4:64:71:6C:85:F8:E2 Fingerprint (SHA1): 4C:BB:FE:AA:A4:C9:F3:D2:CC:34:D1:A1:8D:F3:9D:1F:16:F5:C3:32 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152305 (0x3cafc571) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 15:26:39 2023 Not After : Wed Oct 18 15:26:39 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:68:82:b1:c5:56:9d:03:32:a0:a8:c9:4d:e5:e6:82: 88:14:29:13:06:3c:0a:77:c2:98:17:f3:e8:00:bc:23: 75:c4:21:6d:a2:5b:ce:3b:e5:fe:83:33:20:ac:ab:ea: 17:19:d9:e5:f3:66:78:e0:91:5b:1f:fc:bc:a1:04:47: 48:ce:4c:53:22:b4:08:c3:65:f9:85:c3:06:ea:67:f5: 6b:4e:1f:eb:04:8d:8e:90:4e:57:e0:eb:08:20:76:34: d5:ba:52:20:90:c3:c7:5e:97:7f:bd:d5:c8:aa:1c:5d: 4b:b8:f7:03:72:9c:03:44:48:0b:63:85:c6:31:71:45: e3:f7:be:79:0c:d7:0b:75:b1:bb:0e:ce:38:53:50:3c: de:6e:70:df:64:11:f6:01:b0:12:7a:0c:c7:18:f2:15: 83:aa:4c:ea:48:79:a8:89:78:80:f8:84:17:76:13:ca: 87:31:37:17:f3:02:9a:6c:41:4a:33:a4:7d:74:5e:85: f9:e6:3d:de:5d:da:ee:b6:6a:fc:82:da:52:96:36:eb: 69:4a:69:21:3f:25:0c:c8:e6:54:85:35:04:45:e7:06: 73:6b:67:db:6f:16:43:dd:46:17:b5:01:31:89:58:a4: a2:90:57:7f:c8:d3:f4:c1:50:b5:63:99:72:58:05:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:be:d4:c9:e4:97:56:61:38:d5:f9:51:c6:f3:e3:64: 80:5f:e5:05:4e:13:b7:0e:82:40:67:eb:c8:ca:4e:08: 2f:3b:9d:70:d8:6d:bc:c2:c8:ef:19:4f:18:c2:f4:1a: f0:ee:46:03:ee:27:e2:55:75:cf:64:ba:2e:63:9e:e1: ea:3c:90:ab:73:34:87:7f:76:7d:2b:3d:6c:fc:65:b6: 0a:f5:80:8d:8d:62:14:6d:0f:17:22:9a:16:41:d2:2d: b6:0b:40:a5:3d:c4:1c:1b:d5:38:ca:fa:40:dc:0f:95: 69:2d:19:8a:0d:6e:8a:c2:95:94:6f:18:3a:8c:43:fd: cd:0a:f3:d1:21:e4:23:cb:b7:2f:0a:ea:b0:f6:a5:0a: d6:fb:07:58:d3:1b:fd:5e:03:ed:78:09:0f:1f:f0:d5: 7a:37:47:4a:8b:34:e6:e7:bc:9f:9c:ee:bc:e0:0a:43: 26:67:0d:ab:d5:27:e7:d1:c5:e5:7a:b5:2c:60:04:d6: d9:95:f9:96:e6:3d:31:30:fc:28:8e:4e:a5:bb:08:66: f3:48:24:b8:ac:87:3d:15:2d:7f:9e:3b:e4:51:cf:a8: e8:4e:6e:03:2d:b1:d0:ac:9e:f9:fd:53:ba:40:b3:a3: ca:a6:b3:22:a3:a6:3b:33:e7:bd:ae:28:b1:0e:bf:a7 Fingerprint (SHA-256): 11:D1:7F:84:8A:BD:AD:99:1D:76:44:FE:E5:B0:B6:D6:AA:E2:60:CD:39:17:C7:FE:95:22:50:C8:D4:C9:CB:F9 Fingerprint (SHA1): 7B:05:39:24:DC:F8:07:22:42:5E:39:36:83:FE:11:7E:61:7D:72:62 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152306 (0x3cafc572) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 15:26:40 2023 Not After : Wed Oct 18 15:26:40 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:b1:00:09:e4:0e:fe:77:24:f4:f9:3a:43:2d:34:27: 71:80:bd:14:57:b4:aa:f0:7e:06:a5:b0:7b:6b:50:4e: d1:b7:f7:16:f2:87:3f:cb:16:2a:64:7b:ab:2f:91:86: 99:69:ea:2b:dc:27:68:43:f4:9f:c3:64:82:bb:d8:1b: 28:d8:4b:a4:e3:99:2b:fc:fd:06:2c:a3:4a:c0:10:ba: bc:23:36:2f:98:f6:1b:d9:18:e3:ca:8e:32:0f:33:0e: 4a:18:56:40:7c:14:d1:b5:7d:a1:43:95:fe:f3:ae:ec: 29:71:6d:9c:62:c2:d9:ac:d6:05:98:f1:5b:a6:c3:2e: ee:ce:bb:58:f5:69:8c:c7:82:d3:45:29:87:b4:c5:2a: 51:1e:18:0b:f5:33:23:28:c9:03:47:93:bb:7e:c6:3f: 08:dd:2c:9c:5b:7b:61:a8:b0:98:81:13:93:85:ca:9c: 7f:51:7c:60:13:ff:ce:54:1f:f4:26:32:fa:bd:35:5e: 4e:ce:a6:44:f7:b8:d1:04:29:b3:53:38:3f:85:e6:18: ac:00:9f:f9:0a:6e:b5:8c:87:96:7e:ff:01:aa:99:55: 0a:cc:c6:37:55:fb:0d:42:3a:d2:9c:5f:a7:60:c9:ae: ef:d3:44:c7:b7:98:38:4a:90:57:16:cb:95:4d:08:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:e3:77:87:54:e3:cc:7c:37:91:2a:15:77:ab:c0:fb: a1:8a:9f:fd:c0:48:ba:5a:d9:8a:fa:b8:92:28:a4:21: f3:f5:42:5c:28:0b:d4:95:60:3f:0e:5b:5a:60:a8:a4: 1b:87:a4:a7:61:83:28:a6:70:e1:ed:74:ee:d3:08:19: c2:71:0f:ad:f5:79:6a:cb:e0:9b:c8:61:88:43:1f:fb: 9f:0d:66:be:b9:aa:7e:05:66:6a:c8:8c:5e:fa:3f:c6: aa:85:bb:27:5f:45:a6:3c:d3:34:98:ce:ef:18:07:e1: c2:b5:61:35:1f:a4:b6:7d:75:ac:8d:f8:5e:36:10:8a: 2c:39:9b:84:d1:f4:d7:27:a7:2e:73:22:94:1e:ee:0a: 2d:75:78:bd:b9:ff:5e:bf:a6:32:28:77:c7:b3:13:09: 18:56:e3:2f:03:f0:0f:29:3d:32:c5:f5:87:18:b8:ed: c6:1e:14:68:08:ca:a8:88:d9:25:67:63:c5:b8:30:45: 8c:93:f6:78:07:f8:24:af:c3:64:ca:55:0b:f6:38:43: 26:c2:b6:38:ef:b1:c5:17:25:73:6b:39:17:a4:e3:68: 02:06:73:31:5a:f9:22:ec:b7:a7:85:c2:b7:90:1d:ad: 71:67:1c:81:cb:28:5c:bc:ca:da:4e:6b:2b:ce:b5:24 Fingerprint (SHA-256): 58:10:51:76:19:3F:05:15:39:19:E2:6B:28:EE:E3:46:2A:36:E5:41:9F:E6:4D:99:93:AA:EB:A5:95:E5:98:92 Fingerprint (SHA1): 92:29:E9:D5:88:BC:62:20:36:CA:86:E2:BD:0A:AA:44:D0:F3:30:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152307 (0x3cafc573) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 15:26:42 2023 Not After : Wed Oct 18 15:26:42 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:e7:d0:3d:f9:19:14:c9:ff:0d:8f:35:71:4f:57:ec: d3:cd:67:3f:92:62:29:9d:0c:1b:0b:a8:7c:c5:00:c7: c8:89:5a:dc:11:67:98:0b:eb:3f:88:37:11:1f:f9:38: 0b:72:63:65:a3:a6:97:ac:4a:8f:d8:ec:c8:fa:ae:70: 35:87:5e:89:80:2b:bb:f6:d5:a6:86:3b:c2:d1:c5:8c: 0a:bc:ff:4d:9f:1a:32:91:1b:32:7e:59:1c:66:58:5e: 77:fb:14:3e:2f:09:a2:df:01:a6:b2:cc:ae:6a:15:0e: 1b:57:95:7f:46:ed:f4:71:0b:a1:05:23:3b:d4:8a:71: ff:2d:ad:37:0d:59:ea:5a:04:24:08:25:fa:1c:95:76: 3d:ce:cf:9b:72:09:4a:d6:4b:38:45:4e:e0:1f:ee:50: a1:d9:b4:b7:3e:74:26:be:78:44:2a:e0:a7:d5:33:51: 60:15:f8:4c:7f:c7:51:98:0f:da:8c:ee:f3:9b:0b:70: 04:2e:20:7b:9f:45:96:ff:e8:6f:99:30:b7:86:e5:d5: 20:3d:c1:d7:35:27:61:5e:3b:5d:02:38:bd:9c:16:53: 2b:6b:5b:9e:7f:70:38:9b:56:ff:f1:bb:dc:84:9a:57: 9d:65:3c:52:8c:93:b0:bb:b1:33:81:c0:6a:ce:1d:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:97:50:e2:96:14:9e:77:1e:ed:88:d6:ae:4c:f9:26: a5:28:23:f9:97:12:bf:f7:bb:37:fb:ec:7e:b4:90:67: 0a:16:09:6c:11:76:12:c4:66:18:b9:5b:ae:e1:e4:12: 4d:16:37:c0:4b:39:79:60:00:d1:b4:cd:ac:19:8a:05: bb:7b:17:7d:d5:1f:b1:09:55:61:37:a2:1d:ba:b1:f5: b8:54:e1:88:b7:de:7c:01:36:2f:e3:2f:6a:12:23:0d: ac:6c:ea:8a:de:0f:89:80:ec:c1:23:b5:28:cc:19:7c: 97:42:22:66:18:2f:23:36:ef:d2:65:04:38:41:40:a1: 4c:0b:34:2b:9f:94:23:3f:51:34:f9:70:63:bb:19:0b: 14:b7:34:19:75:1a:24:cb:68:87:01:94:a9:28:91:51: f7:fa:eb:10:13:5e:92:15:e2:f7:f7:3a:42:6d:99:ae: 45:65:d5:45:72:75:67:a6:3e:d9:71:48:42:2f:50:c3: e5:eb:dc:8f:dc:c8:c2:34:e9:f9:04:61:49:b7:70:d5: f5:4d:e4:d5:56:84:08:dc:ba:5d:bc:6e:59:7e:a0:45: 57:5b:3c:b0:98:66:ee:4b:d2:3b:9d:71:35:30:a5:db: 4b:db:3f:32:a1:36:bb:a4:6b:c2:71:48:8a:79:f5:0b Fingerprint (SHA-256): CF:C3:0A:1B:8B:71:3C:F5:24:AC:44:A0:73:5F:76:03:95:6B:C9:C7:7A:B5:6F:CD:F7:12:5E:1D:D4:CF:AA:A6 Fingerprint (SHA1): F0:E6:25:87:73:D7:3F:CA:F7:4E:70:4A:38:EA:5E:C3:CE:8E:04:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152322 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152323 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152324 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152325 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152322 (0x3cafc582) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:26:55 2023 Not After : Wed Oct 18 15:26:55 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:b8:ce:de:4e:5b:08:f2:64:3d:d9:e8:ea:18:5f:2a: 40:4d:e3:7b:63:c8:da:2e:ad:4b:5d:65:58:80:e4:7c: 58:f2:ee:ad:bb:07:47:10:31:46:28:c0:3a:d6:d7:2b: d8:73:50:8c:89:c8:62:e3:b9:8d:65:ec:64:6d:6d:f2: 1a:ab:ff:96:35:d2:18:ce:2c:c3:8f:08:8a:cb:5e:27: 82:99:61:aa:63:f0:70:e1:1f:af:4c:ad:c6:7e:ac:c7: 21:93:a2:f8:fc:a2:17:75:82:c0:60:e1:60:8c:4f:5b: 01:37:8f:93:22:b3:7d:2f:de:0e:90:39:83:ec:78:ee: bf:0a:d6:4f:82:e0:79:94:96:3b:fb:af:62:24:f6:a7: 19:cd:7f:e3:f5:12:98:98:1c:ed:42:af:63:f3:29:9c: 85:2d:d5:e4:d0:c1:49:d9:5f:8f:d9:b8:99:9a:5f:0b: 45:35:3b:a5:10:5f:05:86:1f:61:ae:f1:50:dc:3d:52: 7d:e4:da:c3:9d:52:2e:09:d1:d0:ff:09:78:2d:63:1a: e9:ac:16:7d:3f:77:59:53:a8:e8:c9:24:69:71:69:10: 76:c4:ca:08:19:85:9f:24:05:d8:5d:96:15:65:8d:ed: 65:31:c2:ca:86:64:cf:e7:5f:39:b3:05:b8:df:d9:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:23:ce:63:b7:fd:ef:b0:2a:f1:42:16:e9:2d:72:ac: d4:5c:5b:31:c2:72:e0:bc:ad:a2:4c:a9:02:c7:cf:98: 03:d8:a2:47:85:14:81:b8:2e:f4:67:42:2b:72:e9:7a: 43:d1:92:f6:05:4d:1c:42:e4:5f:db:6c:ed:d5:c5:c5: 32:04:5d:38:0f:78:32:93:79:2c:62:27:59:18:d0:10: d4:71:23:aa:e3:07:6f:fb:ec:aa:40:47:1d:c7:42:73: 6c:0a:a6:9c:86:6a:4c:3f:3c:9e:1f:36:ea:0b:f5:32: c8:e5:51:bc:d4:da:b6:32:fb:0a:a7:42:cd:4b:64:dc: ac:82:4e:9a:77:bb:af:d4:79:2e:bc:d6:ed:c1:a4:22: c2:74:cb:7a:f5:bb:3f:31:c5:b3:c4:7f:2b:47:0b:88: 24:7c:ca:db:4f:57:ec:54:d7:aa:e0:46:6b:d7:2d:f8: 0e:9e:f3:72:c8:50:af:3e:7a:4f:e0:36:3c:56:9e:d2: e4:4f:b5:79:53:e1:77:6f:12:b8:86:01:c2:0c:d3:30: 19:50:47:16:47:a1:9f:42:0c:a4:45:0b:2a:71:c1:49: 65:77:80:19:b6:5c:28:2a:94:4e:56:a2:5f:c0:26:ba: 6e:0e:e4:e8:53:1a:58:7d:e8:3c:ec:55:0d:c8:e2:e0 Fingerprint (SHA-256): 1D:B2:0B:57:39:73:7A:CC:1A:C5:35:AB:70:F2:38:86:BF:7D:14:93:4F:17:2D:B5:67:6E:27:88:4A:B8:0F:20 Fingerprint (SHA1): 8B:9E:6C:9F:CC:B4:DC:61:38:44:5D:79:08:A9:B8:65:97:0C:B5:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152323 (0x3cafc583) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:26:57 2023 Not After : Wed Oct 18 15:26:57 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:3e:6a:18:ca:c9:c0:be:a6:6c:7f:fa:43:8b:3b:28: bf:3e:6d:b7:1c:13:b8:de:95:d8:56:c7:d3:88:bd:47: cf:58:e7:1e:48:c4:ed:35:7e:2b:d4:b4:3c:08:d9:fe: 5c:59:fd:cd:d0:9e:4b:db:47:30:d5:0d:a1:8b:74:93: 82:b6:9d:20:71:14:30:af:55:26:ea:8f:ea:2a:fd:ec: df:de:ac:c1:6a:20:15:d4:be:6e:5d:f9:14:2c:50:34: 57:a9:29:3d:b1:db:ba:2a:16:e0:19:34:e5:51:57:a3: 63:c6:59:ee:58:df:f6:f1:3b:43:9d:d8:25:e6:d7:dd: fb:a7:65:1d:9b:53:bf:05:4a:54:65:fe:c3:4a:05:82: cd:b6:a0:58:31:64:1c:74:a8:10:8d:01:cf:49:2d:89: 8e:bb:02:e5:7d:03:c8:2e:21:50:82:b0:8e:9e:6b:c4: 72:43:28:97:70:d9:fd:f0:e7:e7:5a:f8:ed:09:f5:ea: 67:89:70:a3:6d:92:b7:13:0a:22:ce:f8:e3:31:ce:28: c1:bf:d8:59:47:19:08:a7:b1:b8:69:12:c4:07:d9:78: 7c:ec:a3:0a:38:53:f9:36:26:8d:39:34:84:7b:7c:42: 8f:50:0d:49:35:34:a3:aa:d5:50:8d:0a:98:de:f2:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:00:0e:98:6f:8f:b7:b3:20:45:47:ff:24:53:57:40: 58:f3:6f:6d:97:1d:d1:3f:bc:1b:ae:8f:54:8a:a5:97: 76:55:32:57:48:7f:d0:70:a2:fe:09:ae:f7:8e:fd:be: d2:18:34:8c:87:7e:ea:e6:1c:9b:9d:6f:c2:09:c1:3e: af:12:59:ae:1a:bc:eb:13:12:56:87:14:ae:b5:a0:df: 9d:69:ae:07:b9:35:6f:5f:f7:eb:1a:92:18:ee:22:1f: 1c:01:c7:7b:36:20:4e:af:05:b1:61:35:a8:aa:7d:2b: ad:fa:37:9f:00:26:a4:21:3d:78:a1:98:b6:6c:9c:05: 3d:11:e1:2d:fd:1c:ea:58:5e:67:85:8a:5a:d1:a9:21: 53:8b:64:ef:ad:c3:8f:4a:15:16:60:50:be:9e:8d:c6: be:ad:48:6a:fa:6d:83:48:9a:ba:22:3b:9a:0d:60:31: 4f:24:9c:87:f3:9a:7e:52:fa:a9:b1:82:5c:66:8d:7a: 5a:43:6b:a6:7b:6c:56:cb:9d:97:d6:97:04:fe:6b:fb: 6d:e9:09:b6:28:c1:60:aa:0b:7b:6d:48:6c:21:e0:78: 95:d4:39:b6:e7:16:f8:5c:f6:7d:aa:d0:51:4a:c2:7f: 22:4f:b1:d9:97:8a:78:64:4f:79:56:43:95:91:ce:b7 Fingerprint (SHA-256): B0:07:9E:60:83:FC:B6:BA:94:3A:E9:45:31:D7:2D:68:CD:AA:0E:E0:BD:BF:AD:70:75:F1:11:26:07:64:00:28 Fingerprint (SHA1): E7:2E:2D:AC:DA:70:21:B0:38:FA:B9:36:80:1C:94:33:8E:BF:96:CE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152324 (0x3cafc584) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:26:58 2023 Not After : Wed Oct 18 15:26:58 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:65:28:0d:85:84:3e:85:b6:e8:db:46:b0:ad:f2:33: ee:fa:a3:4e:bc:38:a4:3c:12:cc:2b:76:15:4a:98:fb: e8:81:9c:b1:5e:18:15:30:c4:27:02:1a:b1:cd:07:67: 77:9c:4b:78:97:c0:ff:77:ea:d0:0d:5e:ab:d9:c1:8c: 1d:7b:10:91:91:73:2d:99:ed:5e:6a:22:3c:8b:e8:8e: a2:42:e9:22:fc:b0:de:ec:c3:95:15:43:7b:c3:94:e5: d2:99:15:9f:3e:eb:7b:c3:78:99:a4:aa:d2:2b:bf:21: e8:7d:60:f4:47:ac:1b:f0:d0:a6:b5:70:59:98:9f:a4: 8f:0a:6e:a0:28:81:2d:55:69:27:2c:c2:63:69:0e:50: 60:ae:3b:c7:83:ba:60:a7:c8:f5:ef:f7:0e:14:69:f0: f6:f9:24:ee:dc:52:07:d3:c1:34:77:b3:9c:18:06:48: 69:b2:0f:1f:37:0c:45:77:52:62:92:e4:28:40:25:a6: ab:33:45:8c:67:69:76:92:06:f5:c7:d5:8e:82:81:f1: 05:90:3e:35:a5:29:0c:10:c8:ad:52:90:d5:34:9c:bc: 9a:60:19:67:77:d6:7a:7c:8f:89:7c:00:5f:dc:7f:78: 8c:7a:20:3f:61:52:40:1b:51:66:e7:82:94:35:ac:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:de:ad:b2:f7:92:30:58:d6:5f:6a:8a:ad:82:35:c1: 1b:88:69:28:9a:1b:1e:8d:d7:ac:49:27:b7:2d:e0:3d: f6:9d:03:a0:03:ff:df:49:00:05:89:a9:28:6b:6f:13: c5:11:7d:f4:48:8e:66:45:ea:91:61:83:81:8e:b6:5e: a0:54:eb:20:60:76:69:7e:65:4e:83:7a:a8:9c:31:61: 1e:2d:6e:75:5c:2f:7a:cf:27:fb:c0:95:6f:b4:9b:44: e9:06:f1:f0:a8:20:4b:5b:c3:1b:98:8b:81:45:a1:9c: a5:24:aa:92:0c:bd:06:54:54:b1:e9:44:7e:33:54:46: a2:c4:49:70:83:6a:ca:a0:e4:fe:41:ed:38:12:a2:7b: 6a:13:df:4a:f9:c4:dc:62:01:92:93:bc:42:11:55:d2: bf:21:3e:c5:96:5b:cc:95:06:20:13:98:62:39:f1:be: 0e:2d:81:ed:3c:94:d6:ae:3e:c5:0e:8b:4b:b6:6e:0f: 5e:1e:58:15:60:56:4c:87:9a:5a:72:78:6f:11:18:dc: 42:b7:b7:fd:f7:d1:f8:66:a3:ae:6c:84:ba:57:00:c6: 1c:90:b3:e5:5a:fe:48:97:2d:1a:27:bf:a8:b7:46:05: 02:42:08:64:dc:18:ce:96:36:cf:1a:41:cd:69:34:eb Fingerprint (SHA-256): 14:13:F2:C0:1A:67:DC:44:69:8E:71:C9:7B:2E:80:3E:D6:34:1B:4B:DE:7A:09:AD:67:F6:D6:7A:9B:22:D3:C3 Fingerprint (SHA1): 4F:00:54:E2:CD:3E:4E:2D:EC:B1:41:02:C0:4E:06:B1:B9:60:50:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152322 (0x3cafc582) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:26:55 2023 Not After : Wed Oct 18 15:26:55 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:b8:ce:de:4e:5b:08:f2:64:3d:d9:e8:ea:18:5f:2a: 40:4d:e3:7b:63:c8:da:2e:ad:4b:5d:65:58:80:e4:7c: 58:f2:ee:ad:bb:07:47:10:31:46:28:c0:3a:d6:d7:2b: d8:73:50:8c:89:c8:62:e3:b9:8d:65:ec:64:6d:6d:f2: 1a:ab:ff:96:35:d2:18:ce:2c:c3:8f:08:8a:cb:5e:27: 82:99:61:aa:63:f0:70:e1:1f:af:4c:ad:c6:7e:ac:c7: 21:93:a2:f8:fc:a2:17:75:82:c0:60:e1:60:8c:4f:5b: 01:37:8f:93:22:b3:7d:2f:de:0e:90:39:83:ec:78:ee: bf:0a:d6:4f:82:e0:79:94:96:3b:fb:af:62:24:f6:a7: 19:cd:7f:e3:f5:12:98:98:1c:ed:42:af:63:f3:29:9c: 85:2d:d5:e4:d0:c1:49:d9:5f:8f:d9:b8:99:9a:5f:0b: 45:35:3b:a5:10:5f:05:86:1f:61:ae:f1:50:dc:3d:52: 7d:e4:da:c3:9d:52:2e:09:d1:d0:ff:09:78:2d:63:1a: e9:ac:16:7d:3f:77:59:53:a8:e8:c9:24:69:71:69:10: 76:c4:ca:08:19:85:9f:24:05:d8:5d:96:15:65:8d:ed: 65:31:c2:ca:86:64:cf:e7:5f:39:b3:05:b8:df:d9:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:23:ce:63:b7:fd:ef:b0:2a:f1:42:16:e9:2d:72:ac: d4:5c:5b:31:c2:72:e0:bc:ad:a2:4c:a9:02:c7:cf:98: 03:d8:a2:47:85:14:81:b8:2e:f4:67:42:2b:72:e9:7a: 43:d1:92:f6:05:4d:1c:42:e4:5f:db:6c:ed:d5:c5:c5: 32:04:5d:38:0f:78:32:93:79:2c:62:27:59:18:d0:10: d4:71:23:aa:e3:07:6f:fb:ec:aa:40:47:1d:c7:42:73: 6c:0a:a6:9c:86:6a:4c:3f:3c:9e:1f:36:ea:0b:f5:32: c8:e5:51:bc:d4:da:b6:32:fb:0a:a7:42:cd:4b:64:dc: ac:82:4e:9a:77:bb:af:d4:79:2e:bc:d6:ed:c1:a4:22: c2:74:cb:7a:f5:bb:3f:31:c5:b3:c4:7f:2b:47:0b:88: 24:7c:ca:db:4f:57:ec:54:d7:aa:e0:46:6b:d7:2d:f8: 0e:9e:f3:72:c8:50:af:3e:7a:4f:e0:36:3c:56:9e:d2: e4:4f:b5:79:53:e1:77:6f:12:b8:86:01:c2:0c:d3:30: 19:50:47:16:47:a1:9f:42:0c:a4:45:0b:2a:71:c1:49: 65:77:80:19:b6:5c:28:2a:94:4e:56:a2:5f:c0:26:ba: 6e:0e:e4:e8:53:1a:58:7d:e8:3c:ec:55:0d:c8:e2:e0 Fingerprint (SHA-256): 1D:B2:0B:57:39:73:7A:CC:1A:C5:35:AB:70:F2:38:86:BF:7D:14:93:4F:17:2D:B5:67:6E:27:88:4A:B8:0F:20 Fingerprint (SHA1): 8B:9E:6C:9F:CC:B4:DC:61:38:44:5D:79:08:A9:B8:65:97:0C:B5:C7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152323 (0x3cafc583) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:26:57 2023 Not After : Wed Oct 18 15:26:57 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:3e:6a:18:ca:c9:c0:be:a6:6c:7f:fa:43:8b:3b:28: bf:3e:6d:b7:1c:13:b8:de:95:d8:56:c7:d3:88:bd:47: cf:58:e7:1e:48:c4:ed:35:7e:2b:d4:b4:3c:08:d9:fe: 5c:59:fd:cd:d0:9e:4b:db:47:30:d5:0d:a1:8b:74:93: 82:b6:9d:20:71:14:30:af:55:26:ea:8f:ea:2a:fd:ec: df:de:ac:c1:6a:20:15:d4:be:6e:5d:f9:14:2c:50:34: 57:a9:29:3d:b1:db:ba:2a:16:e0:19:34:e5:51:57:a3: 63:c6:59:ee:58:df:f6:f1:3b:43:9d:d8:25:e6:d7:dd: fb:a7:65:1d:9b:53:bf:05:4a:54:65:fe:c3:4a:05:82: cd:b6:a0:58:31:64:1c:74:a8:10:8d:01:cf:49:2d:89: 8e:bb:02:e5:7d:03:c8:2e:21:50:82:b0:8e:9e:6b:c4: 72:43:28:97:70:d9:fd:f0:e7:e7:5a:f8:ed:09:f5:ea: 67:89:70:a3:6d:92:b7:13:0a:22:ce:f8:e3:31:ce:28: c1:bf:d8:59:47:19:08:a7:b1:b8:69:12:c4:07:d9:78: 7c:ec:a3:0a:38:53:f9:36:26:8d:39:34:84:7b:7c:42: 8f:50:0d:49:35:34:a3:aa:d5:50:8d:0a:98:de:f2:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:00:0e:98:6f:8f:b7:b3:20:45:47:ff:24:53:57:40: 58:f3:6f:6d:97:1d:d1:3f:bc:1b:ae:8f:54:8a:a5:97: 76:55:32:57:48:7f:d0:70:a2:fe:09:ae:f7:8e:fd:be: d2:18:34:8c:87:7e:ea:e6:1c:9b:9d:6f:c2:09:c1:3e: af:12:59:ae:1a:bc:eb:13:12:56:87:14:ae:b5:a0:df: 9d:69:ae:07:b9:35:6f:5f:f7:eb:1a:92:18:ee:22:1f: 1c:01:c7:7b:36:20:4e:af:05:b1:61:35:a8:aa:7d:2b: ad:fa:37:9f:00:26:a4:21:3d:78:a1:98:b6:6c:9c:05: 3d:11:e1:2d:fd:1c:ea:58:5e:67:85:8a:5a:d1:a9:21: 53:8b:64:ef:ad:c3:8f:4a:15:16:60:50:be:9e:8d:c6: be:ad:48:6a:fa:6d:83:48:9a:ba:22:3b:9a:0d:60:31: 4f:24:9c:87:f3:9a:7e:52:fa:a9:b1:82:5c:66:8d:7a: 5a:43:6b:a6:7b:6c:56:cb:9d:97:d6:97:04:fe:6b:fb: 6d:e9:09:b6:28:c1:60:aa:0b:7b:6d:48:6c:21:e0:78: 95:d4:39:b6:e7:16:f8:5c:f6:7d:aa:d0:51:4a:c2:7f: 22:4f:b1:d9:97:8a:78:64:4f:79:56:43:95:91:ce:b7 Fingerprint (SHA-256): B0:07:9E:60:83:FC:B6:BA:94:3A:E9:45:31:D7:2D:68:CD:AA:0E:E0:BD:BF:AD:70:75:F1:11:26:07:64:00:28 Fingerprint (SHA1): E7:2E:2D:AC:DA:70:21:B0:38:FA:B9:36:80:1C:94:33:8E:BF:96:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152324 (0x3cafc584) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:26:58 2023 Not After : Wed Oct 18 15:26:58 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:65:28:0d:85:84:3e:85:b6:e8:db:46:b0:ad:f2:33: ee:fa:a3:4e:bc:38:a4:3c:12:cc:2b:76:15:4a:98:fb: e8:81:9c:b1:5e:18:15:30:c4:27:02:1a:b1:cd:07:67: 77:9c:4b:78:97:c0:ff:77:ea:d0:0d:5e:ab:d9:c1:8c: 1d:7b:10:91:91:73:2d:99:ed:5e:6a:22:3c:8b:e8:8e: a2:42:e9:22:fc:b0:de:ec:c3:95:15:43:7b:c3:94:e5: d2:99:15:9f:3e:eb:7b:c3:78:99:a4:aa:d2:2b:bf:21: e8:7d:60:f4:47:ac:1b:f0:d0:a6:b5:70:59:98:9f:a4: 8f:0a:6e:a0:28:81:2d:55:69:27:2c:c2:63:69:0e:50: 60:ae:3b:c7:83:ba:60:a7:c8:f5:ef:f7:0e:14:69:f0: f6:f9:24:ee:dc:52:07:d3:c1:34:77:b3:9c:18:06:48: 69:b2:0f:1f:37:0c:45:77:52:62:92:e4:28:40:25:a6: ab:33:45:8c:67:69:76:92:06:f5:c7:d5:8e:82:81:f1: 05:90:3e:35:a5:29:0c:10:c8:ad:52:90:d5:34:9c:bc: 9a:60:19:67:77:d6:7a:7c:8f:89:7c:00:5f:dc:7f:78: 8c:7a:20:3f:61:52:40:1b:51:66:e7:82:94:35:ac:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:de:ad:b2:f7:92:30:58:d6:5f:6a:8a:ad:82:35:c1: 1b:88:69:28:9a:1b:1e:8d:d7:ac:49:27:b7:2d:e0:3d: f6:9d:03:a0:03:ff:df:49:00:05:89:a9:28:6b:6f:13: c5:11:7d:f4:48:8e:66:45:ea:91:61:83:81:8e:b6:5e: a0:54:eb:20:60:76:69:7e:65:4e:83:7a:a8:9c:31:61: 1e:2d:6e:75:5c:2f:7a:cf:27:fb:c0:95:6f:b4:9b:44: e9:06:f1:f0:a8:20:4b:5b:c3:1b:98:8b:81:45:a1:9c: a5:24:aa:92:0c:bd:06:54:54:b1:e9:44:7e:33:54:46: a2:c4:49:70:83:6a:ca:a0:e4:fe:41:ed:38:12:a2:7b: 6a:13:df:4a:f9:c4:dc:62:01:92:93:bc:42:11:55:d2: bf:21:3e:c5:96:5b:cc:95:06:20:13:98:62:39:f1:be: 0e:2d:81:ed:3c:94:d6:ae:3e:c5:0e:8b:4b:b6:6e:0f: 5e:1e:58:15:60:56:4c:87:9a:5a:72:78:6f:11:18:dc: 42:b7:b7:fd:f7:d1:f8:66:a3:ae:6c:84:ba:57:00:c6: 1c:90:b3:e5:5a:fe:48:97:2d:1a:27:bf:a8:b7:46:05: 02:42:08:64:dc:18:ce:96:36:cf:1a:41:cd:69:34:eb Fingerprint (SHA-256): 14:13:F2:C0:1A:67:DC:44:69:8E:71:C9:7B:2E:80:3E:D6:34:1B:4B:DE:7A:09:AD:67:F6:D6:7A:9B:22:D3:C3 Fingerprint (SHA1): 4F:00:54:E2:CD:3E:4E:2D:EC:B1:41:02:C0:4E:06:B1:B9:60:50:66 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152326 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152327 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152328 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018152329 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018152330 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152326 (0x3cafc586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:02 2023 Not After : Wed Oct 18 15:27:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:4c:82:ef:7e:9d:4b:1f:ec:65:47:7c:ce:85:61:1e: ad:50:0c:0b:e4:b3:26:fe:1e:b8:f4:3d:b5:d0:01:d7: 65:8f:da:47:b8:44:09:29:04:13:56:1b:13:12:54:57: e2:f6:8d:c1:e0:26:4d:f8:dd:63:ec:fd:bc:30:f3:51: de:65:19:d1:67:5f:4a:5c:f5:d3:a5:c7:54:55:bb:e8: 0f:96:8d:a5:cb:6e:ab:51:a8:55:e6:be:44:7d:ad:b8: 51:b8:cf:8c:d6:13:f7:9e:fb:92:13:7f:b6:ce:d8:fb: ad:2f:a6:74:d5:34:c9:68:d5:aa:b7:4a:0f:da:b6:f9: 94:b8:61:9e:d4:5a:dd:f8:dd:04:fb:9a:9c:56:0c:01: 33:73:34:18:68:c6:7e:c7:70:ef:cf:1a:cc:ec:47:8d: 26:5a:12:59:43:6c:d2:e2:72:04:00:7d:43:1f:a5:c4: b5:df:bc:33:63:5a:35:40:d2:38:d9:88:d5:f9:0c:23: da:c9:32:9b:83:ff:4e:df:15:c6:53:33:3f:7c:b7:19: 9b:9d:5d:e3:74:91:38:d1:ba:1e:bb:95:15:6c:6c:5b: 7f:f0:28:20:6e:04:b4:45:69:47:df:9d:cd:42:9b:5d: 58:c5:aa:6c:e7:8f:81:42:b4:9e:c7:20:97:fa:e7:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:fd:e4:f7:7f:ee:03:f1:45:8a:1a:f0:0d:77:d2:05: 43:37:16:18:0f:f5:4f:89:4f:d7:44:84:7a:f5:be:46: 1b:35:6e:b9:df:e5:f5:58:ea:b1:ca:a1:e0:d3:0e:23: 2d:d9:a9:fb:7f:fd:8f:84:2e:14:4a:44:06:ca:b3:74: d3:b3:da:e3:ac:1e:af:24:d9:5f:44:a7:54:f4:04:a1: 6d:d3:52:f9:44:42:4d:18:76:12:21:83:c5:df:1b:58: c8:6b:05:50:fb:8f:f4:72:8d:ce:8f:85:47:1b:53:34: c4:67:f2:96:e2:25:65:6d:f2:d4:0c:d0:9e:2e:95:65: ce:de:3c:21:40:01:a7:75:99:bf:3e:b8:3a:e3:00:ec: 79:26:fa:eb:64:c4:3f:cc:7c:8c:86:36:0c:98:9a:fa: 76:50:ae:94:fc:30:57:53:50:2c:96:64:c6:0f:e5:a9: ac:11:a4:0b:c4:65:b0:5b:d2:84:64:3c:9a:20:41:fc: 27:a0:dc:b0:06:2b:ff:a4:8f:ed:6d:93:45:8f:76:8e: 9a:91:47:c3:06:69:6f:ac:1f:69:47:d5:19:f8:cc:8f: 49:53:80:b7:12:e0:16:f6:d7:e9:9f:0d:c2:21:3f:1d: cc:ac:d5:d7:8e:9c:7e:a9:4a:8f:ac:72:35:c5:e6:10 Fingerprint (SHA-256): 48:8E:19:65:BE:E7:F5:50:62:10:47:D4:73:2D:1A:42:1E:28:D9:B0:83:4F:80:1B:15:17:FE:77:A6:67:FE:3A Fingerprint (SHA1): F9:33:2F:29:51:81:83:B8:F2:A1:E6:41:E9:19:AD:87:41:CB:22:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152327 (0x3cafc587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:04 2023 Not After : Wed Oct 18 15:27:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:06:61:37:92:2a:ff:9c:1c:c0:af:d9:85:83:a9:0e: e9:85:95:71:1e:55:8f:b4:e0:0f:b7:6d:89:4a:ac:b3: b9:ea:1d:3d:84:54:cf:ff:be:70:a7:da:b1:53:6c:54: 70:90:60:8b:7c:87:2d:b3:ff:6b:5c:5f:7e:2d:a8:3b: 11:5d:67:8e:d0:fb:f5:99:3a:0e:40:84:6c:23:98:44: 5e:38:4f:8a:75:c0:57:d5:0d:d8:f1:2a:7c:5e:25:6f: 0b:34:7f:3a:ac:f5:fd:97:31:05:6e:72:0c:5f:08:5c: 59:90:a4:2c:2d:61:2d:15:bf:4b:25:87:d6:c6:37:d7: 2e:23:6c:f2:67:ea:45:7f:a5:86:78:e7:0f:21:28:7b: 0e:0c:15:9c:88:af:61:91:78:ff:e4:58:2d:4b:07:b5: 26:b7:25:5a:a7:ca:a7:c9:4a:83:3b:32:c3:7b:a5:ce: 3f:88:5a:02:cf:e1:2b:c5:dd:6d:2a:72:7d:72:7a:6e: 48:ad:e6:8b:f4:36:14:2b:f1:e4:25:45:0a:bd:d4:64: ab:c6:de:5f:d6:8b:66:41:07:c4:2e:77:a8:52:e5:9f: e5:2f:50:b6:f2:1f:42:5c:02:2c:68:35:a4:e2:b1:9a: fa:6b:66:23:26:33:c6:c3:c6:e9:49:66:a2:84:c0:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:72:4c:57:a8:e9:6b:0c:df:9a:55:06:99:be:75:b6: e4:40:8a:56:80:06:d1:6d:8e:17:bb:05:0f:75:42:f7: ba:c9:61:47:25:14:bc:aa:f5:dc:f7:9a:9e:15:35:55: 1a:fd:b5:62:92:a7:45:6c:fc:b8:0f:2d:cc:c1:de:e7: 38:f2:62:8d:31:ee:c2:7f:51:3c:3f:97:41:bc:56:ce: cf:29:6e:42:50:7e:a2:c0:46:cc:81:74:13:7f:7a:bb: 9d:89:a6:3c:2d:01:03:55:6e:a2:4d:c3:65:82:a4:24: 3f:0c:83:b7:36:38:a0:21:15:ab:01:fb:4d:18:7a:ed: 7d:a4:4d:ad:c1:19:ac:55:95:73:ac:b6:e0:3c:9e:13: 87:1b:b2:65:33:92:1b:f2:20:1e:34:d2:53:36:bc:5c: a1:c1:96:44:9f:b2:12:1a:23:0f:60:01:81:c0:5d:28: d0:bd:06:b2:6d:f4:db:b7:d8:55:93:4d:d4:66:9d:fc: f4:9b:85:b2:54:98:03:e1:7d:f4:25:41:60:55:d7:e9: 28:92:c9:3f:4b:49:17:d2:e1:8b:ef:25:d9:d1:7f:98: fa:d0:28:84:38:cb:10:1f:4f:b9:c3:f1:0a:32:c5:0f: 64:88:ab:b4:b3:cc:81:8a:43:38:6a:8a:4e:18:3e:81 Fingerprint (SHA-256): 4D:5F:5C:1D:AA:A5:88:54:50:06:EE:66:30:D5:EF:41:5A:0F:44:96:32:04:AC:1B:49:DB:EB:5E:C5:EC:B1:E8 Fingerprint (SHA1): 08:5C:21:BB:FF:A9:B9:DE:A0:41:76:C2:AE:43:13:D8:22:EB:5B:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152328 (0x3cafc588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:27:05 2023 Not After : Wed Oct 18 15:27:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:92:fa:9e:a9:4f:ee:b7:64:d5:34:2a:0d:2e:56:5d: 9b:d7:a2:93:52:c8:b8:93:48:1c:d6:6e:d8:84:fa:a3: 66:5d:e2:88:60:3d:cb:3f:65:0c:42:36:90:b2:34:75: e9:d1:20:35:57:3d:d0:82:73:65:f6:d4:65:92:d3:e9: 29:67:96:d6:b0:1b:e8:8f:c5:5f:6a:b1:d3:ff:00:ad: bd:ba:53:84:5d:61:44:16:cc:92:4e:2b:c8:a0:85:db: 4e:5e:bd:9b:1e:c6:f7:84:5e:ca:f6:a1:50:43:88:8f: 6d:09:b0:b3:9f:29:5c:84:b9:66:d4:45:c1:c1:09:43: c3:47:5a:40:f7:42:03:55:ce:39:d6:51:e6:e9:98:63: 4b:aa:58:4d:e0:e1:27:59:5d:7e:ab:c3:83:bd:20:fd: cd:6a:a4:ac:5a:9c:ec:15:08:b1:a7:db:32:d2:13:af: 21:5b:01:d2:b0:78:10:df:ad:ec:7c:c7:5d:cd:fe:39: e7:01:68:3c:ac:ec:80:10:b0:ac:80:cd:28:ce:23:92: 73:03:8e:15:11:de:a9:3f:c6:d8:a5:b1:f4:69:62:1d: f8:97:93:26:e8:b7:5c:2b:0d:3f:b9:2f:4a:67:7d:a7: 93:d9:02:bd:dd:cd:40:25:5e:3f:68:9b:08:ae:d0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:49:1b:2c:69:8d:d3:ba:20:96:a5:df:75:6a:ff:db: 86:09:7d:fe:01:4c:ef:95:c5:e4:70:37:90:98:c4:b4: 60:23:63:12:34:63:d1:cc:24:a0:c9:d5:02:b2:d6:87: 42:53:f1:77:d3:4f:d4:b2:33:d6:46:f4:20:30:13:76: 1f:eb:26:48:04:8b:99:29:70:0c:3b:46:4d:43:71:2e: 2d:33:20:c7:1e:8a:a8:e2:e2:12:d8:f1:ce:22:d9:a7: 4e:67:6f:53:4b:14:ca:22:e3:30:eb:20:20:30:36:a4: 0d:e5:c9:11:ef:64:e1:f8:b1:0c:c7:50:cd:65:24:aa: b1:91:84:d4:f4:93:7f:a7:5a:24:ce:d3:25:7b:54:f2: 47:4f:77:7b:df:f3:40:d7:8b:8f:21:80:ed:32:67:17: 34:bf:c0:5e:a1:a1:65:53:45:38:6a:0e:86:f1:a3:9a: 10:21:fb:30:e5:23:b5:9f:18:6b:2c:28:87:42:ca:52: b7:dd:e8:ba:cd:eb:40:97:b9:68:50:70:ef:ad:a2:09: cd:4f:43:51:b1:aa:43:19:d6:e2:a1:32:ab:11:7c:bc: d0:c4:eb:ed:2e:18:86:c1:d7:50:ba:fb:33:17:4b:1b: b7:1c:37:01:83:ce:67:b3:b6:13:36:5f:47:44:76:2e Fingerprint (SHA-256): 96:60:65:1D:0E:B0:06:CB:1D:8C:0F:70:D0:BB:73:D0:79:65:74:A5:AA:6B:9D:F5:7E:92:BF:E0:1F:B3:0E:EA Fingerprint (SHA1): 74:D2:32:AC:79:12:A8:B0:08:F1:74:1D:E4:DB:7B:85:4F:7F:B1:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152326 (0x3cafc586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:02 2023 Not After : Wed Oct 18 15:27:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:4c:82:ef:7e:9d:4b:1f:ec:65:47:7c:ce:85:61:1e: ad:50:0c:0b:e4:b3:26:fe:1e:b8:f4:3d:b5:d0:01:d7: 65:8f:da:47:b8:44:09:29:04:13:56:1b:13:12:54:57: e2:f6:8d:c1:e0:26:4d:f8:dd:63:ec:fd:bc:30:f3:51: de:65:19:d1:67:5f:4a:5c:f5:d3:a5:c7:54:55:bb:e8: 0f:96:8d:a5:cb:6e:ab:51:a8:55:e6:be:44:7d:ad:b8: 51:b8:cf:8c:d6:13:f7:9e:fb:92:13:7f:b6:ce:d8:fb: ad:2f:a6:74:d5:34:c9:68:d5:aa:b7:4a:0f:da:b6:f9: 94:b8:61:9e:d4:5a:dd:f8:dd:04:fb:9a:9c:56:0c:01: 33:73:34:18:68:c6:7e:c7:70:ef:cf:1a:cc:ec:47:8d: 26:5a:12:59:43:6c:d2:e2:72:04:00:7d:43:1f:a5:c4: b5:df:bc:33:63:5a:35:40:d2:38:d9:88:d5:f9:0c:23: da:c9:32:9b:83:ff:4e:df:15:c6:53:33:3f:7c:b7:19: 9b:9d:5d:e3:74:91:38:d1:ba:1e:bb:95:15:6c:6c:5b: 7f:f0:28:20:6e:04:b4:45:69:47:df:9d:cd:42:9b:5d: 58:c5:aa:6c:e7:8f:81:42:b4:9e:c7:20:97:fa:e7:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:fd:e4:f7:7f:ee:03:f1:45:8a:1a:f0:0d:77:d2:05: 43:37:16:18:0f:f5:4f:89:4f:d7:44:84:7a:f5:be:46: 1b:35:6e:b9:df:e5:f5:58:ea:b1:ca:a1:e0:d3:0e:23: 2d:d9:a9:fb:7f:fd:8f:84:2e:14:4a:44:06:ca:b3:74: d3:b3:da:e3:ac:1e:af:24:d9:5f:44:a7:54:f4:04:a1: 6d:d3:52:f9:44:42:4d:18:76:12:21:83:c5:df:1b:58: c8:6b:05:50:fb:8f:f4:72:8d:ce:8f:85:47:1b:53:34: c4:67:f2:96:e2:25:65:6d:f2:d4:0c:d0:9e:2e:95:65: ce:de:3c:21:40:01:a7:75:99:bf:3e:b8:3a:e3:00:ec: 79:26:fa:eb:64:c4:3f:cc:7c:8c:86:36:0c:98:9a:fa: 76:50:ae:94:fc:30:57:53:50:2c:96:64:c6:0f:e5:a9: ac:11:a4:0b:c4:65:b0:5b:d2:84:64:3c:9a:20:41:fc: 27:a0:dc:b0:06:2b:ff:a4:8f:ed:6d:93:45:8f:76:8e: 9a:91:47:c3:06:69:6f:ac:1f:69:47:d5:19:f8:cc:8f: 49:53:80:b7:12:e0:16:f6:d7:e9:9f:0d:c2:21:3f:1d: cc:ac:d5:d7:8e:9c:7e:a9:4a:8f:ac:72:35:c5:e6:10 Fingerprint (SHA-256): 48:8E:19:65:BE:E7:F5:50:62:10:47:D4:73:2D:1A:42:1E:28:D9:B0:83:4F:80:1B:15:17:FE:77:A6:67:FE:3A Fingerprint (SHA1): F9:33:2F:29:51:81:83:B8:F2:A1:E6:41:E9:19:AD:87:41:CB:22:24 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152327 (0x3cafc587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:04 2023 Not After : Wed Oct 18 15:27:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:06:61:37:92:2a:ff:9c:1c:c0:af:d9:85:83:a9:0e: e9:85:95:71:1e:55:8f:b4:e0:0f:b7:6d:89:4a:ac:b3: b9:ea:1d:3d:84:54:cf:ff:be:70:a7:da:b1:53:6c:54: 70:90:60:8b:7c:87:2d:b3:ff:6b:5c:5f:7e:2d:a8:3b: 11:5d:67:8e:d0:fb:f5:99:3a:0e:40:84:6c:23:98:44: 5e:38:4f:8a:75:c0:57:d5:0d:d8:f1:2a:7c:5e:25:6f: 0b:34:7f:3a:ac:f5:fd:97:31:05:6e:72:0c:5f:08:5c: 59:90:a4:2c:2d:61:2d:15:bf:4b:25:87:d6:c6:37:d7: 2e:23:6c:f2:67:ea:45:7f:a5:86:78:e7:0f:21:28:7b: 0e:0c:15:9c:88:af:61:91:78:ff:e4:58:2d:4b:07:b5: 26:b7:25:5a:a7:ca:a7:c9:4a:83:3b:32:c3:7b:a5:ce: 3f:88:5a:02:cf:e1:2b:c5:dd:6d:2a:72:7d:72:7a:6e: 48:ad:e6:8b:f4:36:14:2b:f1:e4:25:45:0a:bd:d4:64: ab:c6:de:5f:d6:8b:66:41:07:c4:2e:77:a8:52:e5:9f: e5:2f:50:b6:f2:1f:42:5c:02:2c:68:35:a4:e2:b1:9a: fa:6b:66:23:26:33:c6:c3:c6:e9:49:66:a2:84:c0:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:72:4c:57:a8:e9:6b:0c:df:9a:55:06:99:be:75:b6: e4:40:8a:56:80:06:d1:6d:8e:17:bb:05:0f:75:42:f7: ba:c9:61:47:25:14:bc:aa:f5:dc:f7:9a:9e:15:35:55: 1a:fd:b5:62:92:a7:45:6c:fc:b8:0f:2d:cc:c1:de:e7: 38:f2:62:8d:31:ee:c2:7f:51:3c:3f:97:41:bc:56:ce: cf:29:6e:42:50:7e:a2:c0:46:cc:81:74:13:7f:7a:bb: 9d:89:a6:3c:2d:01:03:55:6e:a2:4d:c3:65:82:a4:24: 3f:0c:83:b7:36:38:a0:21:15:ab:01:fb:4d:18:7a:ed: 7d:a4:4d:ad:c1:19:ac:55:95:73:ac:b6:e0:3c:9e:13: 87:1b:b2:65:33:92:1b:f2:20:1e:34:d2:53:36:bc:5c: a1:c1:96:44:9f:b2:12:1a:23:0f:60:01:81:c0:5d:28: d0:bd:06:b2:6d:f4:db:b7:d8:55:93:4d:d4:66:9d:fc: f4:9b:85:b2:54:98:03:e1:7d:f4:25:41:60:55:d7:e9: 28:92:c9:3f:4b:49:17:d2:e1:8b:ef:25:d9:d1:7f:98: fa:d0:28:84:38:cb:10:1f:4f:b9:c3:f1:0a:32:c5:0f: 64:88:ab:b4:b3:cc:81:8a:43:38:6a:8a:4e:18:3e:81 Fingerprint (SHA-256): 4D:5F:5C:1D:AA:A5:88:54:50:06:EE:66:30:D5:EF:41:5A:0F:44:96:32:04:AC:1B:49:DB:EB:5E:C5:EC:B1:E8 Fingerprint (SHA1): 08:5C:21:BB:FF:A9:B9:DE:A0:41:76:C2:AE:43:13:D8:22:EB:5B:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152328 (0x3cafc588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:27:05 2023 Not After : Wed Oct 18 15:27:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:92:fa:9e:a9:4f:ee:b7:64:d5:34:2a:0d:2e:56:5d: 9b:d7:a2:93:52:c8:b8:93:48:1c:d6:6e:d8:84:fa:a3: 66:5d:e2:88:60:3d:cb:3f:65:0c:42:36:90:b2:34:75: e9:d1:20:35:57:3d:d0:82:73:65:f6:d4:65:92:d3:e9: 29:67:96:d6:b0:1b:e8:8f:c5:5f:6a:b1:d3:ff:00:ad: bd:ba:53:84:5d:61:44:16:cc:92:4e:2b:c8:a0:85:db: 4e:5e:bd:9b:1e:c6:f7:84:5e:ca:f6:a1:50:43:88:8f: 6d:09:b0:b3:9f:29:5c:84:b9:66:d4:45:c1:c1:09:43: c3:47:5a:40:f7:42:03:55:ce:39:d6:51:e6:e9:98:63: 4b:aa:58:4d:e0:e1:27:59:5d:7e:ab:c3:83:bd:20:fd: cd:6a:a4:ac:5a:9c:ec:15:08:b1:a7:db:32:d2:13:af: 21:5b:01:d2:b0:78:10:df:ad:ec:7c:c7:5d:cd:fe:39: e7:01:68:3c:ac:ec:80:10:b0:ac:80:cd:28:ce:23:92: 73:03:8e:15:11:de:a9:3f:c6:d8:a5:b1:f4:69:62:1d: f8:97:93:26:e8:b7:5c:2b:0d:3f:b9:2f:4a:67:7d:a7: 93:d9:02:bd:dd:cd:40:25:5e:3f:68:9b:08:ae:d0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:49:1b:2c:69:8d:d3:ba:20:96:a5:df:75:6a:ff:db: 86:09:7d:fe:01:4c:ef:95:c5:e4:70:37:90:98:c4:b4: 60:23:63:12:34:63:d1:cc:24:a0:c9:d5:02:b2:d6:87: 42:53:f1:77:d3:4f:d4:b2:33:d6:46:f4:20:30:13:76: 1f:eb:26:48:04:8b:99:29:70:0c:3b:46:4d:43:71:2e: 2d:33:20:c7:1e:8a:a8:e2:e2:12:d8:f1:ce:22:d9:a7: 4e:67:6f:53:4b:14:ca:22:e3:30:eb:20:20:30:36:a4: 0d:e5:c9:11:ef:64:e1:f8:b1:0c:c7:50:cd:65:24:aa: b1:91:84:d4:f4:93:7f:a7:5a:24:ce:d3:25:7b:54:f2: 47:4f:77:7b:df:f3:40:d7:8b:8f:21:80:ed:32:67:17: 34:bf:c0:5e:a1:a1:65:53:45:38:6a:0e:86:f1:a3:9a: 10:21:fb:30:e5:23:b5:9f:18:6b:2c:28:87:42:ca:52: b7:dd:e8:ba:cd:eb:40:97:b9:68:50:70:ef:ad:a2:09: cd:4f:43:51:b1:aa:43:19:d6:e2:a1:32:ab:11:7c:bc: d0:c4:eb:ed:2e:18:86:c1:d7:50:ba:fb:33:17:4b:1b: b7:1c:37:01:83:ce:67:b3:b6:13:36:5f:47:44:76:2e Fingerprint (SHA-256): 96:60:65:1D:0E:B0:06:CB:1D:8C:0F:70:D0:BB:73:D0:79:65:74:A5:AA:6B:9D:F5:7E:92:BF:E0:1F:B3:0E:EA Fingerprint (SHA1): 74:D2:32:AC:79:12:A8:B0:08:F1:74:1D:E4:DB:7B:85:4F:7F:B1:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152326 (0x3cafc586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:02 2023 Not After : Wed Oct 18 15:27:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:4c:82:ef:7e:9d:4b:1f:ec:65:47:7c:ce:85:61:1e: ad:50:0c:0b:e4:b3:26:fe:1e:b8:f4:3d:b5:d0:01:d7: 65:8f:da:47:b8:44:09:29:04:13:56:1b:13:12:54:57: e2:f6:8d:c1:e0:26:4d:f8:dd:63:ec:fd:bc:30:f3:51: de:65:19:d1:67:5f:4a:5c:f5:d3:a5:c7:54:55:bb:e8: 0f:96:8d:a5:cb:6e:ab:51:a8:55:e6:be:44:7d:ad:b8: 51:b8:cf:8c:d6:13:f7:9e:fb:92:13:7f:b6:ce:d8:fb: ad:2f:a6:74:d5:34:c9:68:d5:aa:b7:4a:0f:da:b6:f9: 94:b8:61:9e:d4:5a:dd:f8:dd:04:fb:9a:9c:56:0c:01: 33:73:34:18:68:c6:7e:c7:70:ef:cf:1a:cc:ec:47:8d: 26:5a:12:59:43:6c:d2:e2:72:04:00:7d:43:1f:a5:c4: b5:df:bc:33:63:5a:35:40:d2:38:d9:88:d5:f9:0c:23: da:c9:32:9b:83:ff:4e:df:15:c6:53:33:3f:7c:b7:19: 9b:9d:5d:e3:74:91:38:d1:ba:1e:bb:95:15:6c:6c:5b: 7f:f0:28:20:6e:04:b4:45:69:47:df:9d:cd:42:9b:5d: 58:c5:aa:6c:e7:8f:81:42:b4:9e:c7:20:97:fa:e7:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:fd:e4:f7:7f:ee:03:f1:45:8a:1a:f0:0d:77:d2:05: 43:37:16:18:0f:f5:4f:89:4f:d7:44:84:7a:f5:be:46: 1b:35:6e:b9:df:e5:f5:58:ea:b1:ca:a1:e0:d3:0e:23: 2d:d9:a9:fb:7f:fd:8f:84:2e:14:4a:44:06:ca:b3:74: d3:b3:da:e3:ac:1e:af:24:d9:5f:44:a7:54:f4:04:a1: 6d:d3:52:f9:44:42:4d:18:76:12:21:83:c5:df:1b:58: c8:6b:05:50:fb:8f:f4:72:8d:ce:8f:85:47:1b:53:34: c4:67:f2:96:e2:25:65:6d:f2:d4:0c:d0:9e:2e:95:65: ce:de:3c:21:40:01:a7:75:99:bf:3e:b8:3a:e3:00:ec: 79:26:fa:eb:64:c4:3f:cc:7c:8c:86:36:0c:98:9a:fa: 76:50:ae:94:fc:30:57:53:50:2c:96:64:c6:0f:e5:a9: ac:11:a4:0b:c4:65:b0:5b:d2:84:64:3c:9a:20:41:fc: 27:a0:dc:b0:06:2b:ff:a4:8f:ed:6d:93:45:8f:76:8e: 9a:91:47:c3:06:69:6f:ac:1f:69:47:d5:19:f8:cc:8f: 49:53:80:b7:12:e0:16:f6:d7:e9:9f:0d:c2:21:3f:1d: cc:ac:d5:d7:8e:9c:7e:a9:4a:8f:ac:72:35:c5:e6:10 Fingerprint (SHA-256): 48:8E:19:65:BE:E7:F5:50:62:10:47:D4:73:2D:1A:42:1E:28:D9:B0:83:4F:80:1B:15:17:FE:77:A6:67:FE:3A Fingerprint (SHA1): F9:33:2F:29:51:81:83:B8:F2:A1:E6:41:E9:19:AD:87:41:CB:22:24 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152326 (0x3cafc586) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:02 2023 Not After : Wed Oct 18 15:27:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:4c:82:ef:7e:9d:4b:1f:ec:65:47:7c:ce:85:61:1e: ad:50:0c:0b:e4:b3:26:fe:1e:b8:f4:3d:b5:d0:01:d7: 65:8f:da:47:b8:44:09:29:04:13:56:1b:13:12:54:57: e2:f6:8d:c1:e0:26:4d:f8:dd:63:ec:fd:bc:30:f3:51: de:65:19:d1:67:5f:4a:5c:f5:d3:a5:c7:54:55:bb:e8: 0f:96:8d:a5:cb:6e:ab:51:a8:55:e6:be:44:7d:ad:b8: 51:b8:cf:8c:d6:13:f7:9e:fb:92:13:7f:b6:ce:d8:fb: ad:2f:a6:74:d5:34:c9:68:d5:aa:b7:4a:0f:da:b6:f9: 94:b8:61:9e:d4:5a:dd:f8:dd:04:fb:9a:9c:56:0c:01: 33:73:34:18:68:c6:7e:c7:70:ef:cf:1a:cc:ec:47:8d: 26:5a:12:59:43:6c:d2:e2:72:04:00:7d:43:1f:a5:c4: b5:df:bc:33:63:5a:35:40:d2:38:d9:88:d5:f9:0c:23: da:c9:32:9b:83:ff:4e:df:15:c6:53:33:3f:7c:b7:19: 9b:9d:5d:e3:74:91:38:d1:ba:1e:bb:95:15:6c:6c:5b: 7f:f0:28:20:6e:04:b4:45:69:47:df:9d:cd:42:9b:5d: 58:c5:aa:6c:e7:8f:81:42:b4:9e:c7:20:97:fa:e7:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:fd:e4:f7:7f:ee:03:f1:45:8a:1a:f0:0d:77:d2:05: 43:37:16:18:0f:f5:4f:89:4f:d7:44:84:7a:f5:be:46: 1b:35:6e:b9:df:e5:f5:58:ea:b1:ca:a1:e0:d3:0e:23: 2d:d9:a9:fb:7f:fd:8f:84:2e:14:4a:44:06:ca:b3:74: d3:b3:da:e3:ac:1e:af:24:d9:5f:44:a7:54:f4:04:a1: 6d:d3:52:f9:44:42:4d:18:76:12:21:83:c5:df:1b:58: c8:6b:05:50:fb:8f:f4:72:8d:ce:8f:85:47:1b:53:34: c4:67:f2:96:e2:25:65:6d:f2:d4:0c:d0:9e:2e:95:65: ce:de:3c:21:40:01:a7:75:99:bf:3e:b8:3a:e3:00:ec: 79:26:fa:eb:64:c4:3f:cc:7c:8c:86:36:0c:98:9a:fa: 76:50:ae:94:fc:30:57:53:50:2c:96:64:c6:0f:e5:a9: ac:11:a4:0b:c4:65:b0:5b:d2:84:64:3c:9a:20:41:fc: 27:a0:dc:b0:06:2b:ff:a4:8f:ed:6d:93:45:8f:76:8e: 9a:91:47:c3:06:69:6f:ac:1f:69:47:d5:19:f8:cc:8f: 49:53:80:b7:12:e0:16:f6:d7:e9:9f:0d:c2:21:3f:1d: cc:ac:d5:d7:8e:9c:7e:a9:4a:8f:ac:72:35:c5:e6:10 Fingerprint (SHA-256): 48:8E:19:65:BE:E7:F5:50:62:10:47:D4:73:2D:1A:42:1E:28:D9:B0:83:4F:80:1B:15:17:FE:77:A6:67:FE:3A Fingerprint (SHA1): F9:33:2F:29:51:81:83:B8:F2:A1:E6:41:E9:19:AD:87:41:CB:22:24 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152327 (0x3cafc587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:04 2023 Not After : Wed Oct 18 15:27:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:06:61:37:92:2a:ff:9c:1c:c0:af:d9:85:83:a9:0e: e9:85:95:71:1e:55:8f:b4:e0:0f:b7:6d:89:4a:ac:b3: b9:ea:1d:3d:84:54:cf:ff:be:70:a7:da:b1:53:6c:54: 70:90:60:8b:7c:87:2d:b3:ff:6b:5c:5f:7e:2d:a8:3b: 11:5d:67:8e:d0:fb:f5:99:3a:0e:40:84:6c:23:98:44: 5e:38:4f:8a:75:c0:57:d5:0d:d8:f1:2a:7c:5e:25:6f: 0b:34:7f:3a:ac:f5:fd:97:31:05:6e:72:0c:5f:08:5c: 59:90:a4:2c:2d:61:2d:15:bf:4b:25:87:d6:c6:37:d7: 2e:23:6c:f2:67:ea:45:7f:a5:86:78:e7:0f:21:28:7b: 0e:0c:15:9c:88:af:61:91:78:ff:e4:58:2d:4b:07:b5: 26:b7:25:5a:a7:ca:a7:c9:4a:83:3b:32:c3:7b:a5:ce: 3f:88:5a:02:cf:e1:2b:c5:dd:6d:2a:72:7d:72:7a:6e: 48:ad:e6:8b:f4:36:14:2b:f1:e4:25:45:0a:bd:d4:64: ab:c6:de:5f:d6:8b:66:41:07:c4:2e:77:a8:52:e5:9f: e5:2f:50:b6:f2:1f:42:5c:02:2c:68:35:a4:e2:b1:9a: fa:6b:66:23:26:33:c6:c3:c6:e9:49:66:a2:84:c0:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:72:4c:57:a8:e9:6b:0c:df:9a:55:06:99:be:75:b6: e4:40:8a:56:80:06:d1:6d:8e:17:bb:05:0f:75:42:f7: ba:c9:61:47:25:14:bc:aa:f5:dc:f7:9a:9e:15:35:55: 1a:fd:b5:62:92:a7:45:6c:fc:b8:0f:2d:cc:c1:de:e7: 38:f2:62:8d:31:ee:c2:7f:51:3c:3f:97:41:bc:56:ce: cf:29:6e:42:50:7e:a2:c0:46:cc:81:74:13:7f:7a:bb: 9d:89:a6:3c:2d:01:03:55:6e:a2:4d:c3:65:82:a4:24: 3f:0c:83:b7:36:38:a0:21:15:ab:01:fb:4d:18:7a:ed: 7d:a4:4d:ad:c1:19:ac:55:95:73:ac:b6:e0:3c:9e:13: 87:1b:b2:65:33:92:1b:f2:20:1e:34:d2:53:36:bc:5c: a1:c1:96:44:9f:b2:12:1a:23:0f:60:01:81:c0:5d:28: d0:bd:06:b2:6d:f4:db:b7:d8:55:93:4d:d4:66:9d:fc: f4:9b:85:b2:54:98:03:e1:7d:f4:25:41:60:55:d7:e9: 28:92:c9:3f:4b:49:17:d2:e1:8b:ef:25:d9:d1:7f:98: fa:d0:28:84:38:cb:10:1f:4f:b9:c3:f1:0a:32:c5:0f: 64:88:ab:b4:b3:cc:81:8a:43:38:6a:8a:4e:18:3e:81 Fingerprint (SHA-256): 4D:5F:5C:1D:AA:A5:88:54:50:06:EE:66:30:D5:EF:41:5A:0F:44:96:32:04:AC:1B:49:DB:EB:5E:C5:EC:B1:E8 Fingerprint (SHA1): 08:5C:21:BB:FF:A9:B9:DE:A0:41:76:C2:AE:43:13:D8:22:EB:5B:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152327 (0x3cafc587) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:27:04 2023 Not After : Wed Oct 18 15:27:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:06:61:37:92:2a:ff:9c:1c:c0:af:d9:85:83:a9:0e: e9:85:95:71:1e:55:8f:b4:e0:0f:b7:6d:89:4a:ac:b3: b9:ea:1d:3d:84:54:cf:ff:be:70:a7:da:b1:53:6c:54: 70:90:60:8b:7c:87:2d:b3:ff:6b:5c:5f:7e:2d:a8:3b: 11:5d:67:8e:d0:fb:f5:99:3a:0e:40:84:6c:23:98:44: 5e:38:4f:8a:75:c0:57:d5:0d:d8:f1:2a:7c:5e:25:6f: 0b:34:7f:3a:ac:f5:fd:97:31:05:6e:72:0c:5f:08:5c: 59:90:a4:2c:2d:61:2d:15:bf:4b:25:87:d6:c6:37:d7: 2e:23:6c:f2:67:ea:45:7f:a5:86:78:e7:0f:21:28:7b: 0e:0c:15:9c:88:af:61:91:78:ff:e4:58:2d:4b:07:b5: 26:b7:25:5a:a7:ca:a7:c9:4a:83:3b:32:c3:7b:a5:ce: 3f:88:5a:02:cf:e1:2b:c5:dd:6d:2a:72:7d:72:7a:6e: 48:ad:e6:8b:f4:36:14:2b:f1:e4:25:45:0a:bd:d4:64: ab:c6:de:5f:d6:8b:66:41:07:c4:2e:77:a8:52:e5:9f: e5:2f:50:b6:f2:1f:42:5c:02:2c:68:35:a4:e2:b1:9a: fa:6b:66:23:26:33:c6:c3:c6:e9:49:66:a2:84:c0:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7a:72:4c:57:a8:e9:6b:0c:df:9a:55:06:99:be:75:b6: e4:40:8a:56:80:06:d1:6d:8e:17:bb:05:0f:75:42:f7: ba:c9:61:47:25:14:bc:aa:f5:dc:f7:9a:9e:15:35:55: 1a:fd:b5:62:92:a7:45:6c:fc:b8:0f:2d:cc:c1:de:e7: 38:f2:62:8d:31:ee:c2:7f:51:3c:3f:97:41:bc:56:ce: cf:29:6e:42:50:7e:a2:c0:46:cc:81:74:13:7f:7a:bb: 9d:89:a6:3c:2d:01:03:55:6e:a2:4d:c3:65:82:a4:24: 3f:0c:83:b7:36:38:a0:21:15:ab:01:fb:4d:18:7a:ed: 7d:a4:4d:ad:c1:19:ac:55:95:73:ac:b6:e0:3c:9e:13: 87:1b:b2:65:33:92:1b:f2:20:1e:34:d2:53:36:bc:5c: a1:c1:96:44:9f:b2:12:1a:23:0f:60:01:81:c0:5d:28: d0:bd:06:b2:6d:f4:db:b7:d8:55:93:4d:d4:66:9d:fc: f4:9b:85:b2:54:98:03:e1:7d:f4:25:41:60:55:d7:e9: 28:92:c9:3f:4b:49:17:d2:e1:8b:ef:25:d9:d1:7f:98: fa:d0:28:84:38:cb:10:1f:4f:b9:c3:f1:0a:32:c5:0f: 64:88:ab:b4:b3:cc:81:8a:43:38:6a:8a:4e:18:3e:81 Fingerprint (SHA-256): 4D:5F:5C:1D:AA:A5:88:54:50:06:EE:66:30:D5:EF:41:5A:0F:44:96:32:04:AC:1B:49:DB:EB:5E:C5:EC:B1:E8 Fingerprint (SHA1): 08:5C:21:BB:FF:A9:B9:DE:A0:41:76:C2:AE:43:13:D8:22:EB:5B:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152328 (0x3cafc588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:27:05 2023 Not After : Wed Oct 18 15:27:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:92:fa:9e:a9:4f:ee:b7:64:d5:34:2a:0d:2e:56:5d: 9b:d7:a2:93:52:c8:b8:93:48:1c:d6:6e:d8:84:fa:a3: 66:5d:e2:88:60:3d:cb:3f:65:0c:42:36:90:b2:34:75: e9:d1:20:35:57:3d:d0:82:73:65:f6:d4:65:92:d3:e9: 29:67:96:d6:b0:1b:e8:8f:c5:5f:6a:b1:d3:ff:00:ad: bd:ba:53:84:5d:61:44:16:cc:92:4e:2b:c8:a0:85:db: 4e:5e:bd:9b:1e:c6:f7:84:5e:ca:f6:a1:50:43:88:8f: 6d:09:b0:b3:9f:29:5c:84:b9:66:d4:45:c1:c1:09:43: c3:47:5a:40:f7:42:03:55:ce:39:d6:51:e6:e9:98:63: 4b:aa:58:4d:e0:e1:27:59:5d:7e:ab:c3:83:bd:20:fd: cd:6a:a4:ac:5a:9c:ec:15:08:b1:a7:db:32:d2:13:af: 21:5b:01:d2:b0:78:10:df:ad:ec:7c:c7:5d:cd:fe:39: e7:01:68:3c:ac:ec:80:10:b0:ac:80:cd:28:ce:23:92: 73:03:8e:15:11:de:a9:3f:c6:d8:a5:b1:f4:69:62:1d: f8:97:93:26:e8:b7:5c:2b:0d:3f:b9:2f:4a:67:7d:a7: 93:d9:02:bd:dd:cd:40:25:5e:3f:68:9b:08:ae:d0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:49:1b:2c:69:8d:d3:ba:20:96:a5:df:75:6a:ff:db: 86:09:7d:fe:01:4c:ef:95:c5:e4:70:37:90:98:c4:b4: 60:23:63:12:34:63:d1:cc:24:a0:c9:d5:02:b2:d6:87: 42:53:f1:77:d3:4f:d4:b2:33:d6:46:f4:20:30:13:76: 1f:eb:26:48:04:8b:99:29:70:0c:3b:46:4d:43:71:2e: 2d:33:20:c7:1e:8a:a8:e2:e2:12:d8:f1:ce:22:d9:a7: 4e:67:6f:53:4b:14:ca:22:e3:30:eb:20:20:30:36:a4: 0d:e5:c9:11:ef:64:e1:f8:b1:0c:c7:50:cd:65:24:aa: b1:91:84:d4:f4:93:7f:a7:5a:24:ce:d3:25:7b:54:f2: 47:4f:77:7b:df:f3:40:d7:8b:8f:21:80:ed:32:67:17: 34:bf:c0:5e:a1:a1:65:53:45:38:6a:0e:86:f1:a3:9a: 10:21:fb:30:e5:23:b5:9f:18:6b:2c:28:87:42:ca:52: b7:dd:e8:ba:cd:eb:40:97:b9:68:50:70:ef:ad:a2:09: cd:4f:43:51:b1:aa:43:19:d6:e2:a1:32:ab:11:7c:bc: d0:c4:eb:ed:2e:18:86:c1:d7:50:ba:fb:33:17:4b:1b: b7:1c:37:01:83:ce:67:b3:b6:13:36:5f:47:44:76:2e Fingerprint (SHA-256): 96:60:65:1D:0E:B0:06:CB:1D:8C:0F:70:D0:BB:73:D0:79:65:74:A5:AA:6B:9D:F5:7E:92:BF:E0:1F:B3:0E:EA Fingerprint (SHA1): 74:D2:32:AC:79:12:A8:B0:08:F1:74:1D:E4:DB:7B:85:4F:7F:B1:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152328 (0x3cafc588) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:27:05 2023 Not After : Wed Oct 18 15:27:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:92:fa:9e:a9:4f:ee:b7:64:d5:34:2a:0d:2e:56:5d: 9b:d7:a2:93:52:c8:b8:93:48:1c:d6:6e:d8:84:fa:a3: 66:5d:e2:88:60:3d:cb:3f:65:0c:42:36:90:b2:34:75: e9:d1:20:35:57:3d:d0:82:73:65:f6:d4:65:92:d3:e9: 29:67:96:d6:b0:1b:e8:8f:c5:5f:6a:b1:d3:ff:00:ad: bd:ba:53:84:5d:61:44:16:cc:92:4e:2b:c8:a0:85:db: 4e:5e:bd:9b:1e:c6:f7:84:5e:ca:f6:a1:50:43:88:8f: 6d:09:b0:b3:9f:29:5c:84:b9:66:d4:45:c1:c1:09:43: c3:47:5a:40:f7:42:03:55:ce:39:d6:51:e6:e9:98:63: 4b:aa:58:4d:e0:e1:27:59:5d:7e:ab:c3:83:bd:20:fd: cd:6a:a4:ac:5a:9c:ec:15:08:b1:a7:db:32:d2:13:af: 21:5b:01:d2:b0:78:10:df:ad:ec:7c:c7:5d:cd:fe:39: e7:01:68:3c:ac:ec:80:10:b0:ac:80:cd:28:ce:23:92: 73:03:8e:15:11:de:a9:3f:c6:d8:a5:b1:f4:69:62:1d: f8:97:93:26:e8:b7:5c:2b:0d:3f:b9:2f:4a:67:7d:a7: 93:d9:02:bd:dd:cd:40:25:5e:3f:68:9b:08:ae:d0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:49:1b:2c:69:8d:d3:ba:20:96:a5:df:75:6a:ff:db: 86:09:7d:fe:01:4c:ef:95:c5:e4:70:37:90:98:c4:b4: 60:23:63:12:34:63:d1:cc:24:a0:c9:d5:02:b2:d6:87: 42:53:f1:77:d3:4f:d4:b2:33:d6:46:f4:20:30:13:76: 1f:eb:26:48:04:8b:99:29:70:0c:3b:46:4d:43:71:2e: 2d:33:20:c7:1e:8a:a8:e2:e2:12:d8:f1:ce:22:d9:a7: 4e:67:6f:53:4b:14:ca:22:e3:30:eb:20:20:30:36:a4: 0d:e5:c9:11:ef:64:e1:f8:b1:0c:c7:50:cd:65:24:aa: b1:91:84:d4:f4:93:7f:a7:5a:24:ce:d3:25:7b:54:f2: 47:4f:77:7b:df:f3:40:d7:8b:8f:21:80:ed:32:67:17: 34:bf:c0:5e:a1:a1:65:53:45:38:6a:0e:86:f1:a3:9a: 10:21:fb:30:e5:23:b5:9f:18:6b:2c:28:87:42:ca:52: b7:dd:e8:ba:cd:eb:40:97:b9:68:50:70:ef:ad:a2:09: cd:4f:43:51:b1:aa:43:19:d6:e2:a1:32:ab:11:7c:bc: d0:c4:eb:ed:2e:18:86:c1:d7:50:ba:fb:33:17:4b:1b: b7:1c:37:01:83:ce:67:b3:b6:13:36:5f:47:44:76:2e Fingerprint (SHA-256): 96:60:65:1D:0E:B0:06:CB:1D:8C:0F:70:D0:BB:73:D0:79:65:74:A5:AA:6B:9D:F5:7E:92:BF:E0:1F:B3:0E:EA Fingerprint (SHA1): 74:D2:32:AC:79:12:A8:B0:08:F1:74:1D:E4:DB:7B:85:4F:7F:B1:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152331 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152332 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152333 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018152334 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018152335 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018152336 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018152337 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152331 (0x3cafc58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:13 2023 Not After : Wed Oct 18 15:27:13 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:af:1e:53:06:c9:c9:11:47:9f:56:e6:a2:c1:8f:91: 65:0f:64:9a:9c:c7:1f:96:7b:4b:c2:4f:7c:f8:48:db: f8:10:65:8e:ca:e2:9e:3d:8f:e5:7d:25:d0:53:f4:53: 36:1e:a9:f1:b3:7b:3b:1c:95:fb:56:a3:24:8d:f6:46: a8:7d:16:b4:fb:67:53:5d:69:15:3f:7b:c2:ba:00:86: b5:ef:0e:1d:fe:71:f5:e5:8a:41:ff:5a:7d:34:59:6e: 0d:32:e6:8d:0e:90:eb:ad:38:95:ed:08:14:7a:d4:b1: cc:80:f1:9f:3c:da:0c:0d:bb:e2:47:ef:99:4c:1d:18: 38:6d:29:2a:c8:19:c2:f1:85:b2:13:13:06:4c:34:ef: 46:2e:d4:62:25:de:81:78:a6:51:42:df:f3:e1:22:b3: 50:f3:3b:81:3a:95:8b:c5:9d:7a:31:9e:21:73:b1:d0: 62:62:b4:58:f2:64:fd:55:22:e1:aa:cd:df:36:00:a3: f4:d1:d6:21:9d:30:fe:11:6e:ff:eb:da:7b:79:e8:a2: cd:5c:61:35:c0:b2:a4:24:f6:82:d7:a2:31:da:82:26: 85:ef:9a:fe:78:c6:6e:f5:76:97:5e:c1:38:42:98:2c: 8f:fa:b5:bf:8f:09:31:6d:9a:81:c5:75:86:ca:18:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ce:e2:b0:ca:04:ee:e7:3f:51:68:7f:f8:9c:e5:b7: 7d:15:ef:48:05:27:2b:75:0e:68:34:5e:34:23:f2:3a: 4d:5b:4c:53:a6:7b:be:94:11:28:d2:e1:51:3f:14:a4: 4f:70:d4:a5:da:de:aa:6b:8a:d4:bc:ed:19:60:9d:bf: 22:80:62:ea:e9:2c:eb:33:c8:c4:fb:f2:92:07:11:3a: c6:a0:f3:05:0d:2f:46:75:ad:26:11:46:37:0b:c1:c5: 67:a4:a7:4a:bf:b7:e8:41:9c:c0:aa:1d:13:ca:6b:1d: 96:0e:b5:1a:7f:d6:47:47:af:92:ba:8b:f5:a9:c0:13: d5:23:eb:73:9b:20:59:60:6f:c6:46:0e:fc:2a:22:d0: b9:92:0c:dd:9e:2d:f5:12:44:bb:b0:69:dc:c2:24:06: 61:08:62:dd:06:28:d6:d2:3b:a9:4a:47:2f:e6:32:d1: c2:7f:6f:2d:5a:7a:90:b9:e5:a0:f5:75:3b:75:43:ad: 09:6e:08:05:3a:e6:21:af:f5:cd:6e:35:b8:26:59:92: e6:94:de:c2:c0:0c:0c:40:1d:0f:0a:ba:19:a9:13:9c: bf:99:12:10:dc:7a:5c:32:77:64:ea:28:73:a5:e2:3c: d5:a9:a7:c0:c2:3f:14:56:ec:07:ad:92:39:bb:48:33 Fingerprint (SHA-256): B7:8E:CC:07:1B:92:22:6E:72:CA:38:65:9F:43:42:B3:5A:21:55:81:B1:89:F8:B7:7F:63:57:20:01:50:1C:48 Fingerprint (SHA1): B1:C2:53:3C:69:A8:2C:2D:D9:DF:05:8A:B5:28:83:29:51:26:F7:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152331 (0x3cafc58b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:13 2023 Not After : Wed Oct 18 15:27:13 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:af:1e:53:06:c9:c9:11:47:9f:56:e6:a2:c1:8f:91: 65:0f:64:9a:9c:c7:1f:96:7b:4b:c2:4f:7c:f8:48:db: f8:10:65:8e:ca:e2:9e:3d:8f:e5:7d:25:d0:53:f4:53: 36:1e:a9:f1:b3:7b:3b:1c:95:fb:56:a3:24:8d:f6:46: a8:7d:16:b4:fb:67:53:5d:69:15:3f:7b:c2:ba:00:86: b5:ef:0e:1d:fe:71:f5:e5:8a:41:ff:5a:7d:34:59:6e: 0d:32:e6:8d:0e:90:eb:ad:38:95:ed:08:14:7a:d4:b1: cc:80:f1:9f:3c:da:0c:0d:bb:e2:47:ef:99:4c:1d:18: 38:6d:29:2a:c8:19:c2:f1:85:b2:13:13:06:4c:34:ef: 46:2e:d4:62:25:de:81:78:a6:51:42:df:f3:e1:22:b3: 50:f3:3b:81:3a:95:8b:c5:9d:7a:31:9e:21:73:b1:d0: 62:62:b4:58:f2:64:fd:55:22:e1:aa:cd:df:36:00:a3: f4:d1:d6:21:9d:30:fe:11:6e:ff:eb:da:7b:79:e8:a2: cd:5c:61:35:c0:b2:a4:24:f6:82:d7:a2:31:da:82:26: 85:ef:9a:fe:78:c6:6e:f5:76:97:5e:c1:38:42:98:2c: 8f:fa:b5:bf:8f:09:31:6d:9a:81:c5:75:86:ca:18:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ce:e2:b0:ca:04:ee:e7:3f:51:68:7f:f8:9c:e5:b7: 7d:15:ef:48:05:27:2b:75:0e:68:34:5e:34:23:f2:3a: 4d:5b:4c:53:a6:7b:be:94:11:28:d2:e1:51:3f:14:a4: 4f:70:d4:a5:da:de:aa:6b:8a:d4:bc:ed:19:60:9d:bf: 22:80:62:ea:e9:2c:eb:33:c8:c4:fb:f2:92:07:11:3a: c6:a0:f3:05:0d:2f:46:75:ad:26:11:46:37:0b:c1:c5: 67:a4:a7:4a:bf:b7:e8:41:9c:c0:aa:1d:13:ca:6b:1d: 96:0e:b5:1a:7f:d6:47:47:af:92:ba:8b:f5:a9:c0:13: d5:23:eb:73:9b:20:59:60:6f:c6:46:0e:fc:2a:22:d0: b9:92:0c:dd:9e:2d:f5:12:44:bb:b0:69:dc:c2:24:06: 61:08:62:dd:06:28:d6:d2:3b:a9:4a:47:2f:e6:32:d1: c2:7f:6f:2d:5a:7a:90:b9:e5:a0:f5:75:3b:75:43:ad: 09:6e:08:05:3a:e6:21:af:f5:cd:6e:35:b8:26:59:92: e6:94:de:c2:c0:0c:0c:40:1d:0f:0a:ba:19:a9:13:9c: bf:99:12:10:dc:7a:5c:32:77:64:ea:28:73:a5:e2:3c: d5:a9:a7:c0:c2:3f:14:56:ec:07:ad:92:39:bb:48:33 Fingerprint (SHA-256): B7:8E:CC:07:1B:92:22:6E:72:CA:38:65:9F:43:42:B3:5A:21:55:81:B1:89:F8:B7:7F:63:57:20:01:50:1C:48 Fingerprint (SHA1): B1:C2:53:3C:69:A8:2C:2D:D9:DF:05:8A:B5:28:83:29:51:26:F7:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152338 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152339 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018152340 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018152341 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018152342 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018152343 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018152344 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018152345 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018152346 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018152347 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018152348 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018152349 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018152350 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018152351 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018152352 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018152353 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018152354 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018152355 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018152356 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018152357 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018152358 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018152359 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018152360 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018152361 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018152362 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018152363 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018152364 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018152365 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018152366 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018152367 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152338 (0x3cafc592) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:27:22 2023 Not After : Wed Oct 18 15:27:22 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:56:8a:b7:57:fb:8f:15:ee:38:f5:23:08:24:a0:08: 01:35:24:3f:25:ce:38:7c:c7:02:e7:d9:07:62:14:13: ee:04:1a:74:d3:33:5d:31:b9:aa:00:5e:1e:70:72:9b: 78:c8:d5:e2:65:1c:31:2a:a7:0f:3b:40:e8:a9:93:39: c5:aa:4d:f3:5d:df:02:da:09:ee:27:a5:a0:8b:ec:9f: 8a:4d:6a:45:d7:3f:de:f1:99:95:1c:9e:52:f6:06:e1: 03:c0:dd:5b:32:f4:0e:b2:d0:fa:e3:dd:3a:39:17:20: ed:95:e5:db:ce:95:b0:d9:05:f6:11:e1:96:ed:60:a2: 4f:2f:cf:6c:b0:d2:43:0e:89:fa:47:65:08:ab:4f:cf: 2b:f0:25:66:54:09:f4:73:8c:ee:93:78:00:56:41:c7: db:a8:df:bf:18:98:2f:69:55:0c:91:7d:f7:b2:71:3a: eb:76:c7:df:8f:e5:f2:53:d5:0b:4f:60:39:f8:04:17: 9a:f5:7a:ee:24:e5:8c:ae:3e:95:d2:1f:a3:d4:3d:b6: 18:da:27:e9:b0:5b:e8:ce:de:02:2d:45:9e:88:dc:99: 81:1d:f9:d0:3c:d1:61:6d:93:95:0c:d6:20:94:7d:07: a6:01:c4:c7:30:e3:03:71:9c:e7:3c:8f:f1:9a:a5:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:46:98:fa:99:68:e8:26:e0:d3:cd:db:dc:3b:cc:d6: 02:c2:9a:db:8d:34:b6:df:77:ee:c7:c6:d2:59:13:af: f0:e2:98:7d:19:39:a4:b5:3f:6a:81:f1:de:91:7b:6e: c6:e3:4b:2f:38:11:cb:1b:95:51:e1:43:d4:92:31:96: ca:a1:b3:29:ff:39:13:76:ae:71:e4:e4:60:65:58:6e: 6e:62:c3:66:67:08:18:bf:38:24:0d:38:81:4e:7c:e4: 5b:23:b8:3a:11:67:80:5e:df:5b:dc:12:61:72:99:1d: 73:0c:37:11:86:68:01:7c:e9:89:b0:20:72:b0:57:51: ea:5d:3e:3c:5c:b7:2b:3e:ba:68:b7:25:f5:74:6c:e2: a9:5f:b6:5d:1f:c6:0c:71:e7:44:61:a8:5e:72:47:17: 39:86:47:1c:65:29:1f:30:fd:65:01:92:1e:86:32:cf: 6d:de:52:53:71:a4:16:75:a4:e7:e0:84:cc:c4:a4:fa: a0:6a:ed:af:ed:8a:cf:4f:78:d5:22:77:17:d6:9e:8a: 49:ff:96:c4:d7:dc:af:61:ca:eb:83:1a:32:7b:f7:ab: ee:45:4f:8b:32:60:06:92:0d:39:2e:57:61:0d:d8:82: f9:e4:71:f5:e1:98:47:00:1f:26:30:08:d1:64:17:ba Fingerprint (SHA-256): FB:DA:A3:86:BD:E4:3A:F9:A7:74:7F:5D:36:88:9D:58:B7:6F:EA:55:E8:B5:31:DF:FD:7C:7D:7B:EC:88:94:7E Fingerprint (SHA1): F9:7C:D7:AE:14:F1:12:D9:5F:A3:AA:6F:0A:43:F8:31:50:03:57:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152368 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018152369 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018152370 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018152371 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018152372 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018152373 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018152374 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152368 (0x3cafc5b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:07 2023 Not After : Wed Oct 18 15:28:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:fe:db:c3:53:09:1e:2d:68:ea:ba:0a:8a:28:35:5e: 7e:75:a6:57:d9:1c:7d:2e:bb:88:da:d3:04:56:89:c0: 4e:c4:64:37:65:c2:39:fc:45:be:82:fb:16:c4:9a:89: 57:93:13:6e:83:4f:ed:5c:50:70:da:80:f9:e1:c7:f7: fb:89:b9:18:d7:cb:ee:f2:eb:79:88:d2:cd:23:0d:e5: e3:94:41:dd:a0:82:8b:82:f0:8c:5b:95:e6:47:c6:b7: cb:6a:da:59:fa:c3:b1:8b:bd:dc:e2:7a:86:7f:0a:f4: 86:f2:42:98:6f:0b:c3:7a:f6:77:d8:a7:ac:f5:5b:9d: bd:08:53:9e:e0:2d:25:38:11:c5:0a:0d:59:0f:1d:50: 51:7b:90:3b:d6:9c:61:42:b8:3a:99:b4:69:c5:34:e2: 0c:79:35:76:8e:29:f5:52:cd:b6:f9:27:4e:40:7f:71: 77:73:4c:7c:16:84:32:dc:b3:80:6a:48:e5:99:e4:92: 82:0e:8f:2f:67:3f:f4:19:88:0d:55:cb:c5:ab:62:d1: 76:bb:3c:ac:28:9e:a8:1f:80:92:9a:da:93:97:d7:60: 26:32:00:d9:53:60:4a:d3:9d:ea:56:b0:19:d7:28:76: d4:e1:d6:a5:c1:ef:a3:b3:2c:0b:b7:41:8f:87:44:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9d:88:2f:7f:75:93:63:1c:2d:cf:09:78:a7:92:2e: 7a:49:89:af:01:66:05:90:1e:7f:21:50:0e:92:25:64: 8b:d1:fe:c8:31:37:f5:1d:6d:65:97:94:ea:26:74:05: 21:df:af:1f:7f:00:dd:57:b1:91:7f:fa:16:5d:77:89: 7f:ee:9a:e8:5c:cd:02:aa:fc:ad:b4:81:30:81:f0:c3: 03:a2:d6:d0:f3:b0:e7:40:f7:f6:12:9b:26:eb:d1:6d: f3:b5:d5:6f:76:23:90:4c:28:d3:21:21:99:ba:aa:22: b9:2c:1e:9a:03:98:66:cf:a8:c9:c5:74:00:5a:d5:f8: 65:da:2b:b5:5e:d3:9d:8b:48:80:fb:3e:07:bd:e9:67: f4:e8:fb:24:de:3b:4e:6c:a7:39:0f:d2:96:73:5d:a2: d6:1e:96:ad:29:b6:81:5d:38:be:c8:0a:b7:fb:3d:a8: e9:c2:9b:83:ff:2d:d6:bf:5c:ae:6c:a7:f8:3d:7d:5c: 65:f6:b2:d1:b7:80:b8:1e:06:33:98:3e:5a:d5:a4:e9: 11:1f:51:c7:5a:12:2d:6a:1e:10:ac:4f:78:d3:98:c6: 1d:95:04:b0:54:6b:ac:99:db:e3:f7:37:14:5d:fa:01: 25:ad:36:0a:62:a4:b9:3b:45:f0:29:ff:cd:8d:41:96 Fingerprint (SHA-256): CF:F3:25:8A:B1:9A:3F:A2:96:7C:3A:76:A2:F9:9E:E2:DB:C0:47:74:37:3E:57:D9:39:2C:64:E0:3C:51:6A:B6 Fingerprint (SHA1): 7B:8D:74:67:D0:8A:16:56:1F:80:56:A7:EB:CC:2A:04:6E:6A:B9:FD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152368 (0x3cafc5b0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:07 2023 Not After : Wed Oct 18 15:28:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:fe:db:c3:53:09:1e:2d:68:ea:ba:0a:8a:28:35:5e: 7e:75:a6:57:d9:1c:7d:2e:bb:88:da:d3:04:56:89:c0: 4e:c4:64:37:65:c2:39:fc:45:be:82:fb:16:c4:9a:89: 57:93:13:6e:83:4f:ed:5c:50:70:da:80:f9:e1:c7:f7: fb:89:b9:18:d7:cb:ee:f2:eb:79:88:d2:cd:23:0d:e5: e3:94:41:dd:a0:82:8b:82:f0:8c:5b:95:e6:47:c6:b7: cb:6a:da:59:fa:c3:b1:8b:bd:dc:e2:7a:86:7f:0a:f4: 86:f2:42:98:6f:0b:c3:7a:f6:77:d8:a7:ac:f5:5b:9d: bd:08:53:9e:e0:2d:25:38:11:c5:0a:0d:59:0f:1d:50: 51:7b:90:3b:d6:9c:61:42:b8:3a:99:b4:69:c5:34:e2: 0c:79:35:76:8e:29:f5:52:cd:b6:f9:27:4e:40:7f:71: 77:73:4c:7c:16:84:32:dc:b3:80:6a:48:e5:99:e4:92: 82:0e:8f:2f:67:3f:f4:19:88:0d:55:cb:c5:ab:62:d1: 76:bb:3c:ac:28:9e:a8:1f:80:92:9a:da:93:97:d7:60: 26:32:00:d9:53:60:4a:d3:9d:ea:56:b0:19:d7:28:76: d4:e1:d6:a5:c1:ef:a3:b3:2c:0b:b7:41:8f:87:44:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9d:88:2f:7f:75:93:63:1c:2d:cf:09:78:a7:92:2e: 7a:49:89:af:01:66:05:90:1e:7f:21:50:0e:92:25:64: 8b:d1:fe:c8:31:37:f5:1d:6d:65:97:94:ea:26:74:05: 21:df:af:1f:7f:00:dd:57:b1:91:7f:fa:16:5d:77:89: 7f:ee:9a:e8:5c:cd:02:aa:fc:ad:b4:81:30:81:f0:c3: 03:a2:d6:d0:f3:b0:e7:40:f7:f6:12:9b:26:eb:d1:6d: f3:b5:d5:6f:76:23:90:4c:28:d3:21:21:99:ba:aa:22: b9:2c:1e:9a:03:98:66:cf:a8:c9:c5:74:00:5a:d5:f8: 65:da:2b:b5:5e:d3:9d:8b:48:80:fb:3e:07:bd:e9:67: f4:e8:fb:24:de:3b:4e:6c:a7:39:0f:d2:96:73:5d:a2: d6:1e:96:ad:29:b6:81:5d:38:be:c8:0a:b7:fb:3d:a8: e9:c2:9b:83:ff:2d:d6:bf:5c:ae:6c:a7:f8:3d:7d:5c: 65:f6:b2:d1:b7:80:b8:1e:06:33:98:3e:5a:d5:a4:e9: 11:1f:51:c7:5a:12:2d:6a:1e:10:ac:4f:78:d3:98:c6: 1d:95:04:b0:54:6b:ac:99:db:e3:f7:37:14:5d:fa:01: 25:ad:36:0a:62:a4:b9:3b:45:f0:29:ff:cd:8d:41:96 Fingerprint (SHA-256): CF:F3:25:8A:B1:9A:3F:A2:96:7C:3A:76:A2:F9:9E:E2:DB:C0:47:74:37:3E:57:D9:39:2C:64:E0:3C:51:6A:B6 Fingerprint (SHA1): 7B:8D:74:67:D0:8A:16:56:1F:80:56:A7:EB:CC:2A:04:6E:6A:B9:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152375 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152376 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152377 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152378 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152375 (0x3cafc5b7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:18 2023 Not After : Wed Oct 18 15:28:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:5b:a7:40:cf:0f:29:46:6f:74:39:74:86:da:41:cc: d4:0d:82:73:40:d0:4e:a8:60:cd:6e:61:74:44:08:f4: e2:28:23:7f:8a:ea:55:ea:7e:b1:b1:36:33:b3:56:00: d9:47:14:b9:3d:01:3c:33:4a:c2:df:1a:2e:2d:07:48: 78:cf:34:6d:7d:32:0c:29:74:24:53:33:42:f7:98:89: 21:c7:d0:54:ed:bd:02:69:73:b9:2d:59:97:f4:03:f2: 44:af:5b:30:4b:e4:ed:67:80:e0:c5:be:15:5d:0b:1b: a9:19:5e:6a:78:e1:72:84:65:5d:c2:fb:0f:78:36:1a: 04:51:1d:6f:cb:8f:b0:9f:5e:ce:38:e6:84:17:a1:48: 1f:40:bd:0b:40:f8:e9:17:92:ce:12:5e:e4:c7:73:5d: f0:53:7f:ea:41:af:be:5e:06:ab:49:c1:d6:2a:2b:a1: 89:7d:42:13:73:06:45:7b:9c:08:55:4e:a8:71:45:ce: f3:15:70:c3:be:9f:20:93:ab:c4:0e:ce:a6:a3:4f:e3: f6:f4:28:1c:34:a5:74:2f:d4:3a:60:0f:3e:cd:c4:0b: 88:5f:61:05:43:b9:a6:b8:bf:e4:bf:f2:68:48:b2:e3: 9e:46:ee:ed:92:fd:36:1b:3b:2c:02:73:58:e8:9e:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:e9:f0:30:2a:20:71:f5:dd:dc:37:f8:84:aa:3e:68: 06:f5:2e:d7:e7:e6:69:ab:c8:4d:6a:d4:68:42:d5:24: c9:e7:a3:b6:8e:07:c4:f6:cd:5f:24:74:d7:4b:02:99: fd:73:c4:1a:94:b5:00:78:b8:0b:fe:8c:72:26:d1:f0: 72:61:53:82:67:f0:1b:ed:d6:2f:e2:1f:84:30:c0:8a: c9:dc:a9:8d:62:e4:d7:ba:c8:c6:ca:87:8e:22:30:c0: 1e:83:b8:a3:f4:a3:e8:0c:af:a0:8b:8b:26:3b:7f:6d: 87:24:20:14:93:30:f4:b5:0d:ff:27:77:2f:40:83:57: fd:1e:5c:2d:85:db:b4:9a:a6:a8:f3:f5:43:1d:ad:c9: 4b:0f:ec:50:34:7d:e2:dd:b8:e6:bc:4a:4b:89:9c:c5: c0:ae:46:60:9f:d8:0f:e5:d7:9a:55:43:18:6a:db:ff: 96:18:1c:2e:05:d4:4f:b2:51:82:c3:6a:a7:d4:63:e6: be:01:c9:21:96:b3:2d:9b:1c:fa:f6:c2:b8:6e:de:8c: 74:17:aa:ff:d2:9e:5a:17:74:af:ac:ed:0f:42:7a:df: 97:b3:b5:e6:36:bd:c0:1a:4a:29:b5:95:b5:ff:12:1b: c5:81:27:3a:b9:99:16:95:42:0a:3f:92:b3:ca:0a:8b Fingerprint (SHA-256): E2:19:47:96:4F:2F:09:C6:BD:6F:40:3E:BC:B0:83:7F:53:67:2D:60:38:8B:F4:6C:6A:F6:5A:C1:8C:A8:79:9A Fingerprint (SHA1): 82:9E:28:A7:03:A9:9D:1B:27:2D:BA:38:EC:A3:F9:A0:4A:BF:42:E7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152376 (0x3cafc5b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:19 2023 Not After : Wed Oct 18 15:28:19 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:d5:88:11:3f:da:16:87:5c:db:34:aa:91:b1:f3:4d: d0:0a:4a:08:4a:58:29:5e:28:8c:7a:6d:5a:37:95:a0: fd:8a:56:58:02:35:ee:73:d5:ed:17:72:fc:2c:ed:b2: 87:fd:40:e0:7f:2e:1c:79:f5:3d:75:65:6d:0c:15:41: ee:f4:bb:f5:2b:3e:91:bf:d1:8d:f3:89:ab:5d:54:69: 3b:d8:54:7c:b7:8d:cc:41:31:d0:6c:54:aa:5d:06:c4: 15:c0:76:18:1f:6a:8f:33:3f:4f:2d:30:30:fb:b0:e6: 91:77:51:f1:c8:1f:64:a6:d9:b6:42:ee:bb:f4:ea:6f: 31:a1:cd:ab:99:fa:53:a1:d6:de:76:00:44:2a:e6:21: 42:c7:18:f7:aa:00:b3:07:0e:0c:a3:64:3b:b0:02:0e: e4:c3:05:9f:ef:42:e0:07:f0:c9:7d:94:be:e8:ac:47: 48:2f:25:3d:67:94:f2:fe:7f:6f:5e:e3:db:69:9d:00: a0:b9:b4:c7:c7:8d:3b:a4:b7:36:a0:ec:c2:1e:8e:a6: 9d:1b:cc:d8:8c:16:a1:10:d4:0e:4f:02:2d:2c:3f:8f: f0:c0:0b:22:bd:df:49:95:9f:44:54:fb:9a:50:9b:18: 2f:a2:70:4b:2d:bd:39:ea:91:8b:d0:96:ce:dd:45:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:ec:65:68:d7:f4:f2:d0:ce:2d:6a:12:74:a7:60:e0: 7d:56:ce:f0:43:3d:52:83:25:95:bf:62:c6:6e:85:7c: 92:37:cb:34:2a:13:a1:a6:cb:5d:f2:c1:a2:09:f2:bf: a5:08:7d:97:94:a8:ea:b6:04:de:73:8d:e2:37:03:2a: 2f:84:bb:ac:19:8d:e8:c2:cc:44:c5:05:02:37:8b:23: f4:c7:9a:16:66:19:6d:17:7f:ea:c7:92:20:6f:e5:03: 79:1c:19:e2:30:91:38:fc:7c:2d:4a:d5:55:ab:0b:af: 98:3f:8e:b0:3f:c3:0b:4a:db:52:8b:e0:95:c3:0e:d8: 83:77:40:14:d0:cc:b1:39:dc:98:70:15:68:1f:91:de: ba:5a:88:8a:ab:94:61:de:b1:d0:00:55:86:d1:d4:15: dd:bf:d1:24:df:a5:60:b2:5e:e7:38:96:51:7a:fa:2c: 58:ed:ad:e6:b7:c8:ed:83:db:00:2f:ce:a1:5c:07:d1: 2c:8e:88:4c:d3:8d:c0:eb:97:05:5d:66:d2:ca:39:08: 49:ef:91:2e:c7:a1:07:a4:0e:a2:84:bb:a7:8b:f6:1e: f0:e9:4a:a4:e7:e6:4d:e9:d9:21:82:a2:35:a8:ae:ea: 90:d5:5a:95:05:23:8a:ab:77:41:1a:ad:91:0f:91:39 Fingerprint (SHA-256): 66:E2:AB:0A:0C:4D:E7:43:61:0B:8A:38:FD:E7:4F:6F:BB:5D:FF:AB:41:E2:C3:28:A5:50:1A:84:EC:E8:95:EC Fingerprint (SHA1): AE:D3:E6:7F:AF:71:82:BD:3B:FA:BD:01:18:40:25:9A:31:A4:FB:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152377 (0x3cafc5b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:28:20 2023 Not After : Wed Oct 18 15:28:20 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:c1:d4:82:37:9d:f1:17:58:ee:5b:c2:6a:1e:06:09: 40:6d:f9:1a:ba:59:8a:0c:a1:16:60:a7:9e:af:e1:38: 62:07:88:58:99:f4:08:54:81:e1:1f:51:5d:0a:05:7d: 57:09:a7:6c:d3:18:b1:6c:bd:a9:0d:75:8c:16:65:ab: 26:a4:a0:75:f1:d4:a1:73:9d:2c:c2:4d:a3:cc:d1:49: fd:9a:cf:c0:4a:05:8a:99:3d:b6:b5:d3:a6:ff:b2:8a: ed:18:b7:49:c2:9a:59:04:33:e0:df:37:b9:bd:d6:23: 15:69:e0:77:7c:b6:88:22:da:fa:69:f5:d8:3a:9d:a2: 69:16:7d:8a:da:f3:61:22:ad:1d:ea:ad:9e:36:06:5f: d2:8a:f8:c2:ff:78:07:a7:0a:98:29:c0:7e:97:39:52: 73:66:0d:58:68:b3:a1:05:ea:a2:a8:4d:5f:a0:8b:89: e8:df:9e:56:08:1e:7a:cf:fd:2c:82:40:84:47:41:e2: 46:83:16:8c:3a:6c:0f:7b:75:d9:17:55:6c:89:3c:f3: 63:50:fd:7d:00:87:18:46:bd:7f:98:43:0b:6d:e6:0a: e2:07:a9:29:94:2e:e4:00:58:85:7a:6c:ee:f1:7e:40: 63:6b:2d:80:e7:ad:00:a7:23:90:3d:76:19:82:c0:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:a7:db:a8:67:99:f9:12:8f:01:be:61:b7:82:e8:37: d5:59:be:88:54:5f:d1:e0:a8:c1:89:89:2f:e8:2e:77: 84:b9:ae:50:b1:b5:ff:9d:69:74:f7:ec:d2:86:34:28: 88:f5:c4:62:30:6e:c7:6d:22:58:26:7a:bf:31:66:bc: b4:0c:79:26:96:19:b2:3d:9b:c9:7e:c5:37:9f:b2:0e: 0a:76:f5:76:0c:a9:54:f1:9f:30:6d:ee:f7:78:00:49: cc:48:fb:93:2d:52:93:78:8d:e7:f5:7a:6f:7a:a8:fd: a5:04:a3:e8:a2:2c:77:c5:e0:52:3d:1b:f2:2a:37:d2: df:1e:2c:5e:6d:56:42:82:80:fb:fe:ef:e0:7e:be:d0: d8:b7:3d:ed:19:85:5c:44:2c:d3:75:2e:99:b6:a0:72: 45:21:11:84:08:55:9b:ee:61:e4:2e:d6:73:32:c0:cd: ed:35:d6:38:5d:24:5d:a3:97:4a:fb:4a:44:b9:b0:2a: 20:df:51:fd:6a:71:69:46:77:eb:e7:fd:4f:f1:51:95: 00:f2:60:0b:c4:f6:b1:e8:dd:27:db:01:20:28:f3:5a: f0:e7:76:15:b5:da:8c:33:3b:d9:4c:91:06:68:23:14: d0:6c:77:51:63:af:26:67:24:ad:8e:37:d4:f7:2e:4b Fingerprint (SHA-256): AE:0F:F8:D8:6C:5C:5D:28:E5:D1:0B:DA:F2:88:44:FA:9D:D1:F1:63:06:7A:E6:4D:3D:18:BA:63:6F:AE:2D:F0 Fingerprint (SHA1): 9B:6E:02:4B:50:ED:2A:5C:88:05:7B:05:10:BB:FD:32:F1:80:1C:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152379 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152380 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152381 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018152382 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018152383 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152379 (0x3cafc5bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:23 2023 Not After : Wed Oct 18 15:28:23 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:e7:17:94:b0:e5:09:e2:6f:f1:cc:33:8f:61:72:6b: 51:48:71:4a:2a:d5:79:d9:05:28:c4:98:de:6e:fb:78: 94:04:04:e3:22:9a:1d:61:4d:c4:7d:f3:d4:d2:11:15: 09:aa:f6:2f:08:2b:22:7b:2d:77:9d:cb:4a:6d:26:85: 7f:c0:85:69:fe:a9:ad:0b:cc:4d:ad:24:fe:fb:50:e7: a5:98:e1:ef:8e:3d:85:98:64:74:5d:01:17:c4:31:f2: c4:96:b9:e0:17:14:b6:4c:c5:bc:99:67:7d:21:39:50: 05:d9:72:f5:d7:af:39:3b:2b:cc:ea:be:f8:2c:a8:18: 85:7c:99:49:5d:8b:f0:ca:9a:fb:76:42:6e:ca:8b:11: 0d:1f:2c:09:c6:e0:cf:e9:30:50:9a:52:b1:90:b7:e4: 74:0f:56:65:ea:5d:ac:f7:7a:1f:42:bd:b7:9b:00:46: bc:d3:4a:2f:a7:63:5c:5d:a8:ee:96:0e:c8:44:b2:bd: 76:9b:63:2d:35:8a:e7:86:ff:bf:1b:52:c8:9e:4a:55: 71:07:f9:6e:53:a2:f7:b8:4c:20:f4:52:ca:32:7a:46: cf:03:10:5a:3f:5b:6a:0c:f6:ec:6a:f3:63:36:4b:5c: 6d:bd:6a:45:ea:9d:4c:04:cd:fb:d1:e2:f5:95:fb:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:c2:2b:bc:ba:91:23:99:ae:86:55:df:96:21:b2:dd: 24:75:21:a8:05:f4:7a:91:9d:9e:0b:2e:c0:db:f1:1f: 31:6b:84:f8:14:d5:53:dd:ea:a3:9e:d6:3f:fc:66:1f: aa:98:02:73:a0:de:1b:84:f7:1c:a5:36:83:a9:49:18: ae:7f:03:6a:67:a8:53:62:41:64:e5:df:60:cc:e8:a5: 60:1a:f8:19:26:79:3e:1a:2c:ee:a1:e2:16:4d:d7:14: 0a:00:4a:c8:73:e2:1f:2c:7e:a3:14:7a:d1:7d:81:43: 15:28:5c:0f:60:35:55:c1:af:04:d8:28:c9:78:f8:21: 4f:45:be:3d:07:a2:94:8e:c7:5b:75:83:bf:0c:b8:31: cd:5b:28:2d:44:60:e5:f7:67:52:8d:8b:c2:6e:7a:86: 16:6f:40:f0:5b:6e:71:c8:a5:10:51:56:cd:89:52:c8: da:fb:34:34:25:15:91:73:fb:b9:5a:1b:a5:13:87:19: 0a:26:a8:e3:f5:ec:7a:fd:18:c5:4f:50:a7:80:88:5f: bc:d1:60:f7:84:1c:e2:89:f6:83:d7:21:32:d9:9e:54: cd:dd:46:42:43:25:f2:04:16:cd:f1:a7:78:a4:1d:ad: 32:cd:89:1a:67:26:1e:d6:e2:00:77:a5:ea:f6:7f:06 Fingerprint (SHA-256): 30:A5:9C:F6:8D:9B:69:75:3A:2D:C2:98:82:16:99:05:A6:34:3E:48:15:BA:10:4D:9E:3C:8C:E8:27:CC:0C:84 Fingerprint (SHA1): 96:B4:9D:2D:BF:88:0C:F2:B5:5C:B3:74:63:FB:F1:0D:0F:69:9E:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152380 (0x3cafc5bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:24 2023 Not After : Wed Oct 18 15:28:24 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:07:89:28:87:9e:5a:a9:ae:27:10:20:5c:1e:2a:af: 2f:7d:27:db:53:f0:01:37:b8:7c:81:2a:66:30:2f:dd: 29:0b:95:e4:95:76:16:d2:1e:c9:cc:83:c2:3c:b4:a4: c8:e7:dd:12:9f:01:1a:0b:c4:8c:30:a8:7a:86:c3:ed: da:c7:f5:26:46:de:eb:bf:8e:b6:a0:c4:4e:28:94:0b: 7f:33:90:78:90:60:4c:74:02:71:bd:be:e4:f2:23:a7: 7e:ae:d6:ed:f4:0a:3f:ff:bd:09:53:c0:4f:6d:9b:da: 8f:8e:10:23:ec:6f:9b:18:9a:59:50:e5:20:2e:5d:ea: 3e:dd:85:3a:f5:a1:02:0b:09:44:ec:7d:bb:59:ba:af: 89:ab:58:63:6e:7f:61:0b:c0:da:38:8b:5b:13:7b:df: 29:c7:33:09:c6:50:0c:75:63:e1:46:8a:82:50:4b:e1: d8:09:e2:15:40:a5:ee:c1:42:64:10:44:a9:94:dc:5e: 1e:5d:56:21:e3:88:46:5a:80:5f:65:5f:b3:62:42:6b: a0:ff:4e:b8:80:90:c9:b1:a8:3e:20:35:7b:15:cb:cc: ec:3e:d4:96:f8:b6:03:a6:7f:bf:c6:67:79:b9:8a:a1: 3c:20:24:ad:18:c9:fa:91:30:2c:49:39:9a:15:ae:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:39:31:34:d7:54:40:60:8a:52:ed:38:c3:2b:c8:ce: eb:36:bb:77:c3:f3:46:23:ff:1c:7b:ea:f1:82:36:b0: 04:c7:5a:9a:3b:03:3f:fc:17:e0:28:30:08:0a:71:2a: 0d:f0:71:dd:85:e3:31:23:ab:2d:47:6a:5a:20:73:d3: ca:5d:fd:4e:f0:52:67:84:bf:46:c6:56:07:c9:b8:67: 2c:c7:7f:81:3e:af:12:63:b8:3e:cb:ff:8a:08:0e:5b: 6a:f3:fa:ff:1b:aa:2e:a0:af:4f:52:0a:8f:23:9f:46: 96:ce:71:57:05:aa:cd:28:a5:6f:65:5b:c3:11:9c:72: 1c:f0:47:50:2d:96:9b:e0:fe:d5:d7:7b:f8:a5:e1:20: 40:95:ee:e9:29:02:40:bc:d3:f9:4f:1d:60:b6:35:04: 5d:9b:89:cf:fb:4a:fa:09:f5:84:29:50:aa:e9:c7:51: 6c:ca:ab:e4:1f:6f:be:8a:2b:33:b7:be:fe:d1:31:4d: f3:b0:38:37:ec:7e:44:e9:c8:46:a9:b7:fa:c7:64:1a: ab:8a:85:65:51:07:79:50:cb:06:e9:88:bb:20:8a:15: 3d:f2:98:36:ae:ac:2e:71:92:d7:cf:c5:2f:28:60:01: 0b:b9:ac:b4:3d:61:05:36:67:f9:8d:ae:76:cf:a1:30 Fingerprint (SHA-256): A1:B8:47:4E:01:9E:F5:41:8E:0E:3E:07:B7:69:9A:97:2E:31:F1:69:EE:F8:EF:74:57:CD:BB:1A:91:20:35:D8 Fingerprint (SHA1): 54:8E:57:D2:65:A7:D1:A9:16:F0:2D:74:DA:3A:85:67:97:94:1F:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152381 (0x3cafc5bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:28:26 2023 Not After : Wed Oct 18 15:28:26 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:1e:ed:2f:46:24:84:22:f0:e1:3e:03:4c:5f:92:d2: 56:7e:0a:07:4a:53:36:a7:59:7b:ae:21:6c:58:77:ef: 59:67:a2:4b:26:68:db:fa:80:0f:11:c2:d1:8c:90:fe: 74:86:9b:c4:0a:59:18:13:85:70:b0:b3:64:ec:a4:7f: 5d:f4:64:f0:d4:1b:1f:0e:2e:03:ae:5d:96:ab:eb:ad: 99:8c:99:15:5e:29:2c:e6:59:5c:81:6b:66:5b:c9:34: af:32:8c:88:80:f9:5b:d4:d8:2b:11:be:00:91:23:53: 41:2f:16:6b:6b:1d:42:8c:eb:0c:d6:63:cb:c2:76:51: 5c:27:34:9f:f9:41:e9:fe:63:cf:00:a8:5b:0f:a1:d2: 09:9c:1e:df:de:70:b2:d3:78:5d:51:67:15:58:9a:e5: 06:81:c6:23:ff:27:e3:1e:94:54:cb:2d:2e:4d:42:fe: e0:be:1a:48:65:dc:83:a9:d3:aa:ee:e0:f3:0c:d7:34: 25:65:76:1d:a6:f2:81:2e:ff:82:f0:b8:78:a8:0c:55: 6c:a5:1c:dd:ac:c4:fb:ab:14:b0:a6:01:4b:de:eb:33: 05:01:5c:7c:1b:6b:a7:2a:a2:d0:8a:83:02:59:0b:21: 5e:f2:0e:9a:93:31:13:08:ce:aa:d5:1d:9a:f9:9a:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:18:36:ae:87:13:e3:6d:01:ba:fd:8b:1b:79:29:15: 11:95:9e:f7:76:ef:ae:66:02:84:4a:57:a9:bd:94:21: 8e:65:d6:1c:5d:25:b3:51:d0:4a:e7:86:2d:b5:a1:41: 4e:e8:01:0c:a4:86:43:51:b0:c9:28:9c:4f:87:37:bc: fc:f1:74:ce:ad:07:70:86:da:bf:37:a2:11:b0:f1:bd: 43:3e:fd:a8:41:7b:41:09:67:52:a9:20:38:03:8d:61: be:88:d5:39:af:69:10:3c:5f:70:78:cf:65:ff:14:a1: aa:71:a0:11:a6:ac:f8:3f:b1:1d:80:24:2a:8a:0f:5d: dd:bb:df:22:34:c9:37:a0:fb:ec:93:2c:54:bc:81:f5: 70:ff:a4:57:04:5b:dc:67:a4:e3:17:f7:0e:06:6d:98: 9f:4d:44:f2:8c:89:04:28:08:79:ea:28:32:64:fe:4b: 20:9e:f2:65:e1:11:f2:34:56:8d:17:82:57:bf:50:5e: f3:a1:43:d9:95:36:12:42:b0:af:89:75:09:54:02:66: 87:52:fb:bf:12:14:c8:e0:01:22:a5:12:b0:6b:a3:bf: 73:fa:0f:1d:71:9d:21:5a:47:9c:4d:d7:75:37:1f:66: cc:33:51:f9:7f:d2:83:46:a6:9b:43:e2:a6:2f:be:e4 Fingerprint (SHA-256): 6C:EE:F6:A2:35:8C:1A:EA:D0:DE:28:7D:DB:79:CA:F1:C5:10:CB:DC:88:80:38:E2:A4:11:54:70:00:A4:7E:76 Fingerprint (SHA1): D6:2F:CC:B3:D7:58:89:3A:14:60:B2:D3:DF:87:3E:C9:AC:56:1F:02 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152384 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152385 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152386 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018152147.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018152387 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152384 (0x3cafc5c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:28:32 2023 Not After : Wed Oct 18 15:28:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:af:b6:ba:54:10:f5:60:66:68:37:1d:c3:a1:a5:10: 92:3f:9e:46:b5:b8:38:6e:d9:33:e8:fd:42:94:9b:33: bc:7a:fa:03:34:c5:f0:84:93:32:8e:96:89:9a:4e:77: 65:9d:09:76:2e:9c:9d:c8:23:54:84:46:6e:03:91:75: 32:66:02:ff:09:28:c6:81:55:d9:c1:1b:13:c1:91:ee: 7a:e3:a0:35:50:19:2f:ac:46:01:de:20:3d:25:39:74: e7:33:f6:4e:97:c8:a2:24:e4:f9:4e:db:80:dc:07:5f: 46:20:0f:52:a7:27:8f:42:0f:38:c9:aa:cb:26:f8:19: 31:5d:83:47:4d:31:e1:2f:9f:08:6f:73:85:bc:d8:41: 1e:db:a5:4d:ae:44:04:da:78:00:a3:44:42:e0:56:c7: b2:52:d0:bc:04:ab:e5:b3:1f:48:a0:b6:df:b9:8c:b0: 48:c5:62:77:49:bf:ae:bb:4c:90:00:38:f8:41:7d:b9: de:81:1d:23:08:16:fb:39:c4:dd:f9:d0:fa:85:ad:a5: d4:b5:40:3e:61:32:87:e1:01:77:cd:bc:e7:d3:75:54: 53:bc:68:49:f0:07:ff:3a:6a:de:d7:34:f2:50:8b:7c: 58:87:09:5b:69:62:dd:9e:ba:39:f4:e6:20:6f:66:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:91:a2:93:da:43:f2:46:00:dc:51:f4:42:56:e4:ee: ed:05:38:09:bf:c7:ae:84:64:f7:17:2b:3c:30:c3:1e: 58:5e:00:08:1d:5a:c5:78:80:42:8d:57:28:2d:bc:7c: 04:82:bd:38:ae:9e:14:4b:cc:63:a4:c8:a7:73:cf:1f: 3d:e7:e8:3b:a1:6d:50:ab:a0:2e:c3:fe:49:99:25:a1: 30:33:f2:6c:f9:2b:33:74:c4:d2:84:17:a4:65:a9:ec: ea:1b:a8:a5:a1:99:7a:68:56:c1:1a:61:2c:35:68:42: fa:63:f7:54:ec:50:ce:bb:bf:c5:2b:f8:70:0a:e0:a0: dd:cd:de:b4:3c:cd:f6:36:3b:7d:c4:8d:fc:3a:f4:70: 8e:7c:90:ec:65:4f:73:f5:83:89:9e:82:b5:a0:5d:db: b8:34:1c:a3:46:ca:81:38:e1:fa:68:2e:8c:77:f9:49: af:2a:ea:43:fb:5e:f7:bf:b5:ea:13:ed:44:2c:85:e4: 44:d5:72:a4:ce:71:3a:1e:00:5d:1a:60:c5:f2:82:f6: c4:13:e7:77:6c:64:b7:92:d4:33:c9:7a:23:f4:14:e9: d3:09:2b:e5:38:aa:11:5f:37:75:d0:c8:59:c7:1c:db: c6:2e:1a:1f:8b:53:4d:f8:88:3b:dd:05:f3:32:da:34 Fingerprint (SHA-256): 61:F4:C5:16:62:4B:BC:A6:25:E8:46:34:50:A4:6E:1F:00:F2:38:ED:3C:99:A0:31:35:F7:69:24:94:59:B7:1D Fingerprint (SHA1): 88:CA:E6:08:A9:8A:BC:8E:8D:15:AB:64:47:13:38:65:AD:05:4A:8F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152388 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152389 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152390 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152391 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152392 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018152148.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152393 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152389 (0x3cafc5c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:38 2023 Not After : Wed Oct 18 15:28:38 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:37:b4:28:48:5e:d6:4f:3b:49:d3:62:2d:a5:ce:5f: 59:20:fa:52:d1:88:95:32:7e:0a:94:c9:e2:8d:bf:a8: 6f:3b:3c:93:e1:78:b5:e1:f2:63:3c:62:be:da:cd:97: 63:3f:bb:cb:e2:49:13:72:12:91:7c:ef:7d:42:f1:7f: 08:53:cf:6d:7b:01:d2:a6:6b:d2:27:a3:5e:ce:4f:6f: 71:ef:ea:1b:79:0a:bc:60:46:94:d5:b6:d6:4a:3b:f8: 7a:df:33:c6:0a:90:24:41:1f:a1:fa:62:6f:a5:7b:41: 1a:88:b9:af:8d:50:2d:9a:56:d8:bf:90:b8:de:01:25: ea:c7:2d:45:4f:42:32:93:b5:72:bf:f4:9e:0a:c7:28: b6:48:17:63:d0:ad:ec:5a:cd:f1:93:d7:26:f0:8a:90: 66:74:fa:fc:55:08:3c:67:e0:35:04:72:61:4b:fa:74: 01:9f:b9:5b:2d:72:3d:f7:06:e4:c7:b1:60:f4:d8:17: b3:bc:f2:f5:74:b6:99:fc:2e:49:35:8a:3a:26:2f:78: 48:2c:ae:71:dd:5b:db:27:89:6b:2f:9b:d4:18:e5:e5: 52:d3:b5:24:0b:62:28:91:09:2c:6d:df:73:d3:c2:c4: 56:fb:97:c8:0d:98:65:ee:bd:6c:ab:89:7c:fa:74:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:08:66:c7:27:27:48:e7:12:ac:0e:dc:5b:ad:d9:ee: 4b:01:da:64:d0:bd:01:bb:51:12:33:bc:8f:8c:b1:68: 43:cd:34:01:21:f0:57:cd:2b:e3:74:25:48:4c:1c:83: b6:a4:f0:2b:b9:5a:43:2c:05:45:d0:4e:a7:9b:8f:ed: a2:69:d3:81:7e:e6:09:3c:65:92:1e:f4:4a:e5:bf:4c: f6:9a:0b:97:b3:86:ce:8b:4d:dd:e4:df:fb:3e:a4:3b: 10:7c:15:db:04:81:83:09:f6:82:c4:d7:44:b8:91:75: 6a:c7:06:7c:fd:40:c4:15:a1:9b:31:c3:4a:48:cd:59: cc:49:f0:88:38:96:70:f3:4e:bb:30:c3:3f:49:09:f5: 88:86:43:1e:1f:03:4e:b2:11:c7:46:ef:54:de:83:de: 0c:70:cc:9a:4f:5e:ff:a7:94:9e:a0:71:1f:10:83:09: c9:5a:8a:01:56:d0:5b:8e:3f:30:6c:a9:cc:f8:54:22: f7:e3:6f:2f:f0:97:37:0e:1e:53:fe:e5:49:9b:fd:92: aa:5d:f0:62:e6:ba:36:bd:1f:81:ec:cc:ef:bf:38:de: 1b:d3:d6:41:a4:d1:50:2f:b0:7b:d9:1f:fa:d7:a9:92: a6:f4:28:45:c3:fd:d0:cc:35:89:c4:ab:b1:c7:d3:21 Fingerprint (SHA-256): FA:CB:32:3F:BE:C6:35:8D:1A:75:62:E0:E6:15:7C:03:AC:2A:EC:D4:03:C2:7B:A4:0C:E5:D5:E1:34:3A:8B:50 Fingerprint (SHA1): C5:D4:2B:8C:54:A2:AB:2A:39:93:3B:8A:FB:57:F4:2C:6C:C0:43:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152389 (0x3cafc5c5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:38 2023 Not After : Wed Oct 18 15:28:38 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:37:b4:28:48:5e:d6:4f:3b:49:d3:62:2d:a5:ce:5f: 59:20:fa:52:d1:88:95:32:7e:0a:94:c9:e2:8d:bf:a8: 6f:3b:3c:93:e1:78:b5:e1:f2:63:3c:62:be:da:cd:97: 63:3f:bb:cb:e2:49:13:72:12:91:7c:ef:7d:42:f1:7f: 08:53:cf:6d:7b:01:d2:a6:6b:d2:27:a3:5e:ce:4f:6f: 71:ef:ea:1b:79:0a:bc:60:46:94:d5:b6:d6:4a:3b:f8: 7a:df:33:c6:0a:90:24:41:1f:a1:fa:62:6f:a5:7b:41: 1a:88:b9:af:8d:50:2d:9a:56:d8:bf:90:b8:de:01:25: ea:c7:2d:45:4f:42:32:93:b5:72:bf:f4:9e:0a:c7:28: b6:48:17:63:d0:ad:ec:5a:cd:f1:93:d7:26:f0:8a:90: 66:74:fa:fc:55:08:3c:67:e0:35:04:72:61:4b:fa:74: 01:9f:b9:5b:2d:72:3d:f7:06:e4:c7:b1:60:f4:d8:17: b3:bc:f2:f5:74:b6:99:fc:2e:49:35:8a:3a:26:2f:78: 48:2c:ae:71:dd:5b:db:27:89:6b:2f:9b:d4:18:e5:e5: 52:d3:b5:24:0b:62:28:91:09:2c:6d:df:73:d3:c2:c4: 56:fb:97:c8:0d:98:65:ee:bd:6c:ab:89:7c:fa:74:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:08:66:c7:27:27:48:e7:12:ac:0e:dc:5b:ad:d9:ee: 4b:01:da:64:d0:bd:01:bb:51:12:33:bc:8f:8c:b1:68: 43:cd:34:01:21:f0:57:cd:2b:e3:74:25:48:4c:1c:83: b6:a4:f0:2b:b9:5a:43:2c:05:45:d0:4e:a7:9b:8f:ed: a2:69:d3:81:7e:e6:09:3c:65:92:1e:f4:4a:e5:bf:4c: f6:9a:0b:97:b3:86:ce:8b:4d:dd:e4:df:fb:3e:a4:3b: 10:7c:15:db:04:81:83:09:f6:82:c4:d7:44:b8:91:75: 6a:c7:06:7c:fd:40:c4:15:a1:9b:31:c3:4a:48:cd:59: cc:49:f0:88:38:96:70:f3:4e:bb:30:c3:3f:49:09:f5: 88:86:43:1e:1f:03:4e:b2:11:c7:46:ef:54:de:83:de: 0c:70:cc:9a:4f:5e:ff:a7:94:9e:a0:71:1f:10:83:09: c9:5a:8a:01:56:d0:5b:8e:3f:30:6c:a9:cc:f8:54:22: f7:e3:6f:2f:f0:97:37:0e:1e:53:fe:e5:49:9b:fd:92: aa:5d:f0:62:e6:ba:36:bd:1f:81:ec:cc:ef:bf:38:de: 1b:d3:d6:41:a4:d1:50:2f:b0:7b:d9:1f:fa:d7:a9:92: a6:f4:28:45:c3:fd:d0:cc:35:89:c4:ab:b1:c7:d3:21 Fingerprint (SHA-256): FA:CB:32:3F:BE:C6:35:8D:1A:75:62:E0:E6:15:7C:03:AC:2A:EC:D4:03:C2:7B:A4:0C:E5:D5:E1:34:3A:8B:50 Fingerprint (SHA1): C5:D4:2B:8C:54:A2:AB:2A:39:93:3B:8A:FB:57:F4:2C:6C:C0:43:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152394 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152395 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018152396 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018152397 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152398 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018152149.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152399 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018152400 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018152150.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152401 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152395 (0x3cafc5cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:45 2023 Not After : Wed Oct 18 15:28:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:4c:9a:a2:65:2a:e4:bd:3c:aa:79:11:71:04:2e:c6: 2e:aa:3a:04:04:06:be:c4:42:32:c2:37:5f:98:e3:09: 8c:03:6a:f3:2f:11:c3:62:39:df:da:e0:97:8e:d8:42: 4d:db:fb:f8:eb:dd:9f:f6:14:98:09:d1:0c:af:9b:e1: 4d:da:b5:9c:5f:ef:90:d2:f1:bb:0a:bb:7f:49:86:a4: b2:d9:95:d9:3e:d0:08:20:ee:6a:c5:c8:ca:1f:8e:4f: 02:eb:bc:34:cf:15:91:c5:2a:8d:e2:75:47:7a:bc:8e: d8:50:a0:d2:8c:d2:fc:bc:dd:fa:d9:08:7f:22:e3:03: d0:94:61:db:d2:6d:12:bf:23:6d:5c:a2:06:d8:f6:69: f1:ef:ed:11:4e:d8:44:07:6c:22:d3:0e:30:66:21:88: 8e:c1:c4:a8:78:12:48:60:5d:fc:7a:13:f7:b8:77:43: aa:07:32:c8:0e:0e:a5:e5:48:b9:b3:bc:ac:fe:eb:c7: 56:79:61:ec:08:0f:6f:88:83:b4:f3:4d:b6:a2:35:5b: 35:7f:fa:67:1c:e3:2e:d3:be:14:1f:4a:6f:c7:e3:4b: 3d:63:f6:b9:e3:35:3d:f5:4a:13:e5:1c:82:6d:9a:d5: 05:b0:f1:e7:d7:99:e3:21:d6:34:ee:b8:97:e6:5a:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:25:be:19:18:4a:a8:c7:8b:6a:64:3a:12:6e:42:46: 10:2c:94:01:45:7e:6a:39:93:1a:09:bd:32:e0:2e:09: f5:9c:f3:4d:af:87:5d:8c:58:92:af:2a:c5:1b:90:f1: 23:b7:71:a8:0d:81:3f:90:8e:37:2c:ba:c0:db:7d:ee: 5e:47:59:2b:f3:4e:46:34:83:59:d3:73:0d:6c:f9:f7: a2:a7:0d:81:42:d8:04:6e:a1:28:e5:6a:8b:e0:b3:26: b3:ab:c4:d7:44:b4:64:73:79:b8:7e:87:39:b2:db:bc: 9a:39:e4:17:9e:20:e1:d0:0e:78:a0:80:ad:d8:22:1e: 4d:24:09:c3:bf:48:d7:3c:66:ed:df:79:f8:08:47:10: 40:a8:89:a1:b1:74:7a:ec:e6:7c:24:be:e4:2e:ff:43: a6:49:f9:a6:9c:84:ed:f7:68:bd:92:f0:b7:4e:2d:cd: e2:9d:4b:14:9f:58:2e:59:57:34:82:c1:f2:36:50:a5: 3b:0a:5f:45:a2:e6:92:19:99:79:c5:b8:e4:be:14:61: 54:39:36:4f:f8:bf:20:86:bf:24:08:ea:73:43:84:62: 3d:4d:b1:bb:e9:6f:6c:10:57:f5:cc:ee:ef:b7:a6:63: a1:0f:2d:31:76:c9:c4:a0:37:35:ed:22:b3:d2:d5:3c Fingerprint (SHA-256): 05:4F:A9:A4:17:EC:30:46:A3:DE:27:CC:67:94:77:10:DE:AB:A3:52:E2:AB:57:6C:A3:40:22:29:A0:E9:AE:39 Fingerprint (SHA1): 0E:F1:54:E4:A1:B2:15:29:3E:A3:F7:BC:6A:99:91:6B:23:CF:2A:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152395 (0x3cafc5cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:45 2023 Not After : Wed Oct 18 15:28:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:4c:9a:a2:65:2a:e4:bd:3c:aa:79:11:71:04:2e:c6: 2e:aa:3a:04:04:06:be:c4:42:32:c2:37:5f:98:e3:09: 8c:03:6a:f3:2f:11:c3:62:39:df:da:e0:97:8e:d8:42: 4d:db:fb:f8:eb:dd:9f:f6:14:98:09:d1:0c:af:9b:e1: 4d:da:b5:9c:5f:ef:90:d2:f1:bb:0a:bb:7f:49:86:a4: b2:d9:95:d9:3e:d0:08:20:ee:6a:c5:c8:ca:1f:8e:4f: 02:eb:bc:34:cf:15:91:c5:2a:8d:e2:75:47:7a:bc:8e: d8:50:a0:d2:8c:d2:fc:bc:dd:fa:d9:08:7f:22:e3:03: d0:94:61:db:d2:6d:12:bf:23:6d:5c:a2:06:d8:f6:69: f1:ef:ed:11:4e:d8:44:07:6c:22:d3:0e:30:66:21:88: 8e:c1:c4:a8:78:12:48:60:5d:fc:7a:13:f7:b8:77:43: aa:07:32:c8:0e:0e:a5:e5:48:b9:b3:bc:ac:fe:eb:c7: 56:79:61:ec:08:0f:6f:88:83:b4:f3:4d:b6:a2:35:5b: 35:7f:fa:67:1c:e3:2e:d3:be:14:1f:4a:6f:c7:e3:4b: 3d:63:f6:b9:e3:35:3d:f5:4a:13:e5:1c:82:6d:9a:d5: 05:b0:f1:e7:d7:99:e3:21:d6:34:ee:b8:97:e6:5a:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:25:be:19:18:4a:a8:c7:8b:6a:64:3a:12:6e:42:46: 10:2c:94:01:45:7e:6a:39:93:1a:09:bd:32:e0:2e:09: f5:9c:f3:4d:af:87:5d:8c:58:92:af:2a:c5:1b:90:f1: 23:b7:71:a8:0d:81:3f:90:8e:37:2c:ba:c0:db:7d:ee: 5e:47:59:2b:f3:4e:46:34:83:59:d3:73:0d:6c:f9:f7: a2:a7:0d:81:42:d8:04:6e:a1:28:e5:6a:8b:e0:b3:26: b3:ab:c4:d7:44:b4:64:73:79:b8:7e:87:39:b2:db:bc: 9a:39:e4:17:9e:20:e1:d0:0e:78:a0:80:ad:d8:22:1e: 4d:24:09:c3:bf:48:d7:3c:66:ed:df:79:f8:08:47:10: 40:a8:89:a1:b1:74:7a:ec:e6:7c:24:be:e4:2e:ff:43: a6:49:f9:a6:9c:84:ed:f7:68:bd:92:f0:b7:4e:2d:cd: e2:9d:4b:14:9f:58:2e:59:57:34:82:c1:f2:36:50:a5: 3b:0a:5f:45:a2:e6:92:19:99:79:c5:b8:e4:be:14:61: 54:39:36:4f:f8:bf:20:86:bf:24:08:ea:73:43:84:62: 3d:4d:b1:bb:e9:6f:6c:10:57:f5:cc:ee:ef:b7:a6:63: a1:0f:2d:31:76:c9:c4:a0:37:35:ed:22:b3:d2:d5:3c Fingerprint (SHA-256): 05:4F:A9:A4:17:EC:30:46:A3:DE:27:CC:67:94:77:10:DE:AB:A3:52:E2:AB:57:6C:A3:40:22:29:A0:E9:AE:39 Fingerprint (SHA1): 0E:F1:54:E4:A1:B2:15:29:3E:A3:F7:BC:6A:99:91:6B:23:CF:2A:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152394 (0x3cafc5ca) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:28:44 2023 Not After : Wed Oct 18 15:28:44 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:43:42:b5:a1:58:4f:4e:0d:d5:a0:7f:4f:44:84:af: a5:b0:bd:78:9c:f2:c6:e5:52:9b:29:15:da:79:22:02: f1:ab:e1:f6:bb:62:f5:ec:a9:66:8e:a9:30:c9:47:f1: 97:70:b9:8b:c2:92:2f:28:73:f6:df:6d:1c:87:6e:94: ab:22:e2:2c:ce:1c:61:b6:c2:f2:cc:42:a6:ce:cf:af: f1:c6:25:59:d2:55:62:2e:c8:a0:23:4d:d7:ab:b0:3b: 4b:19:fc:3a:29:3e:36:5e:0b:78:e8:e2:66:5c:1a:8c: 5f:b4:9d:7d:d8:e6:4b:a9:3b:87:18:34:37:de:50:4a: 78:8d:8b:e6:9b:b9:c6:83:92:20:4e:e7:36:74:7b:69: 19:99:eb:3d:f0:ec:e6:a5:33:11:0f:af:c5:ea:25:de: d0:02:18:9f:f2:25:5d:b9:d5:ac:ae:85:19:99:05:e5: 67:b7:93:a9:28:68:5b:93:bb:c2:9c:fd:ed:ea:6f:ab: 3c:86:df:7b:3f:20:a1:b6:01:91:6c:48:1f:9f:a7:ed: 48:09:87:15:63:42:2c:5b:56:99:bc:19:c7:8b:ec:fc: 52:d7:49:5f:ad:4e:48:8d:d9:34:52:a0:00:af:8d:33: 66:45:0f:bc:b4:69:99:cf:00:69:0d:d5:22:23:9a:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:63:d9:8d:db:07:f4:f4:69:db:a7:63:e0:bc:f6:f9: d5:bf:e6:0c:f2:1c:b3:22:08:4b:b5:5b:68:ba:d0:14: f9:61:9d:18:6e:16:b7:bd:f1:7f:8d:06:1a:06:2e:da: 29:39:58:88:32:6d:7d:a4:68:7f:6a:8a:f5:2e:53:82: 29:62:67:b3:94:54:3b:4b:ff:02:c5:15:01:f1:03:5f: 18:61:78:35:54:fe:ae:5a:18:f8:f4:12:14:2c:67:c3: f4:bc:42:ca:6f:22:2a:ca:8d:4b:fc:e6:59:9e:5c:44: 69:83:a7:54:af:1a:0c:84:7f:64:de:27:17:53:64:7b: d7:8a:d7:54:aa:d3:71:ee:4b:b1:5f:36:c2:49:5a:d6: 28:73:25:17:1b:eb:d8:5c:48:6d:b8:58:9f:22:4f:62: 83:69:be:9d:79:a6:82:e1:c9:44:f1:1e:cb:2e:c9:72: 2d:d3:67:12:9a:57:08:be:47:ee:c4:e7:6e:40:fa:4d: 3a:50:fc:05:ec:0c:d4:6f:39:dc:31:29:b2:c0:db:17: 59:d4:5d:ed:36:26:57:22:03:d0:80:39:fb:4e:a5:1b: d9:f3:fb:88:1d:5a:fb:68:e3:2d:59:46:b2:87:c4:48: 2b:46:7b:4d:c4:e2:32:32:ee:12:5d:01:db:91:ad:e7 Fingerprint (SHA-256): A0:8B:7D:55:C9:33:FE:D6:BF:77:1F:BB:2D:5E:E1:B8:DB:E7:16:C9:58:0B:4A:22:7B:56:37:4C:12:6D:2F:CD Fingerprint (SHA1): 20:16:AA:A7:8A:C0:E5:96:23:2D:43:DF:A6:C8:36:51:C6:84:33:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152395 (0x3cafc5cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:45 2023 Not After : Wed Oct 18 15:28:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:4c:9a:a2:65:2a:e4:bd:3c:aa:79:11:71:04:2e:c6: 2e:aa:3a:04:04:06:be:c4:42:32:c2:37:5f:98:e3:09: 8c:03:6a:f3:2f:11:c3:62:39:df:da:e0:97:8e:d8:42: 4d:db:fb:f8:eb:dd:9f:f6:14:98:09:d1:0c:af:9b:e1: 4d:da:b5:9c:5f:ef:90:d2:f1:bb:0a:bb:7f:49:86:a4: b2:d9:95:d9:3e:d0:08:20:ee:6a:c5:c8:ca:1f:8e:4f: 02:eb:bc:34:cf:15:91:c5:2a:8d:e2:75:47:7a:bc:8e: d8:50:a0:d2:8c:d2:fc:bc:dd:fa:d9:08:7f:22:e3:03: d0:94:61:db:d2:6d:12:bf:23:6d:5c:a2:06:d8:f6:69: f1:ef:ed:11:4e:d8:44:07:6c:22:d3:0e:30:66:21:88: 8e:c1:c4:a8:78:12:48:60:5d:fc:7a:13:f7:b8:77:43: aa:07:32:c8:0e:0e:a5:e5:48:b9:b3:bc:ac:fe:eb:c7: 56:79:61:ec:08:0f:6f:88:83:b4:f3:4d:b6:a2:35:5b: 35:7f:fa:67:1c:e3:2e:d3:be:14:1f:4a:6f:c7:e3:4b: 3d:63:f6:b9:e3:35:3d:f5:4a:13:e5:1c:82:6d:9a:d5: 05:b0:f1:e7:d7:99:e3:21:d6:34:ee:b8:97:e6:5a:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:25:be:19:18:4a:a8:c7:8b:6a:64:3a:12:6e:42:46: 10:2c:94:01:45:7e:6a:39:93:1a:09:bd:32:e0:2e:09: f5:9c:f3:4d:af:87:5d:8c:58:92:af:2a:c5:1b:90:f1: 23:b7:71:a8:0d:81:3f:90:8e:37:2c:ba:c0:db:7d:ee: 5e:47:59:2b:f3:4e:46:34:83:59:d3:73:0d:6c:f9:f7: a2:a7:0d:81:42:d8:04:6e:a1:28:e5:6a:8b:e0:b3:26: b3:ab:c4:d7:44:b4:64:73:79:b8:7e:87:39:b2:db:bc: 9a:39:e4:17:9e:20:e1:d0:0e:78:a0:80:ad:d8:22:1e: 4d:24:09:c3:bf:48:d7:3c:66:ed:df:79:f8:08:47:10: 40:a8:89:a1:b1:74:7a:ec:e6:7c:24:be:e4:2e:ff:43: a6:49:f9:a6:9c:84:ed:f7:68:bd:92:f0:b7:4e:2d:cd: e2:9d:4b:14:9f:58:2e:59:57:34:82:c1:f2:36:50:a5: 3b:0a:5f:45:a2:e6:92:19:99:79:c5:b8:e4:be:14:61: 54:39:36:4f:f8:bf:20:86:bf:24:08:ea:73:43:84:62: 3d:4d:b1:bb:e9:6f:6c:10:57:f5:cc:ee:ef:b7:a6:63: a1:0f:2d:31:76:c9:c4:a0:37:35:ed:22:b3:d2:d5:3c Fingerprint (SHA-256): 05:4F:A9:A4:17:EC:30:46:A3:DE:27:CC:67:94:77:10:DE:AB:A3:52:E2:AB:57:6C:A3:40:22:29:A0:E9:AE:39 Fingerprint (SHA1): 0E:F1:54:E4:A1:B2:15:29:3E:A3:F7:BC:6A:99:91:6B:23:CF:2A:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152395 (0x3cafc5cb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:45 2023 Not After : Wed Oct 18 15:28:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:4c:9a:a2:65:2a:e4:bd:3c:aa:79:11:71:04:2e:c6: 2e:aa:3a:04:04:06:be:c4:42:32:c2:37:5f:98:e3:09: 8c:03:6a:f3:2f:11:c3:62:39:df:da:e0:97:8e:d8:42: 4d:db:fb:f8:eb:dd:9f:f6:14:98:09:d1:0c:af:9b:e1: 4d:da:b5:9c:5f:ef:90:d2:f1:bb:0a:bb:7f:49:86:a4: b2:d9:95:d9:3e:d0:08:20:ee:6a:c5:c8:ca:1f:8e:4f: 02:eb:bc:34:cf:15:91:c5:2a:8d:e2:75:47:7a:bc:8e: d8:50:a0:d2:8c:d2:fc:bc:dd:fa:d9:08:7f:22:e3:03: d0:94:61:db:d2:6d:12:bf:23:6d:5c:a2:06:d8:f6:69: f1:ef:ed:11:4e:d8:44:07:6c:22:d3:0e:30:66:21:88: 8e:c1:c4:a8:78:12:48:60:5d:fc:7a:13:f7:b8:77:43: aa:07:32:c8:0e:0e:a5:e5:48:b9:b3:bc:ac:fe:eb:c7: 56:79:61:ec:08:0f:6f:88:83:b4:f3:4d:b6:a2:35:5b: 35:7f:fa:67:1c:e3:2e:d3:be:14:1f:4a:6f:c7:e3:4b: 3d:63:f6:b9:e3:35:3d:f5:4a:13:e5:1c:82:6d:9a:d5: 05:b0:f1:e7:d7:99:e3:21:d6:34:ee:b8:97:e6:5a:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:25:be:19:18:4a:a8:c7:8b:6a:64:3a:12:6e:42:46: 10:2c:94:01:45:7e:6a:39:93:1a:09:bd:32:e0:2e:09: f5:9c:f3:4d:af:87:5d:8c:58:92:af:2a:c5:1b:90:f1: 23:b7:71:a8:0d:81:3f:90:8e:37:2c:ba:c0:db:7d:ee: 5e:47:59:2b:f3:4e:46:34:83:59:d3:73:0d:6c:f9:f7: a2:a7:0d:81:42:d8:04:6e:a1:28:e5:6a:8b:e0:b3:26: b3:ab:c4:d7:44:b4:64:73:79:b8:7e:87:39:b2:db:bc: 9a:39:e4:17:9e:20:e1:d0:0e:78:a0:80:ad:d8:22:1e: 4d:24:09:c3:bf:48:d7:3c:66:ed:df:79:f8:08:47:10: 40:a8:89:a1:b1:74:7a:ec:e6:7c:24:be:e4:2e:ff:43: a6:49:f9:a6:9c:84:ed:f7:68:bd:92:f0:b7:4e:2d:cd: e2:9d:4b:14:9f:58:2e:59:57:34:82:c1:f2:36:50:a5: 3b:0a:5f:45:a2:e6:92:19:99:79:c5:b8:e4:be:14:61: 54:39:36:4f:f8:bf:20:86:bf:24:08:ea:73:43:84:62: 3d:4d:b1:bb:e9:6f:6c:10:57:f5:cc:ee:ef:b7:a6:63: a1:0f:2d:31:76:c9:c4:a0:37:35:ed:22:b3:d2:d5:3c Fingerprint (SHA-256): 05:4F:A9:A4:17:EC:30:46:A3:DE:27:CC:67:94:77:10:DE:AB:A3:52:E2:AB:57:6C:A3:40:22:29:A0:E9:AE:39 Fingerprint (SHA1): 0E:F1:54:E4:A1:B2:15:29:3E:A3:F7:BC:6A:99:91:6B:23:CF:2A:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152402 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152403 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018152404 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018152405 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018152406 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018152407 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018152408 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018152409 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152410 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152411 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152402 (0x3cafc5d2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 15:28:55 2023 Not After : Wed Oct 18 15:28:55 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:21:db:76:96:78:e5:7a:dd:e3:b2:27:d8:3f:79:a2: e8:56:a1:13:96:af:36:d2:3c:7f:ef:77:60:e0:03:f1: f2:9e:2b:82:38:e3:1d:18:d8:f8:fd:d2:20:ba:a1:38: e9:54:a6:30:50:af:07:94:58:29:79:72:2d:47:94:20: 94:51:36:55:14:24:d0:be:cf:3a:ff:c6:aa:55:4d:ac: a7:af:ae:ca:db:01:75:bf:f4:b7:87:52:bc:68:f1:bc: 9e:c6:68:09:bc:59:a7:69:46:84:98:1e:5e:e8:19:43: da:2c:d1:be:5d:ba:b7:65:1a:b8:83:10:ac:83:3e:c2: 8a:b5:1d:8c:a0:ab:b4:42:5a:13:04:88:ab:4c:e8:a5: f8:8c:fc:f7:cc:1e:85:f1:3b:2a:ca:af:d5:2a:aa:b6: ca:a1:11:be:6c:73:05:34:39:1b:ae:d1:6c:8a:99:ed: 7f:f9:ed:65:27:ad:d7:c9:50:4e:3f:cb:08:b7:0f:ca: 42:4f:1e:0e:a3:e7:50:9d:3d:e8:8f:e0:1b:33:ac:a3: 4c:5e:ec:56:70:3f:4c:14:9b:12:8c:b9:30:87:17:7e: ad:24:45:a0:33:3b:30:87:fd:4f:e7:5e:62:2f:db:05: 8d:5d:9c:ec:d2:3d:15:39:44:1a:f6:9f:0b:c0:e5:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:1e:90:6d:eb:db:03:df:6d:42:14:ab:39:1c:d9:ef: 5c:7c:32:c1:61:f1:88:c7:12:db:2c:7d:8e:be:88:fc: 7b:21:58:31:54:48:c5:6d:44:1c:c7:f8:bb:3a:84:3b: 7d:a1:16:c6:cc:6f:77:69:a9:c7:e3:5a:1d:3c:bc:15: 57:a5:1e:2a:a1:48:cb:3c:8b:c4:d9:0b:a2:9e:37:87: 25:f3:e9:e8:4c:8e:a1:8c:da:db:61:35:93:1f:16:60: b5:2b:35:8d:5e:21:db:19:87:98:54:e7:c1:ea:f2:fc: b4:98:7b:28:95:7a:35:db:97:15:8f:46:87:90:9e:ce: e6:5f:1d:f3:f1:88:62:08:24:40:93:f5:ad:a2:38:7b: d1:da:05:30:43:c3:5d:d9:2c:de:84:bc:4d:ad:86:60: 0f:b5:12:c8:3e:a9:07:cf:1d:a0:8a:25:92:69:73:d7: 7b:3c:ac:d9:a5:32:99:ad:dd:38:a5:14:15:19:81:c7: 3e:b5:43:0f:d4:ac:0c:18:23:8d:c2:47:15:41:47:07: 10:87:52:66:38:02:a4:20:79:8c:ab:da:13:74:e3:05: c9:38:9b:90:34:fc:13:b0:d2:4a:50:32:e5:bb:b7:4f: b1:8c:b1:90:5d:6e:a1:fb:c8:e4:75:88:3d:c7:90:97 Fingerprint (SHA-256): 3B:ED:07:2D:87:34:E8:5C:B1:CC:E9:65:92:96:DB:9F:26:BC:4B:6B:7A:8A:1F:D7:D0:66:3F:E1:39:68:9F:15 Fingerprint (SHA1): 2A:E8:7E:66:43:A0:07:D3:E9:55:FE:3B:FF:94:F2:53:67:9F:62:04 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152403 (0x3cafc5d3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 15:28:55 2023 Not After : Wed Oct 18 15:28:55 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:ca:bc:26:66:01:a9:7b:f1:de:ea:97:6d:d7:e5:ed: 02:ab:c5:43:21:97:64:66:e6:32:96:c1:09:79:0a:08: fe:81:82:be:34:30:d4:8b:e7:08:a4:f3:fc:80:50:89: 7d:87:e3:dc:c5:a1:54:9c:ec:a1:79:27:71:9d:00:db: 57:21:ab:26:7e:bf:2d:60:64:ff:15:cf:46:5d:48:c9: 56:92:8d:29:53:5b:2f:af:9c:67:1c:c7:b0:12:05:89: 60:1d:f8:10:5b:f8:a1:0f:8c:ad:04:ab:ab:11:40:9b: 07:dc:c0:d0:f2:10:e6:f9:9b:96:ce:b5:da:5c:bc:84: 92:7f:bc:ec:f4:77:6e:9f:48:cb:54:cf:94:fe:32:f4: 5b:a6:9f:26:75:8e:aa:d8:c7:06:bb:12:8d:fa:f4:7b: cc:cf:b3:bc:86:20:41:7e:92:98:a8:24:17:21:56:d1: cf:f9:d8:3f:2e:62:12:4b:3e:c6:1d:6a:07:e1:ab:30: 23:05:68:23:52:a8:6e:ba:5c:36:5e:8a:79:29:92:20: be:b2:d1:ba:e4:91:f3:87:b4:d4:bc:cd:57:ec:24:43: cd:c6:e1:ad:2c:a5:ab:1b:1a:11:2b:06:88:79:15:cd: a0:bf:ba:6e:50:5c:da:c3:43:33:3d:a5:1a:5b:f6:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:91:47:e2:bf:86:47:d5:b8:3b:fc:c0:ce:13:ee:b4: 8a:9c:e2:c7:09:d9:94:57:87:fb:96:64:2f:fc:c7:d5: 23:e7:84:48:55:52:ec:a5:e2:a3:bc:14:e8:f2:03:f6: 00:65:35:c4:46:35:df:37:36:42:67:85:35:76:cc:6f: 65:91:30:cf:f7:a7:cb:d7:4c:8c:ca:bb:ba:c8:14:3f: 6b:a1:81:2e:2a:8f:fb:4e:fc:3d:1b:b2:e8:ca:47:4e: 31:e5:83:84:47:a5:f2:63:4b:ff:9a:4c:41:8a:ae:11: a2:7e:76:97:e6:16:d6:67:58:98:15:b2:7c:b0:50:14: 73:17:7d:80:ae:9e:b5:45:91:d6:cc:fd:2a:21:46:e3: 69:5c:e2:40:14:31:e7:b6:40:62:10:b2:7e:3d:3b:43: b0:bf:2d:4e:49:fe:b2:cc:33:50:2b:cc:7e:20:fb:39: 7e:f8:ca:cf:81:33:2a:db:55:17:c6:4e:d0:af:99:d8: 98:20:7f:b7:e3:39:64:6b:63:f0:cd:68:df:04:05:d6: 3a:09:7d:53:30:16:ed:de:26:82:e7:72:93:9d:cf:84: 93:53:e6:40:d9:2f:60:84:ad:38:91:39:1b:e0:67:fe: 65:cd:12:95:df:cf:84:73:4c:a3:35:a3:fd:b7:1f:4b Fingerprint (SHA-256): 84:C6:24:44:4F:8A:22:E8:BB:C2:4E:26:80:8F:45:E5:82:9C:AA:5F:91:56:24:14:E4:16:CE:2F:77:F2:17:3D Fingerprint (SHA1): E6:0F:34:4C:19:12:C7:3E:98:B7:9F:3C:15:10:06:D6:BF:2F:EF:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152412 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018152413 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018152414 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018152415 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018152416 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018152417 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018152418 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018152419 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018152420 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152412 (0x3cafc5dc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:10 2023 Not After : Wed Oct 18 15:29:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a7:08:a7:4a:32:8e:dc:c7:6b:40:dc:0f:69:5f:a3:e9: 17:a6:69:e2:48:95:76:71:69:c5:57:77:c5:33:75:a6: 15:03:0e:2a:38:f7:1f:53:3e:71:d6:a0:bc:d7:48:6f: 65:14:68:e3:ad:92:eb:ba:61:99:6a:25:d0:7e:0d:95: d4:13:e1:fb:b7:1e:11:e9:58:4c:5e:f5:64:32:60:62: 98:21:a7:61:1a:e1:30:97:8d:41:73:4f:b1:69:f3:a7: 6a:3e:f4:e5:35:46:3e:15:29:67:98:81:72:15:18:b4: 6e:59:a5:5e:2a:2d:35:a4:c3:9d:58:52:5b:a4:2f:64: 79:70:85:cd:e9:94:09:c9:ad:2c:6a:90:63:cc:b5:2e: ca:e4:a4:98:78:28:63:ac:6a:d9:a0:95:7e:a0:19:7d: 36:d1:fe:0e:29:b7:cb:ff:e8:52:78:f8:da:5b:b1:4b: 22:92:45:27:7c:31:b2:e9:60:6d:ca:b0:f0:cf:d5:42: fd:0b:4c:3b:9a:46:b7:58:c3:42:66:50:46:c8:f2:07: d3:57:3a:3a:3d:8a:d9:6a:0d:25:cc:2f:33:43:d5:de: 77:41:c0:8f:b3:e6:9f:13:cf:84:d4:fd:d0:ad:3c:5b: 04:0d:7c:11:1f:93:fd:46:41:78:65:d2:0b:92:2d:9c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:df:d3:94:64:78:43:28:a3:4f:c1:7b: 69:b0:b3:df:5f:a5:7f:18:a4:d9:65:31:11:3e:2b:25: e9:02:1c:67:24:ca:0a:8e:b3:a6:0e:1b:76:87:a7:a5: 49:d4:49:24:8f:7c:7a:0b:1d:76:40:34:c0:89:83 Fingerprint (SHA-256): CD:B8:27:D7:3C:CA:85:84:E3:CC:86:01:CB:8C:9F:15:CC:91:02:71:0A:8F:B2:9E:38:75:4E:D3:AA:93:DE:08 Fingerprint (SHA1): 3B:9F:12:E1:03:05:0A:1E:86:6C:58:1C:88:7F:8F:AC:EF:5D:D0:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152412 (0x3cafc5dc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:10 2023 Not After : Wed Oct 18 15:29:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a7:08:a7:4a:32:8e:dc:c7:6b:40:dc:0f:69:5f:a3:e9: 17:a6:69:e2:48:95:76:71:69:c5:57:77:c5:33:75:a6: 15:03:0e:2a:38:f7:1f:53:3e:71:d6:a0:bc:d7:48:6f: 65:14:68:e3:ad:92:eb:ba:61:99:6a:25:d0:7e:0d:95: d4:13:e1:fb:b7:1e:11:e9:58:4c:5e:f5:64:32:60:62: 98:21:a7:61:1a:e1:30:97:8d:41:73:4f:b1:69:f3:a7: 6a:3e:f4:e5:35:46:3e:15:29:67:98:81:72:15:18:b4: 6e:59:a5:5e:2a:2d:35:a4:c3:9d:58:52:5b:a4:2f:64: 79:70:85:cd:e9:94:09:c9:ad:2c:6a:90:63:cc:b5:2e: ca:e4:a4:98:78:28:63:ac:6a:d9:a0:95:7e:a0:19:7d: 36:d1:fe:0e:29:b7:cb:ff:e8:52:78:f8:da:5b:b1:4b: 22:92:45:27:7c:31:b2:e9:60:6d:ca:b0:f0:cf:d5:42: fd:0b:4c:3b:9a:46:b7:58:c3:42:66:50:46:c8:f2:07: d3:57:3a:3a:3d:8a:d9:6a:0d:25:cc:2f:33:43:d5:de: 77:41:c0:8f:b3:e6:9f:13:cf:84:d4:fd:d0:ad:3c:5b: 04:0d:7c:11:1f:93:fd:46:41:78:65:d2:0b:92:2d:9c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:df:d3:94:64:78:43:28:a3:4f:c1:7b: 69:b0:b3:df:5f:a5:7f:18:a4:d9:65:31:11:3e:2b:25: e9:02:1c:67:24:ca:0a:8e:b3:a6:0e:1b:76:87:a7:a5: 49:d4:49:24:8f:7c:7a:0b:1d:76:40:34:c0:89:83 Fingerprint (SHA-256): CD:B8:27:D7:3C:CA:85:84:E3:CC:86:01:CB:8C:9F:15:CC:91:02:71:0A:8F:B2:9E:38:75:4E:D3:AA:93:DE:08 Fingerprint (SHA1): 3B:9F:12:E1:03:05:0A:1E:86:6C:58:1C:88:7F:8F:AC:EF:5D:D0:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152412 (0x3cafc5dc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:10 2023 Not After : Wed Oct 18 15:29:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a7:08:a7:4a:32:8e:dc:c7:6b:40:dc:0f:69:5f:a3:e9: 17:a6:69:e2:48:95:76:71:69:c5:57:77:c5:33:75:a6: 15:03:0e:2a:38:f7:1f:53:3e:71:d6:a0:bc:d7:48:6f: 65:14:68:e3:ad:92:eb:ba:61:99:6a:25:d0:7e:0d:95: d4:13:e1:fb:b7:1e:11:e9:58:4c:5e:f5:64:32:60:62: 98:21:a7:61:1a:e1:30:97:8d:41:73:4f:b1:69:f3:a7: 6a:3e:f4:e5:35:46:3e:15:29:67:98:81:72:15:18:b4: 6e:59:a5:5e:2a:2d:35:a4:c3:9d:58:52:5b:a4:2f:64: 79:70:85:cd:e9:94:09:c9:ad:2c:6a:90:63:cc:b5:2e: ca:e4:a4:98:78:28:63:ac:6a:d9:a0:95:7e:a0:19:7d: 36:d1:fe:0e:29:b7:cb:ff:e8:52:78:f8:da:5b:b1:4b: 22:92:45:27:7c:31:b2:e9:60:6d:ca:b0:f0:cf:d5:42: fd:0b:4c:3b:9a:46:b7:58:c3:42:66:50:46:c8:f2:07: d3:57:3a:3a:3d:8a:d9:6a:0d:25:cc:2f:33:43:d5:de: 77:41:c0:8f:b3:e6:9f:13:cf:84:d4:fd:d0:ad:3c:5b: 04:0d:7c:11:1f:93:fd:46:41:78:65:d2:0b:92:2d:9c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:df:d3:94:64:78:43:28:a3:4f:c1:7b: 69:b0:b3:df:5f:a5:7f:18:a4:d9:65:31:11:3e:2b:25: e9:02:1c:67:24:ca:0a:8e:b3:a6:0e:1b:76:87:a7:a5: 49:d4:49:24:8f:7c:7a:0b:1d:76:40:34:c0:89:83 Fingerprint (SHA-256): CD:B8:27:D7:3C:CA:85:84:E3:CC:86:01:CB:8C:9F:15:CC:91:02:71:0A:8F:B2:9E:38:75:4E:D3:AA:93:DE:08 Fingerprint (SHA1): 3B:9F:12:E1:03:05:0A:1E:86:6C:58:1C:88:7F:8F:AC:EF:5D:D0:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152412 (0x3cafc5dc) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:10 2023 Not After : Wed Oct 18 15:29:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a7:08:a7:4a:32:8e:dc:c7:6b:40:dc:0f:69:5f:a3:e9: 17:a6:69:e2:48:95:76:71:69:c5:57:77:c5:33:75:a6: 15:03:0e:2a:38:f7:1f:53:3e:71:d6:a0:bc:d7:48:6f: 65:14:68:e3:ad:92:eb:ba:61:99:6a:25:d0:7e:0d:95: d4:13:e1:fb:b7:1e:11:e9:58:4c:5e:f5:64:32:60:62: 98:21:a7:61:1a:e1:30:97:8d:41:73:4f:b1:69:f3:a7: 6a:3e:f4:e5:35:46:3e:15:29:67:98:81:72:15:18:b4: 6e:59:a5:5e:2a:2d:35:a4:c3:9d:58:52:5b:a4:2f:64: 79:70:85:cd:e9:94:09:c9:ad:2c:6a:90:63:cc:b5:2e: ca:e4:a4:98:78:28:63:ac:6a:d9:a0:95:7e:a0:19:7d: 36:d1:fe:0e:29:b7:cb:ff:e8:52:78:f8:da:5b:b1:4b: 22:92:45:27:7c:31:b2:e9:60:6d:ca:b0:f0:cf:d5:42: fd:0b:4c:3b:9a:46:b7:58:c3:42:66:50:46:c8:f2:07: d3:57:3a:3a:3d:8a:d9:6a:0d:25:cc:2f:33:43:d5:de: 77:41:c0:8f:b3:e6:9f:13:cf:84:d4:fd:d0:ad:3c:5b: 04:0d:7c:11:1f:93:fd:46:41:78:65:d2:0b:92:2d:9c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:df:d3:94:64:78:43:28:a3:4f:c1:7b: 69:b0:b3:df:5f:a5:7f:18:a4:d9:65:31:11:3e:2b:25: e9:02:1c:67:24:ca:0a:8e:b3:a6:0e:1b:76:87:a7:a5: 49:d4:49:24:8f:7c:7a:0b:1d:76:40:34:c0:89:83 Fingerprint (SHA-256): CD:B8:27:D7:3C:CA:85:84:E3:CC:86:01:CB:8C:9F:15:CC:91:02:71:0A:8F:B2:9E:38:75:4E:D3:AA:93:DE:08 Fingerprint (SHA1): 3B:9F:12:E1:03:05:0A:1E:86:6C:58:1C:88:7F:8F:AC:EF:5D:D0:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018152927Z nextupdate=20241018152927Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 15:29:27 2023 Next Update: Fri Oct 18 15:29:27 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152927Z nextupdate=20241018152927Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:29:27 2023 Next Update: Fri Oct 18 15:29:27 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152927Z nextupdate=20241018152927Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:29:27 2023 Next Update: Fri Oct 18 15:29:27 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018152927Z nextupdate=20241018152927Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 15:29:27 2023 Next Update: Fri Oct 18 15:29:27 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152928Z addcert 14 20231018152928Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:29:28 2023 Next Update: Fri Oct 18 15:29:27 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 15:29:28 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152929Z addcert 15 20231018152929Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:29:29 2023 Next Update: Fri Oct 18 15:29:27 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 15:29:29 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:18 2023 Not After : Wed Oct 18 15:29:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c3:19:66:cd:40:ca:06:67:6f:ee:3d:c2:13:37:88: a5:11:41:88:d9:6a:fb:cd:90:0a:0e:a3:c7:b0:98:4e: 90:ce:a2:ac:6c:e5:d0:51:eb:93:94:c9:ef:0e:f4:7c: cc:86:e4:e4:f6:4f:f5:86:78:f4:bb:90:58:d2:7b:77: e4:a8:3e:d5:f0:c7:a6:a0:1c:1a:cb:cd:26:80:1c:d4: 6b:aa:9a:37:a6:4a:9b:c0:03:58:90:30:61:66:50:28: 4f:d7:a9:ae:cb:bd:1f:9a:7c:65:62:5b:1a:d8:69:05: f5:62:c4:7b:30:14:7a:59:ec:98:76:3e:d9:3b:12:4c: 41:6d:4b:d1:2a:6d:32:ad:54:ec:00:66:e5:7d:9e:98: 33:07:40:9f:ca:58:18:89:c3:8b:fc:c3:74:7e:a9:e9: fb:00:3d:5a:a5:14:52:de:29:22:f9:d0:54:bd:b7:50: a4:e8:aa:e8:48:99:89:f3:e2:55:34:04:44:47:1b:6a: 9c:da:7f:c9:c2:e7:bd:44:4c:af:b1:f0:56:fd:34:df: d7:a5:78:dd:3c:ef:73:45:d7:9f:1b:49:1b:f5:82:35: 3c:a9:e8:10:e4:93:f3:89:ac:dc:71:ed:4a:bd:73:fe: 5d:a3:5a:dc:bf:b3:42:b7:87:74:a2:f4:86:ce:cc:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:1e:fe:dc:c6:95:40:07:43:37:15:f5:b9:79:4c:74: 21:78:b3:90:28:b0:7f:09:f8:14:86:7e:b0:5c:71:0e: 10:ce:5c:e6:ca:da:07:22:6c:db:42:c1:11:18:14:75: ef:c6:3b:27:c2:c5:dc:08:6e:2b:59:33:18:0b:05:88: 69:cf:60:d4:05:98:b6:88:25:ed:ff:f1:82:dc:b2:28: 7b:48:03:7d:92:06:89:33:ab:14:46:83:ed:64:cb:4e: 7b:89:0f:24:e5:df:c8:2c:62:47:16:09:4f:08:81:58: 21:e9:9c:ab:69:94:c7:dd:b7:8d:6c:6d:0d:96:4b:2b: cd:75:cc:2e:80:b6:02:b4:36:28:14:39:15:58:7d:16: 52:bc:b8:d3:15:85:5f:45:36:3b:58:69:84:11:b5:ef: f3:46:4c:5f:6d:7c:5f:01:1e:90:c5:fd:b4:e7:2c:28: 58:95:ae:2c:4b:c9:57:c9:04:b6:d7:cc:dc:50:66:ea: a4:61:16:f9:66:3b:d7:44:e0:42:2e:ff:8b:5f:1d:07: 9b:ba:5f:56:e8:e6:61:c3:30:d1:d4:d6:4c:5e:56:3f: 9d:b9:a1:eb:0a:2f:5e:89:06:24:cd:02:a3:7d:d6:5b: a1:f0:9b:5c:f3:ba:a7:ce:ec:e1:5f:8a:a6:96:ac:8d Fingerprint (SHA-256): B3:45:9F:E8:3C:4C:5D:58:BB:67:A8:A8:4E:FE:CC:87:D7:78:43:21:02:C8:58:F7:62:AD:54:80:10:5E:C7:7D Fingerprint (SHA1): C8:AA:08:79:1D:DC:0A:37:C3:3B:A8:93:14:32:AC:B1:FA:D3:F3:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:18 2023 Not After : Wed Oct 18 15:29:18 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:c3:19:66:cd:40:ca:06:67:6f:ee:3d:c2:13:37:88: a5:11:41:88:d9:6a:fb:cd:90:0a:0e:a3:c7:b0:98:4e: 90:ce:a2:ac:6c:e5:d0:51:eb:93:94:c9:ef:0e:f4:7c: cc:86:e4:e4:f6:4f:f5:86:78:f4:bb:90:58:d2:7b:77: e4:a8:3e:d5:f0:c7:a6:a0:1c:1a:cb:cd:26:80:1c:d4: 6b:aa:9a:37:a6:4a:9b:c0:03:58:90:30:61:66:50:28: 4f:d7:a9:ae:cb:bd:1f:9a:7c:65:62:5b:1a:d8:69:05: f5:62:c4:7b:30:14:7a:59:ec:98:76:3e:d9:3b:12:4c: 41:6d:4b:d1:2a:6d:32:ad:54:ec:00:66:e5:7d:9e:98: 33:07:40:9f:ca:58:18:89:c3:8b:fc:c3:74:7e:a9:e9: fb:00:3d:5a:a5:14:52:de:29:22:f9:d0:54:bd:b7:50: a4:e8:aa:e8:48:99:89:f3:e2:55:34:04:44:47:1b:6a: 9c:da:7f:c9:c2:e7:bd:44:4c:af:b1:f0:56:fd:34:df: d7:a5:78:dd:3c:ef:73:45:d7:9f:1b:49:1b:f5:82:35: 3c:a9:e8:10:e4:93:f3:89:ac:dc:71:ed:4a:bd:73:fe: 5d:a3:5a:dc:bf:b3:42:b7:87:74:a2:f4:86:ce:cc:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:1e:fe:dc:c6:95:40:07:43:37:15:f5:b9:79:4c:74: 21:78:b3:90:28:b0:7f:09:f8:14:86:7e:b0:5c:71:0e: 10:ce:5c:e6:ca:da:07:22:6c:db:42:c1:11:18:14:75: ef:c6:3b:27:c2:c5:dc:08:6e:2b:59:33:18:0b:05:88: 69:cf:60:d4:05:98:b6:88:25:ed:ff:f1:82:dc:b2:28: 7b:48:03:7d:92:06:89:33:ab:14:46:83:ed:64:cb:4e: 7b:89:0f:24:e5:df:c8:2c:62:47:16:09:4f:08:81:58: 21:e9:9c:ab:69:94:c7:dd:b7:8d:6c:6d:0d:96:4b:2b: cd:75:cc:2e:80:b6:02:b4:36:28:14:39:15:58:7d:16: 52:bc:b8:d3:15:85:5f:45:36:3b:58:69:84:11:b5:ef: f3:46:4c:5f:6d:7c:5f:01:1e:90:c5:fd:b4:e7:2c:28: 58:95:ae:2c:4b:c9:57:c9:04:b6:d7:cc:dc:50:66:ea: a4:61:16:f9:66:3b:d7:44:e0:42:2e:ff:8b:5f:1d:07: 9b:ba:5f:56:e8:e6:61:c3:30:d1:d4:d6:4c:5e:56:3f: 9d:b9:a1:eb:0a:2f:5e:89:06:24:cd:02:a3:7d:d6:5b: a1:f0:9b:5c:f3:ba:a7:ce:ec:e1:5f:8a:a6:96:ac:8d Fingerprint (SHA-256): B3:45:9F:E8:3C:4C:5D:58:BB:67:A8:A8:4E:FE:CC:87:D7:78:43:21:02:C8:58:F7:62:AD:54:80:10:5E:C7:7D Fingerprint (SHA1): C8:AA:08:79:1D:DC:0A:37:C3:3B:A8:93:14:32:AC:B1:FA:D3:F3:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152421 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018152422 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152178.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152151.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152178.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018152423 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152178.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152152.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018152424 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152178.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152153.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018152178.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018152154.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018152941Z nextupdate=20241018152941Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 15:29:41 2023 Next Update: Fri Oct 18 15:29:41 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152941Z nextupdate=20241018152941Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:29:41 2023 Next Update: Fri Oct 18 15:29:41 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018152941Z nextupdate=20241018152941Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 15:29:41 2023 Next Update: Fri Oct 18 15:29:41 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018152941Z nextupdate=20241018152941Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 15:29:41 2023 Next Update: Fri Oct 18 15:29:41 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152942Z addcert 20 20231018152942Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:29:42 2023 Next Update: Fri Oct 18 15:29:41 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 15:29:42 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018152943Z addcert 40 20231018152943Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 15:29:43 2023 Next Update: Fri Oct 18 15:29:41 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 15:29:42 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 15:29:43 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152421 (0x3cafc5e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:33 2023 Not After : Wed Oct 18 15:29:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a6:5b:80:87:9c:96:ba:31:d0:bb:28:71:9a:27:0a: 55:ee:51:03:50:77:7c:f3:c9:0e:21:67:8a:69:73:29: a2:3a:91:56:47:3e:d4:19:97:fc:17:f6:b5:ca:0f:14: 33:4c:d6:b7:0c:71:9c:3c:a5:98:fb:d0:c0:da:28:49: 3c:4d:f1:c9:15:76:9f:9d:36:6b:36:7d:b8:f6:5f:26: b1:40:8d:d6:db:ed:02:b8:9e:a7:89:43:6f:f9:f2:9e: 07:9a:1c:44:50:10:91:a6:92:d0:f4:94:ac:d6:53:e9: b7:86:90:60:53:06:6c:07:71:c7:54:dd:de:59:32:a7: 21:4b:12:ab:1a:03:8c:aa:12:db:e3:7b:fd:8e:17:04: 12:44:3e:a0:f0:29:bf:fb:49:66:0b:06:96:5d:f4:3b: 33:1f:ae:8f:bc:36:24:83:64:c6:d6:0a:7d:81:c7:4f: c1:9b:eb:71:0c:dd:ee:70:59:e7:9f:6e:f3:b9:a9:1d: d1:91:36:b6:52:e4:c5:b2:49:11:7c:d5:5d:eb:a4:54: f5:9f:3c:f3:ad:5f:eb:00:ef:7b:e5:e8:c1:3f:e0:6e: b8:1f:33:03:ee:12:ea:ad:7d:d4:0b:62:fa:69:f2:a8: 29:5e:09:6e:c5:e6:12:e8:89:2a:22:19:a1:c7:63:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:77:de:0e:7c:fd:19:50:7c:33:96:26:68:37:59:c3: c2:a6:6e:79:c8:df:a8:bb:ca:9e:04:24:a2:fe:62:6b: 80:61:da:f9:3f:8c:b8:87:b7:d2:70:3f:6c:b2:89:97: 36:e2:73:45:dc:f8:8f:4c:a9:8c:60:ed:bf:27:86:e0: 8a:ea:9f:a9:07:e1:19:6f:dc:df:a4:d4:68:0d:23:50: 98:ba:ed:df:ea:a6:b9:cd:d6:32:24:a2:d3:23:2c:2a: 0f:dc:61:58:22:88:08:6b:e9:45:36:84:3e:86:8e:ed: 35:8d:59:a2:9d:3d:e5:10:76:f4:da:a3:aa:75:3e:b9: aa:d5:3c:1a:1a:61:15:b9:a9:bd:19:40:6b:cb:c8:39: 12:fd:f9:df:1d:65:3a:92:4d:70:3b:73:e6:3e:e7:e9: 7f:81:3c:5b:ee:a0:74:0c:0a:6f:a7:fa:e5:fb:df:ef: bc:5b:a9:d4:c2:c5:28:85:f7:44:3e:6b:4c:2d:f8:95: 48:88:fb:48:ee:36:ec:5f:e6:2e:c0:15:e5:dc:25:aa: a5:94:1c:33:98:7b:95:3b:54:22:5f:85:fa:a4:45:a2: 33:a3:c2:63:52:50:f7:d9:1c:ff:65:d2:77:32:ed:75: ac:93:30:7c:be:ec:ee:d1:e9:9a:e3:f1:98:c5:c7:bb Fingerprint (SHA-256): 7B:1F:7E:1C:3A:AF:5C:92:7A:91:94:3F:E3:C8:6C:56:A7:64:3C:BB:6A:15:5A:4C:F6:7A:B8:0D:44:DE:F0:81 Fingerprint (SHA1): EE:81:E8:7F:90:E5:5B:E1:8D:7F:F1:4A:30:54:65:B1:F2:A5:E3:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152421 (0x3cafc5e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 15:29:33 2023 Not After : Wed Oct 18 15:29:33 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a6:5b:80:87:9c:96:ba:31:d0:bb:28:71:9a:27:0a: 55:ee:51:03:50:77:7c:f3:c9:0e:21:67:8a:69:73:29: a2:3a:91:56:47:3e:d4:19:97:fc:17:f6:b5:ca:0f:14: 33:4c:d6:b7:0c:71:9c:3c:a5:98:fb:d0:c0:da:28:49: 3c:4d:f1:c9:15:76:9f:9d:36:6b:36:7d:b8:f6:5f:26: b1:40:8d:d6:db:ed:02:b8:9e:a7:89:43:6f:f9:f2:9e: 07:9a:1c:44:50:10:91:a6:92:d0:f4:94:ac:d6:53:e9: b7:86:90:60:53:06:6c:07:71:c7:54:dd:de:59:32:a7: 21:4b:12:ab:1a:03:8c:aa:12:db:e3:7b:fd:8e:17:04: 12:44:3e:a0:f0:29:bf:fb:49:66:0b:06:96:5d:f4:3b: 33:1f:ae:8f:bc:36:24:83:64:c6:d6:0a:7d:81:c7:4f: c1:9b:eb:71:0c:dd:ee:70:59:e7:9f:6e:f3:b9:a9:1d: d1:91:36:b6:52:e4:c5:b2:49:11:7c:d5:5d:eb:a4:54: f5:9f:3c:f3:ad:5f:eb:00:ef:7b:e5:e8:c1:3f:e0:6e: b8:1f:33:03:ee:12:ea:ad:7d:d4:0b:62:fa:69:f2:a8: 29:5e:09:6e:c5:e6:12:e8:89:2a:22:19:a1:c7:63:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:77:de:0e:7c:fd:19:50:7c:33:96:26:68:37:59:c3: c2:a6:6e:79:c8:df:a8:bb:ca:9e:04:24:a2:fe:62:6b: 80:61:da:f9:3f:8c:b8:87:b7:d2:70:3f:6c:b2:89:97: 36:e2:73:45:dc:f8:8f:4c:a9:8c:60:ed:bf:27:86:e0: 8a:ea:9f:a9:07:e1:19:6f:dc:df:a4:d4:68:0d:23:50: 98:ba:ed:df:ea:a6:b9:cd:d6:32:24:a2:d3:23:2c:2a: 0f:dc:61:58:22:88:08:6b:e9:45:36:84:3e:86:8e:ed: 35:8d:59:a2:9d:3d:e5:10:76:f4:da:a3:aa:75:3e:b9: aa:d5:3c:1a:1a:61:15:b9:a9:bd:19:40:6b:cb:c8:39: 12:fd:f9:df:1d:65:3a:92:4d:70:3b:73:e6:3e:e7:e9: 7f:81:3c:5b:ee:a0:74:0c:0a:6f:a7:fa:e5:fb:df:ef: bc:5b:a9:d4:c2:c5:28:85:f7:44:3e:6b:4c:2d:f8:95: 48:88:fb:48:ee:36:ec:5f:e6:2e:c0:15:e5:dc:25:aa: a5:94:1c:33:98:7b:95:3b:54:22:5f:85:fa:a4:45:a2: 33:a3:c2:63:52:50:f7:d9:1c:ff:65:d2:77:32:ed:75: ac:93:30:7c:be:ec:ee:d1:e9:9a:e3:f1:98:c5:c7:bb Fingerprint (SHA-256): 7B:1F:7E:1C:3A:AF:5C:92:7A:91:94:3F:E3:C8:6C:56:A7:64:3C:BB:6A:15:5A:4C:F6:7A:B8:0D:44:DE:F0:81 Fingerprint (SHA1): EE:81:E8:7F:90:E5:5B:E1:8D:7F:F1:4A:30:54:65:B1:F2:A5:E3:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152425 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018152426 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018152427 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018152428 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018152429 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018152430 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018152431 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152425 (0x3cafc5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:29:45 2023 Not After : Wed Oct 18 15:29:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:5f:75:9f:61:97:8b:86:de:7e:8f:85:80:1e:a6:25: c7:42:88:be:91:fd:a0:5c:c0:8a:d4:a6:0f:45:14:49: cb:40:4c:78:8f:5d:ea:80:3a:b8:b6:a2:67:79:4b:8c: 62:37:2d:6b:f8:c7:da:ed:99:74:bf:90:30:a3:4c:5c: 84:c7:6d:1b:d7:7b:55:89:f3:4a:a6:30:06:f2:6e:cd: b8:45:d7:ba:0f:85:d0:01:59:ee:1a:f2:91:36:02:8f: 64:dd:86:0d:55:66:dc:be:dc:5a:92:a9:6a:ec:9b:ff: 39:70:65:f3:cf:9f:93:79:98:ca:84:f5:16:69:ae:cf: 91:57:eb:cc:e3:4b:5b:ba:e7:9b:96:3c:bf:b6:b7:b0: 4d:27:37:37:4c:c6:51:58:bf:4d:3f:fa:34:4e:db:d8: fe:e9:4d:60:24:3b:6f:f6:d2:b2:2d:9e:75:79:d1:69: aa:1c:a0:33:6c:84:45:74:b3:a2:d9:53:8c:c5:ee:78: 51:36:da:99:de:60:62:0c:1c:ba:e2:bc:73:5e:46:2e: e9:b7:0c:bd:ac:b4:18:39:97:f2:73:35:c0:66:67:a7: d4:21:37:37:32:0e:b1:69:48:f3:48:d2:56:f7:bc:72: 76:46:25:7f:95:d6:1f:ee:db:95:de:be:f3:c5:61:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:1c:35:50:a5:90:af:ce:78:a0:8c:85:9f:73:98:ce: b0:98:77:36:85:c8:47:31:ae:15:bf:b0:71:82:e7:0e: fc:97:cb:23:cd:12:cd:0e:87:c7:5d:61:cc:6e:a7:53: d8:39:c0:41:9c:db:80:16:30:dd:f1:8c:c8:5f:7d:40: 7f:64:cc:5b:c6:ca:45:e0:87:62:17:da:a2:0a:ec:c9: 68:41:97:44:71:b0:7a:8b:c3:79:ee:9d:c0:c3:a0:e3: 7f:01:97:56:8b:88:39:f1:81:f7:9e:1b:a2:25:24:3a: ba:72:8d:27:30:80:5a:28:e2:82:57:82:52:b6:e5:e2: b2:68:6d:c8:df:24:28:f8:31:12:c9:76:ae:2a:6d:48: 04:22:ff:5a:ef:81:f9:58:37:05:51:96:29:a8:53:e0: 50:dc:84:da:52:db:1a:64:d2:cf:d2:30:b2:75:db:c6: 8f:4b:30:4e:03:58:4e:47:04:58:9f:f2:3a:5f:de:95: 15:bf:19:51:63:38:f1:ec:54:32:54:22:30:dc:e6:df: 88:85:a9:fa:3a:32:a1:a0:91:5b:97:c1:31:7c:3a:6a: 87:36:16:9a:45:09:2a:22:fc:6f:50:8f:b7:c4:5b:79: f8:93:71:e6:5b:b4:7c:cb:9c:61:5f:da:43:f6:2d:cc Fingerprint (SHA-256): AD:5D:0E:9F:3F:C0:44:4C:B9:CE:7D:67:54:A9:74:D9:A8:05:8A:6C:A8:77:C0:80:F5:DF:59:B9:D8:D5:C3:51 Fingerprint (SHA1): C4:58:03:D2:C9:B2:28:B0:C7:1B:10:E6:EF:39:02:F4:0E:4B:61:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152427 (0x3cafc5eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:29:48 2023 Not After : Wed Oct 18 15:29:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:cf:73:f4:40:e7:e3:40:04:ce:70:82:45:90:d8:0c: ba:6f:2e:d0:08:bb:0e:7b:fc:8b:2f:5d:b6:7e:fa:03: 9e:60:3b:15:2e:ff:02:7d:33:b3:99:bf:b0:29:ab:47: e2:9e:da:b3:f2:4a:47:44:6b:d0:98:be:32:e1:2d:12: 38:38:ca:b9:c8:de:b1:60:99:19:eb:68:df:ef:d5:2d: 1f:8e:48:67:23:fd:41:bc:58:64:16:bf:28:4c:82:73: 6d:3c:e7:3b:f5:fd:63:4c:cf:c2:dc:08:51:c4:db:cb: 60:5b:eb:5e:63:44:0f:a3:24:4e:00:45:0d:f7:30:f4: 36:4b:ca:44:20:74:ec:9b:82:f4:7b:5b:87:ab:c2:26: 3e:17:b3:f9:88:b1:23:8e:bf:5d:15:92:d0:a7:97:73: ad:8c:d6:53:86:c0:fe:96:a0:31:94:3a:29:d2:b3:5b: 6e:6b:da:a7:53:04:e6:9d:59:05:bc:1f:fb:2f:6d:8b: 00:a4:cd:4d:5c:de:cc:b8:82:ed:34:ca:85:30:5f:35: 26:64:80:98:32:62:81:67:99:5d:b7:3c:13:ad:dd:02: cb:59:49:25:a9:8c:3b:08:d9:85:9d:df:88:39:a3:e2: 17:37:19:19:b9:10:cf:f5:5f:aa:25:d8:8c:62:7c:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:2b:3a:d4:3a:a2:d5:41:f2:87:f1:8d:e3:50:ae:28: b5:26:99:75:72:94:81:c9:1c:76:e0:3f:57:c9:2c:6f: 80:a7:5c:d6:b0:8b:3b:35:24:a4:17:4d:a8:95:aa:66: 27:8d:aa:6d:29:28:82:bd:97:13:c2:01:67:3d:c9:48: a4:2a:5f:09:b1:eb:18:e8:ec:a8:12:1f:49:04:13:50: 07:22:b0:bc:af:11:69:50:b9:39:b9:72:53:52:9e:4b: 9c:11:47:1f:45:32:88:77:02:1b:dd:ea:0e:c0:4f:c5: b4:f2:03:b6:b0:ae:50:2e:bc:2a:c1:a7:d6:14:ba:5f: e7:c5:97:9f:74:11:7e:3f:7c:04:16:d0:2b:6e:b7:6a: 9e:a3:7b:92:10:8c:32:19:c8:66:5d:fa:0d:53:50:6b: 73:67:19:51:e4:4b:da:b8:24:2a:03:11:94:af:93:ae: 89:48:27:05:2a:c8:7a:29:7a:7b:69:0c:22:e9:d1:03: 50:36:f7:3b:c0:25:20:72:5a:8a:c9:5c:67:1c:30:7b: 19:35:50:27:b7:70:7b:22:e6:c2:da:c0:9d:d0:80:80: 45:77:47:ca:09:ea:30:f7:d2:b7:8a:58:51:3c:f0:91: d2:12:c1:fd:2a:c2:c4:de:27:9e:22:1a:b2:3a:29:f9 Fingerprint (SHA-256): FE:39:F4:5C:6B:10:D2:67:EE:78:66:97:98:7C:00:A4:72:D0:4C:EE:3F:6D:33:97:0C:9D:DE:CE:3A:FA:A0:D6 Fingerprint (SHA1): F3:B1:3E:83:3C:D3:87:21:63:26:64:7C:11:6D:E9:51:A3:7D:CD:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152425 (0x3cafc5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:29:45 2023 Not After : Wed Oct 18 15:29:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:5f:75:9f:61:97:8b:86:de:7e:8f:85:80:1e:a6:25: c7:42:88:be:91:fd:a0:5c:c0:8a:d4:a6:0f:45:14:49: cb:40:4c:78:8f:5d:ea:80:3a:b8:b6:a2:67:79:4b:8c: 62:37:2d:6b:f8:c7:da:ed:99:74:bf:90:30:a3:4c:5c: 84:c7:6d:1b:d7:7b:55:89:f3:4a:a6:30:06:f2:6e:cd: b8:45:d7:ba:0f:85:d0:01:59:ee:1a:f2:91:36:02:8f: 64:dd:86:0d:55:66:dc:be:dc:5a:92:a9:6a:ec:9b:ff: 39:70:65:f3:cf:9f:93:79:98:ca:84:f5:16:69:ae:cf: 91:57:eb:cc:e3:4b:5b:ba:e7:9b:96:3c:bf:b6:b7:b0: 4d:27:37:37:4c:c6:51:58:bf:4d:3f:fa:34:4e:db:d8: fe:e9:4d:60:24:3b:6f:f6:d2:b2:2d:9e:75:79:d1:69: aa:1c:a0:33:6c:84:45:74:b3:a2:d9:53:8c:c5:ee:78: 51:36:da:99:de:60:62:0c:1c:ba:e2:bc:73:5e:46:2e: e9:b7:0c:bd:ac:b4:18:39:97:f2:73:35:c0:66:67:a7: d4:21:37:37:32:0e:b1:69:48:f3:48:d2:56:f7:bc:72: 76:46:25:7f:95:d6:1f:ee:db:95:de:be:f3:c5:61:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:1c:35:50:a5:90:af:ce:78:a0:8c:85:9f:73:98:ce: b0:98:77:36:85:c8:47:31:ae:15:bf:b0:71:82:e7:0e: fc:97:cb:23:cd:12:cd:0e:87:c7:5d:61:cc:6e:a7:53: d8:39:c0:41:9c:db:80:16:30:dd:f1:8c:c8:5f:7d:40: 7f:64:cc:5b:c6:ca:45:e0:87:62:17:da:a2:0a:ec:c9: 68:41:97:44:71:b0:7a:8b:c3:79:ee:9d:c0:c3:a0:e3: 7f:01:97:56:8b:88:39:f1:81:f7:9e:1b:a2:25:24:3a: ba:72:8d:27:30:80:5a:28:e2:82:57:82:52:b6:e5:e2: b2:68:6d:c8:df:24:28:f8:31:12:c9:76:ae:2a:6d:48: 04:22:ff:5a:ef:81:f9:58:37:05:51:96:29:a8:53:e0: 50:dc:84:da:52:db:1a:64:d2:cf:d2:30:b2:75:db:c6: 8f:4b:30:4e:03:58:4e:47:04:58:9f:f2:3a:5f:de:95: 15:bf:19:51:63:38:f1:ec:54:32:54:22:30:dc:e6:df: 88:85:a9:fa:3a:32:a1:a0:91:5b:97:c1:31:7c:3a:6a: 87:36:16:9a:45:09:2a:22:fc:6f:50:8f:b7:c4:5b:79: f8:93:71:e6:5b:b4:7c:cb:9c:61:5f:da:43:f6:2d:cc Fingerprint (SHA-256): AD:5D:0E:9F:3F:C0:44:4C:B9:CE:7D:67:54:A9:74:D9:A8:05:8A:6C:A8:77:C0:80:F5:DF:59:B9:D8:D5:C3:51 Fingerprint (SHA1): C4:58:03:D2:C9:B2:28:B0:C7:1B:10:E6:EF:39:02:F4:0E:4B:61:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152425 (0x3cafc5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:29:45 2023 Not After : Wed Oct 18 15:29:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:5f:75:9f:61:97:8b:86:de:7e:8f:85:80:1e:a6:25: c7:42:88:be:91:fd:a0:5c:c0:8a:d4:a6:0f:45:14:49: cb:40:4c:78:8f:5d:ea:80:3a:b8:b6:a2:67:79:4b:8c: 62:37:2d:6b:f8:c7:da:ed:99:74:bf:90:30:a3:4c:5c: 84:c7:6d:1b:d7:7b:55:89:f3:4a:a6:30:06:f2:6e:cd: b8:45:d7:ba:0f:85:d0:01:59:ee:1a:f2:91:36:02:8f: 64:dd:86:0d:55:66:dc:be:dc:5a:92:a9:6a:ec:9b:ff: 39:70:65:f3:cf:9f:93:79:98:ca:84:f5:16:69:ae:cf: 91:57:eb:cc:e3:4b:5b:ba:e7:9b:96:3c:bf:b6:b7:b0: 4d:27:37:37:4c:c6:51:58:bf:4d:3f:fa:34:4e:db:d8: fe:e9:4d:60:24:3b:6f:f6:d2:b2:2d:9e:75:79:d1:69: aa:1c:a0:33:6c:84:45:74:b3:a2:d9:53:8c:c5:ee:78: 51:36:da:99:de:60:62:0c:1c:ba:e2:bc:73:5e:46:2e: e9:b7:0c:bd:ac:b4:18:39:97:f2:73:35:c0:66:67:a7: d4:21:37:37:32:0e:b1:69:48:f3:48:d2:56:f7:bc:72: 76:46:25:7f:95:d6:1f:ee:db:95:de:be:f3:c5:61:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:1c:35:50:a5:90:af:ce:78:a0:8c:85:9f:73:98:ce: b0:98:77:36:85:c8:47:31:ae:15:bf:b0:71:82:e7:0e: fc:97:cb:23:cd:12:cd:0e:87:c7:5d:61:cc:6e:a7:53: d8:39:c0:41:9c:db:80:16:30:dd:f1:8c:c8:5f:7d:40: 7f:64:cc:5b:c6:ca:45:e0:87:62:17:da:a2:0a:ec:c9: 68:41:97:44:71:b0:7a:8b:c3:79:ee:9d:c0:c3:a0:e3: 7f:01:97:56:8b:88:39:f1:81:f7:9e:1b:a2:25:24:3a: ba:72:8d:27:30:80:5a:28:e2:82:57:82:52:b6:e5:e2: b2:68:6d:c8:df:24:28:f8:31:12:c9:76:ae:2a:6d:48: 04:22:ff:5a:ef:81:f9:58:37:05:51:96:29:a8:53:e0: 50:dc:84:da:52:db:1a:64:d2:cf:d2:30:b2:75:db:c6: 8f:4b:30:4e:03:58:4e:47:04:58:9f:f2:3a:5f:de:95: 15:bf:19:51:63:38:f1:ec:54:32:54:22:30:dc:e6:df: 88:85:a9:fa:3a:32:a1:a0:91:5b:97:c1:31:7c:3a:6a: 87:36:16:9a:45:09:2a:22:fc:6f:50:8f:b7:c4:5b:79: f8:93:71:e6:5b:b4:7c:cb:9c:61:5f:da:43:f6:2d:cc Fingerprint (SHA-256): AD:5D:0E:9F:3F:C0:44:4C:B9:CE:7D:67:54:A9:74:D9:A8:05:8A:6C:A8:77:C0:80:F5:DF:59:B9:D8:D5:C3:51 Fingerprint (SHA1): C4:58:03:D2:C9:B2:28:B0:C7:1B:10:E6:EF:39:02:F4:0E:4B:61:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152427 (0x3cafc5eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 15:29:48 2023 Not After : Wed Oct 18 15:29:48 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:cf:73:f4:40:e7:e3:40:04:ce:70:82:45:90:d8:0c: ba:6f:2e:d0:08:bb:0e:7b:fc:8b:2f:5d:b6:7e:fa:03: 9e:60:3b:15:2e:ff:02:7d:33:b3:99:bf:b0:29:ab:47: e2:9e:da:b3:f2:4a:47:44:6b:d0:98:be:32:e1:2d:12: 38:38:ca:b9:c8:de:b1:60:99:19:eb:68:df:ef:d5:2d: 1f:8e:48:67:23:fd:41:bc:58:64:16:bf:28:4c:82:73: 6d:3c:e7:3b:f5:fd:63:4c:cf:c2:dc:08:51:c4:db:cb: 60:5b:eb:5e:63:44:0f:a3:24:4e:00:45:0d:f7:30:f4: 36:4b:ca:44:20:74:ec:9b:82:f4:7b:5b:87:ab:c2:26: 3e:17:b3:f9:88:b1:23:8e:bf:5d:15:92:d0:a7:97:73: ad:8c:d6:53:86:c0:fe:96:a0:31:94:3a:29:d2:b3:5b: 6e:6b:da:a7:53:04:e6:9d:59:05:bc:1f:fb:2f:6d:8b: 00:a4:cd:4d:5c:de:cc:b8:82:ed:34:ca:85:30:5f:35: 26:64:80:98:32:62:81:67:99:5d:b7:3c:13:ad:dd:02: cb:59:49:25:a9:8c:3b:08:d9:85:9d:df:88:39:a3:e2: 17:37:19:19:b9:10:cf:f5:5f:aa:25:d8:8c:62:7c:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:2b:3a:d4:3a:a2:d5:41:f2:87:f1:8d:e3:50:ae:28: b5:26:99:75:72:94:81:c9:1c:76:e0:3f:57:c9:2c:6f: 80:a7:5c:d6:b0:8b:3b:35:24:a4:17:4d:a8:95:aa:66: 27:8d:aa:6d:29:28:82:bd:97:13:c2:01:67:3d:c9:48: a4:2a:5f:09:b1:eb:18:e8:ec:a8:12:1f:49:04:13:50: 07:22:b0:bc:af:11:69:50:b9:39:b9:72:53:52:9e:4b: 9c:11:47:1f:45:32:88:77:02:1b:dd:ea:0e:c0:4f:c5: b4:f2:03:b6:b0:ae:50:2e:bc:2a:c1:a7:d6:14:ba:5f: e7:c5:97:9f:74:11:7e:3f:7c:04:16:d0:2b:6e:b7:6a: 9e:a3:7b:92:10:8c:32:19:c8:66:5d:fa:0d:53:50:6b: 73:67:19:51:e4:4b:da:b8:24:2a:03:11:94:af:93:ae: 89:48:27:05:2a:c8:7a:29:7a:7b:69:0c:22:e9:d1:03: 50:36:f7:3b:c0:25:20:72:5a:8a:c9:5c:67:1c:30:7b: 19:35:50:27:b7:70:7b:22:e6:c2:da:c0:9d:d0:80:80: 45:77:47:ca:09:ea:30:f7:d2:b7:8a:58:51:3c:f0:91: d2:12:c1:fd:2a:c2:c4:de:27:9e:22:1a:b2:3a:29:f9 Fingerprint (SHA-256): FE:39:F4:5C:6B:10:D2:67:EE:78:66:97:98:7C:00:A4:72:D0:4C:EE:3F:6D:33:97:0C:9D:DE:CE:3A:FA:A0:D6 Fingerprint (SHA1): F3:B1:3E:83:3C:D3:87:21:63:26:64:7C:11:6D:E9:51:A3:7D:CD:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152425 (0x3cafc5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:29:45 2023 Not After : Wed Oct 18 15:29:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:5f:75:9f:61:97:8b:86:de:7e:8f:85:80:1e:a6:25: c7:42:88:be:91:fd:a0:5c:c0:8a:d4:a6:0f:45:14:49: cb:40:4c:78:8f:5d:ea:80:3a:b8:b6:a2:67:79:4b:8c: 62:37:2d:6b:f8:c7:da:ed:99:74:bf:90:30:a3:4c:5c: 84:c7:6d:1b:d7:7b:55:89:f3:4a:a6:30:06:f2:6e:cd: b8:45:d7:ba:0f:85:d0:01:59:ee:1a:f2:91:36:02:8f: 64:dd:86:0d:55:66:dc:be:dc:5a:92:a9:6a:ec:9b:ff: 39:70:65:f3:cf:9f:93:79:98:ca:84:f5:16:69:ae:cf: 91:57:eb:cc:e3:4b:5b:ba:e7:9b:96:3c:bf:b6:b7:b0: 4d:27:37:37:4c:c6:51:58:bf:4d:3f:fa:34:4e:db:d8: fe:e9:4d:60:24:3b:6f:f6:d2:b2:2d:9e:75:79:d1:69: aa:1c:a0:33:6c:84:45:74:b3:a2:d9:53:8c:c5:ee:78: 51:36:da:99:de:60:62:0c:1c:ba:e2:bc:73:5e:46:2e: e9:b7:0c:bd:ac:b4:18:39:97:f2:73:35:c0:66:67:a7: d4:21:37:37:32:0e:b1:69:48:f3:48:d2:56:f7:bc:72: 76:46:25:7f:95:d6:1f:ee:db:95:de:be:f3:c5:61:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:1c:35:50:a5:90:af:ce:78:a0:8c:85:9f:73:98:ce: b0:98:77:36:85:c8:47:31:ae:15:bf:b0:71:82:e7:0e: fc:97:cb:23:cd:12:cd:0e:87:c7:5d:61:cc:6e:a7:53: d8:39:c0:41:9c:db:80:16:30:dd:f1:8c:c8:5f:7d:40: 7f:64:cc:5b:c6:ca:45:e0:87:62:17:da:a2:0a:ec:c9: 68:41:97:44:71:b0:7a:8b:c3:79:ee:9d:c0:c3:a0:e3: 7f:01:97:56:8b:88:39:f1:81:f7:9e:1b:a2:25:24:3a: ba:72:8d:27:30:80:5a:28:e2:82:57:82:52:b6:e5:e2: b2:68:6d:c8:df:24:28:f8:31:12:c9:76:ae:2a:6d:48: 04:22:ff:5a:ef:81:f9:58:37:05:51:96:29:a8:53:e0: 50:dc:84:da:52:db:1a:64:d2:cf:d2:30:b2:75:db:c6: 8f:4b:30:4e:03:58:4e:47:04:58:9f:f2:3a:5f:de:95: 15:bf:19:51:63:38:f1:ec:54:32:54:22:30:dc:e6:df: 88:85:a9:fa:3a:32:a1:a0:91:5b:97:c1:31:7c:3a:6a: 87:36:16:9a:45:09:2a:22:fc:6f:50:8f:b7:c4:5b:79: f8:93:71:e6:5b:b4:7c:cb:9c:61:5f:da:43:f6:2d:cc Fingerprint (SHA-256): AD:5D:0E:9F:3F:C0:44:4C:B9:CE:7D:67:54:A9:74:D9:A8:05:8A:6C:A8:77:C0:80:F5:DF:59:B9:D8:D5:C3:51 Fingerprint (SHA1): C4:58:03:D2:C9:B2:28:B0:C7:1B:10:E6:EF:39:02:F4:0E:4B:61:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152429 (0x3cafc5ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 15:29:50 2023 Not After : Wed Oct 18 15:29:50 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:85:ba:fe:cd:87:7c:ff:b3:d5:ba:4c:29:cb:74:55: 93:57:13:a8:11:3b:a9:45:a9:e2:49:c2:21:72:44:1d: 58:d2:fb:e4:b5:a5:00:5a:c7:fb:47:40:69:73:a6:c4: 27:db:96:30:86:d9:60:1c:9c:b5:96:35:af:36:9d:41: fa:67:c5:8c:4b:79:e6:46:9c:13:a6:b6:e5:c9:ab:e9: 95:95:65:32:85:05:0e:e7:a0:37:09:e6:82:ef:63:95: 5f:bb:44:de:9f:ed:14:e6:d6:d4:f7:4c:c5:af:54:92: c3:21:c3:c4:34:a6:16:98:a2:71:a1:9e:7c:a0:64:03: 96:5d:49:13:9b:9c:d1:e0:ad:72:27:0f:49:e1:30:77: 69:c8:0d:38:6e:42:06:37:41:a4:dc:a9:fb:ac:f2:c0: d2:76:25:51:3f:cd:04:e2:04:5c:53:36:b0:64:ed:5d: 87:da:5c:b9:10:49:a2:d8:c1:00:d6:22:0b:19:86:98: b9:3c:06:dd:93:f1:2d:8a:34:e7:a7:3d:71:66:ca:da: 90:48:36:b3:8d:18:73:1e:e4:d7:21:df:32:d8:4f:77: 00:db:9e:49:d9:73:df:29:bd:6f:fa:9a:a7:a6:12:04: d0:b0:bd:f5:e0:c5:59:f3:75:f1:9e:4f:44:54:f4:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:98:68:35:57:70:65:d0:93:2e:c2:cd:cf:c7:47:8e: fa:77:ee:ff:a2:89:50:0f:c4:e8:a1:36:c0:46:63:f6: 14:88:20:9a:86:6c:21:40:37:7d:97:7a:33:54:cd:6c: 14:ba:83:ad:8a:62:a5:63:32:5f:10:ad:4f:46:e6:f6: 14:e1:12:f2:44:65:88:f2:85:48:44:e6:f3:47:f8:90: f0:cb:fb:a6:d0:45:7e:f2:63:6e:bf:eb:38:14:18:98: ed:2b:41:51:e4:02:36:96:c6:17:a7:58:d5:1c:b0:94: 53:7f:31:9b:27:65:ae:9a:92:35:40:9e:b4:69:61:a1: ac:4b:d0:60:b8:ee:59:79:b3:63:63:20:48:5a:2b:17: fc:ff:17:c0:b3:0c:b4:ff:2a:f9:1e:81:bf:f9:e9:87: f6:b7:bc:03:d3:02:e3:33:58:c1:23:84:a8:d4:62:a7: 73:ef:71:7f:ea:9e:e9:3f:b1:69:31:d4:91:4b:5f:ca: e1:b0:a8:43:92:aa:5d:d1:ca:b5:98:5c:fa:da:97:90: 98:84:ad:b4:6e:a8:9b:fe:8e:13:0d:3c:83:cb:e6:fa: 05:a9:fc:3e:99:81:8f:ae:27:99:02:48:04:08:16:19: 9c:24:13:9a:68:ee:6a:d3:cb:d3:5d:f4:43:50:7f:9a Fingerprint (SHA-256): 63:DF:A3:21:B4:86:B5:EA:D8:1F:44:FB:99:F8:AB:62:A5:BC:28:9A:6E:E8:69:6E:55:7F:92:D9:A6:FE:30:10 Fingerprint (SHA1): 59:BE:37:B5:84:14:0A:BF:1D:7F:1E:AA:82:DB:38:88:C1:F3:C7:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152425 (0x3cafc5e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 15:29:45 2023 Not After : Wed Oct 18 15:29:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:5f:75:9f:61:97:8b:86:de:7e:8f:85:80:1e:a6:25: c7:42:88:be:91:fd:a0:5c:c0:8a:d4:a6:0f:45:14:49: cb:40:4c:78:8f:5d:ea:80:3a:b8:b6:a2:67:79:4b:8c: 62:37:2d:6b:f8:c7:da:ed:99:74:bf:90:30:a3:4c:5c: 84:c7:6d:1b:d7:7b:55:89:f3:4a:a6:30:06:f2:6e:cd: b8:45:d7:ba:0f:85:d0:01:59:ee:1a:f2:91:36:02:8f: 64:dd:86:0d:55:66:dc:be:dc:5a:92:a9:6a:ec:9b:ff: 39:70:65:f3:cf:9f:93:79:98:ca:84:f5:16:69:ae:cf: 91:57:eb:cc:e3:4b:5b:ba:e7:9b:96:3c:bf:b6:b7:b0: 4d:27:37:37:4c:c6:51:58:bf:4d:3f:fa:34:4e:db:d8: fe:e9:4d:60:24:3b:6f:f6:d2:b2:2d:9e:75:79:d1:69: aa:1c:a0:33:6c:84:45:74:b3:a2:d9:53:8c:c5:ee:78: 51:36:da:99:de:60:62:0c:1c:ba:e2:bc:73:5e:46:2e: e9:b7:0c:bd:ac:b4:18:39:97:f2:73:35:c0:66:67:a7: d4:21:37:37:32:0e:b1:69:48:f3:48:d2:56:f7:bc:72: 76:46:25:7f:95:d6:1f:ee:db:95:de:be:f3:c5:61:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:1c:35:50:a5:90:af:ce:78:a0:8c:85:9f:73:98:ce: b0:98:77:36:85:c8:47:31:ae:15:bf:b0:71:82:e7:0e: fc:97:cb:23:cd:12:cd:0e:87:c7:5d:61:cc:6e:a7:53: d8:39:c0:41:9c:db:80:16:30:dd:f1:8c:c8:5f:7d:40: 7f:64:cc:5b:c6:ca:45:e0:87:62:17:da:a2:0a:ec:c9: 68:41:97:44:71:b0:7a:8b:c3:79:ee:9d:c0:c3:a0:e3: 7f:01:97:56:8b:88:39:f1:81:f7:9e:1b:a2:25:24:3a: ba:72:8d:27:30:80:5a:28:e2:82:57:82:52:b6:e5:e2: b2:68:6d:c8:df:24:28:f8:31:12:c9:76:ae:2a:6d:48: 04:22:ff:5a:ef:81:f9:58:37:05:51:96:29:a8:53:e0: 50:dc:84:da:52:db:1a:64:d2:cf:d2:30:b2:75:db:c6: 8f:4b:30:4e:03:58:4e:47:04:58:9f:f2:3a:5f:de:95: 15:bf:19:51:63:38:f1:ec:54:32:54:22:30:dc:e6:df: 88:85:a9:fa:3a:32:a1:a0:91:5b:97:c1:31:7c:3a:6a: 87:36:16:9a:45:09:2a:22:fc:6f:50:8f:b7:c4:5b:79: f8:93:71:e6:5b:b4:7c:cb:9c:61:5f:da:43:f6:2d:cc Fingerprint (SHA-256): AD:5D:0E:9F:3F:C0:44:4C:B9:CE:7D:67:54:A9:74:D9:A8:05:8A:6C:A8:77:C0:80:F5:DF:59:B9:D8:D5:C3:51 Fingerprint (SHA1): C4:58:03:D2:C9:B2:28:B0:C7:1B:10:E6:EF:39:02:F4:0E:4B:61:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018152430 (0x3cafc5ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 15:29:52 2023 Not After : Wed Oct 18 15:29:52 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:04:b9:57:fb:38:46:cd:ce:67:c6:e2:93:bc:f4:c8: 10:41:cf:bc:33:60:64:85:f2:af:da:44:9b:90:0f:00: 60:ea:bc:95:fa:38:84:7a:cd:28:f3:e6:40:05:6d:46: c8:32:fd:01:19:b1:c4:60:fd:02:ea:c8:19:7d:90:c0: 81:81:85:d9:dc:b4:3f:ac:d8:19:3d:33:fe:1c:dc:0f: 21:ce:f5:10:b0:59:eb:49:a7:3e:b2:94:c8:8f:15:97: fc:48:c3:80:8e:75:53:05:8c:df:28:47:49:08:ec:28: d3:e8:5d:52:95:de:a4:95:5c:57:61:71:4a:f3:a0:70: da:bd:b2:9a:b5:20:8d:55:28:07:4f:f8:53:65:f2:46: ba:7f:09:99:12:62:ed:7b:a7:ba:8e:7a:63:60:16:3f: a0:b7:38:80:61:17:99:06:6a:f8:67:38:34:33:5e:83: d4:f6:cb:6c:e7:1c:25:2d:e2:46:e9:09:3b:83:86:c1: d5:f0:bb:b6:72:1d:f3:77:11:a6:2d:1f:f9:fa:95:e1: 45:87:b4:49:5d:00:0a:94:48:65:88:b8:00:60:4a:fb: a3:20:9f:1a:c8:74:62:8d:97:d7:56:76:1a:93:52:ef: 9e:a4:aa:b5:3b:06:7c:e5:09:fe:39:d2:0b:91:56:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:26:bc:4f:66:26:22:4e:7c:37:c7:b6:cd:16:e5:73: f3:69:a6:2c:dd:cc:04:69:50:05:52:8f:a8:38:f7:e0: a3:5c:c0:e9:58:7c:c6:42:14:af:59:41:34:de:9d:85: c0:d8:60:3c:a9:df:f3:cf:b8:4e:a0:df:67:da:26:43: c9:71:55:6c:8e:a9:38:31:42:de:36:9d:8e:1f:5f:23: 44:00:00:2c:fe:a0:69:5c:b4:59:39:ee:ef:5a:9d:ad: be:d0:66:b2:ee:8f:44:c4:95:b8:57:17:c3:6b:b7:52: aa:50:40:ed:46:53:71:68:c6:b1:dc:4e:29:5d:87:b2: e7:a3:59:b8:5f:22:a3:b3:a5:75:08:e4:98:8a:4b:3c: 4e:e9:73:c3:c6:c6:4e:9c:2e:b3:1f:39:d5:ab:8a:52: 92:40:1f:73:55:b0:3c:b8:ce:ee:e0:60:f3:52:b4:dc: e9:ee:1e:85:be:04:ae:29:6c:28:23:de:8a:42:1d:55: e9:c3:db:c9:9c:c1:84:1f:e8:98:e1:b9:7b:fe:0e:b6: 0f:04:50:87:ce:46:27:9b:ca:58:47:63:b4:41:64:fb: 0a:05:8b:9d:45:15:45:fe:4a:e0:33:9b:6f:05:b4:48: fc:09:18:99:f6:8d:34:11:98:54:22:5f:0a:bd:41:ae Fingerprint (SHA-256): B1:60:C3:9A:C5:2D:1E:BD:FC:45:A6:51:43:6A:C6:84:21:1E:F2:58:50:CA:9A:34:D0:4E:76:21:7D:64:E7:36 Fingerprint (SHA1): 0D:E0:F3:0D:F8:6C:8B:CE:E2:16:38:B9:18:75:79:9A:16:32:09:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 22542 at Wed Oct 18 15:30:00 UTC 2023 kill -USR1 22542 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 22542 killed at Wed Oct 18 15:30:01 UTC 2023 TIMESTAMP chains END: Wed Oct 18 15:30:01 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 15:30:01 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 15:30:01 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 15:30:01 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 15:30:01 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #5: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 15:30:02 UTC 2023 TIMESTAMP ec END: Wed Oct 18 15:30:02 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 15:30:02 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 15:30:02 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 15:30:02 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 15:30:02 UTC 2023 %{do_ssl_gtests}.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Wed Oct 18 15:30:02 UTC 2023 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #1: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #2: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #3: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #4: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #5: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #6: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #7: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #8: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #9: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #10: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #11: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #12: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #13: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #14: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #15: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #16: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #17: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #18: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Wed Oct 18 15:30:30 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 15:30:30 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:fa:32:2f:fa:91:bd:56:d0:93:4a:43:42:e4:59:4c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:75:df:62:0b:1d:0a:05:06:cf:89:df:eb:96:79:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:41:32 2023 Not After : Wed Oct 18 13:41:32 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:4c:75:ca:64:73:13:ed:f5:d9:61:2b:87:72:36: a9:54:e8:95:46:7e:07:84:2c:85:e8:57:f8:d2:36:60: 76:9f:54:0d:53:c5:c8:f5:63:bd:05:4a:ef:f1:52:70: c7:24:1f:23:fd:c5:ee:e7:5e:32:d7:c1:be:19:2d:9b: 5e:8f:37:01:c7:94:5c:f0:70:8b:cb:66:ce:60:97:07: 98:5f:d7:90:95:c6:75:23:c0:e4:b0:76:48:c4:06:8a: a1:8b:cc:cb:b4:d7:f2:2c:e9:34:12:32:5e:98:92:d9: 34:ef:15:37:40:84:c5:be:52:c1:4f:56:2a:23:44:0a: 35:ff:91:86:d0 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:ad:b5:ad:0b:8a:7c:4a:59:d1:ef: 55:e3:18:9e:81:49:bd:be:bc:e7:a2:63:0e:26:4f:e6: 65:30:b7:8c:b6:45:c4:15:28:e5:fd:41:f9:19:d8:4d: 0a:1d:ab:2a:6a:43:2a:aa:55:08:61:69:72:26:e3:b0: 6a:79:9e:7e:ba:15:8a:02:42:01:a1:8e:36:6a:61:d6: 05:3d:2b:82:ab:f4:66:6a:48:77:8b:9c:ea:d1:94:e8: c6:2c:96:3b:7e:cc:ac:70:55:6f:96:2c:a5:5c:2d:65: f6:9a:a1:bf:70:9e:ff:d1:59:b5:6a:1a:f7:4b:08:39: 19:ee:a1:e6:4a:ec:7f:f5:e5:bb:e9 Fingerprint (SHA-256): C7:50:EC:9E:22:47:17:32:34:81:8F:97:40:B0:A9:36:46:EA:2D:28:1E:77:DB:0C:73:46:63:5A:00:A4:CD:C5 Fingerprint (SHA1): A5:19:EA:8E:C9:A7:86:80:3D:E2:07:0F:AB:FB:17:32:11:A2:B4:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:03 2023 Not After : Wed Oct 18 13:42:03 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9a:57:ab:01:ef:da:8b:b1:20:b1:7d:f6:de:4e:b9: f4:af:65:34:7b:eb:85:7d:2c:8a:d4:4b:01:93:9f:44: 7e:59:19:f4:4d:c7:c8:cd:48:40:b5:72:b1:f6:8c:e5: 37:73:ea:cf:cc:17:93:cf:15:bf:d8:d0:61:78:e6:f5: 55:c8:7e:24:91:64:c2:d8:94:e1:ac:9a:53:2b:9f:48: 7b:b0:15:49:1e:4e:4b:82:23:fe:a4:35:36:32:90:16: 09 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e9:f4:e2:92:19:d7:ef:b5:19:b7: 76:f1:f6:38:b1:10:ae:59:24:b1:5c:67:a4:07:09:ca: 37:de:f5:d7:ed:5d:73:05:8b:12:03:4f:9f:97:ff:8d: 7f:46:2e:36:bc:aa:c4:e0:cc:30:56:41:3e:6a:51:0f: 91:ca:d4:42:b1:9a:f6:02:42:01:81:94:3f:73:14:89: 80:2a:e8:d1:92:17:02:ec:01:e0:07:03:71:bb:70:71: ad:f0:4e:51:25:31:f7:68:8e:79:fd:2c:29:e1:1b:73: d5:37:0c:de:b9:df:bf:52:63:5e:35:d2:52:f4:ce:fa: 8a:aa:f3:aa:0b:cd:c2:c8:57:48:d4 Fingerprint (SHA-256): F4:39:E3:F1:79:7D:5D:D0:7B:69:1C:86:92:77:62:14:E2:1B:7F:9C:C4:5C:5C:D2:79:C4:86:F5:4E:4D:68:A2 Fingerprint (SHA1): 30:12:3C:82:56:81:8E:CF:1C:D7:BB:ED:1E:D9:27:1A:7B:71:15:61 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d2:fe:18:9f:4f:cd:a9:5b:7f:0d:ec:36:1b:97:fa:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:41:32 2023 Not After : Wed Oct 18 13:41:32 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:4c:75:ca:64:73:13:ed:f5:d9:61:2b:87:72:36: a9:54:e8:95:46:7e:07:84:2c:85:e8:57:f8:d2:36:60: 76:9f:54:0d:53:c5:c8:f5:63:bd:05:4a:ef:f1:52:70: c7:24:1f:23:fd:c5:ee:e7:5e:32:d7:c1:be:19:2d:9b: 5e:8f:37:01:c7:94:5c:f0:70:8b:cb:66:ce:60:97:07: 98:5f:d7:90:95:c6:75:23:c0:e4:b0:76:48:c4:06:8a: a1:8b:cc:cb:b4:d7:f2:2c:e9:34:12:32:5e:98:92:d9: 34:ef:15:37:40:84:c5:be:52:c1:4f:56:2a:23:44:0a: 35:ff:91:86:d0 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:ad:b5:ad:0b:8a:7c:4a:59:d1:ef: 55:e3:18:9e:81:49:bd:be:bc:e7:a2:63:0e:26:4f:e6: 65:30:b7:8c:b6:45:c4:15:28:e5:fd:41:f9:19:d8:4d: 0a:1d:ab:2a:6a:43:2a:aa:55:08:61:69:72:26:e3:b0: 6a:79:9e:7e:ba:15:8a:02:42:01:a1:8e:36:6a:61:d6: 05:3d:2b:82:ab:f4:66:6a:48:77:8b:9c:ea:d1:94:e8: c6:2c:96:3b:7e:cc:ac:70:55:6f:96:2c:a5:5c:2d:65: f6:9a:a1:bf:70:9e:ff:d1:59:b5:6a:1a:f7:4b:08:39: 19:ee:a1:e6:4a:ec:7f:f5:e5:bb:e9 Fingerprint (SHA-256): C7:50:EC:9E:22:47:17:32:34:81:8F:97:40:B0:A9:36:46:EA:2D:28:1E:77:DB:0C:73:46:63:5A:00:A4:CD:C5 Fingerprint (SHA1): A5:19:EA:8E:C9:A7:86:80:3D:E2:07:0F:AB:FB:17:32:11:A2:B4:21 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:03 2023 Not After : Wed Oct 18 13:42:03 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:9a:57:ab:01:ef:da:8b:b1:20:b1:7d:f6:de:4e:b9: f4:af:65:34:7b:eb:85:7d:2c:8a:d4:4b:01:93:9f:44: 7e:59:19:f4:4d:c7:c8:cd:48:40:b5:72:b1:f6:8c:e5: 37:73:ea:cf:cc:17:93:cf:15:bf:d8:d0:61:78:e6:f5: 55:c8:7e:24:91:64:c2:d8:94:e1:ac:9a:53:2b:9f:48: 7b:b0:15:49:1e:4e:4b:82:23:fe:a4:35:36:32:90:16: 09 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:e9:f4:e2:92:19:d7:ef:b5:19:b7: 76:f1:f6:38:b1:10:ae:59:24:b1:5c:67:a4:07:09:ca: 37:de:f5:d7:ed:5d:73:05:8b:12:03:4f:9f:97:ff:8d: 7f:46:2e:36:bc:aa:c4:e0:cc:30:56:41:3e:6a:51:0f: 91:ca:d4:42:b1:9a:f6:02:42:01:81:94:3f:73:14:89: 80:2a:e8:d1:92:17:02:ec:01:e0:07:03:71:bb:70:71: ad:f0:4e:51:25:31:f7:68:8e:79:fd:2c:29:e1:1b:73: d5:37:0c:de:b9:df:bf:52:63:5e:35:d2:52:f4:ce:fa: 8a:aa:f3:aa:0b:cd:c2:c8:57:48:d4 Fingerprint (SHA-256): F4:39:E3:F1:79:7D:5D:D0:7B:69:1C:86:92:77:62:14:E2:1B:7F:9C:C4:5C:5C:D2:79:C4:86:F5:4E:4D:68:A2 Fingerprint (SHA1): 30:12:3C:82:56:81:8E:CF:1C:D7:BB:ED:1E:D9:27:1A:7B:71:15:61 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d6:77:f6:18:25:1b:a7:6b:0e:72:95:73:33:e5:b9:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: c5:81:e1:45:aa:6b:e9:59:81:31:bf:0b:76:6f:b7:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:1c:69:ac:a4:38:1b:8e:d0:e9:a4:2f:14:70:0f:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0f:e3:ca:bc:7d:54:36:75:7c:49:22:d2:3f:74:6e:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:bc:eb:f3:88:3c:47:20:66:86:26:11:33:f6:99:30 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:08:76:50:59:ad:ce:42:b1:f2:ff:e6:d2:0a:41: d9:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 88:8b:dc:7d:68:62:f3:e0:c8:d2:e2:d8:fc:3e:41:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:6d:83:12:2d:01:a3:0f:fc:b9:5a:19:da:33:0d:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 35:e9:85:f7:51:cd:eb:8a:5d:a6:a3:2b:60:57:ce:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8a:cd:26:2a:66:fd:b5:31:e7:f3:b8:01:7a:29:7e:96 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 61:95:12:ab:fc:64:6e:2a:c2:38:ec:ca:5d:85:1f:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cd:bb:98:d5:1d:1a:ab:9f:91:ed:d4:72:10:5a:6d:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: cd:1e:d2:c6:a5:d8:c0:e6:34:d1:bb:32:c2:6c:3c:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 63:e7:ac:c2:e3:7e:48:ad:ff:19:18:a6:0d:03:75:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 88:c5:55:56:43:40:3c:ff:21:05:e5:6d:2a:58:57:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:80:84:08:1a:3a:d5:b6:c0:5c:ab:32:ba:96:c7:80 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6e:3c:43:95:9f:57:32:a6:cb:31:d3:79:d8:9e: 5a:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d0:36:6d:a1:2b:aa:e2:b3:12:80:4a:eb:8a:29:81:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:42:74:45:7d:4b:e3:a1:98:13:f4:44:dd:fc:60:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b7:e6:64:81:e7:dc:12:83:96:a2:f0:90:fd:a2:17:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a5:c5:26:4d:5e:0d:ea:45:d0:b9:f7:b9:44:8b:57:f8 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fd:d0:1b:35:ae:c9:c6:26:f3:57:05:58:f1:ef:24:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 96:78:9a:f7:76:1a:cd:99:a2:a2:be:82:72:03:36:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 56:8f:5c:89:5f:54:11:6a:63:55:c5:01:72:f2:91:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 42:a8:0d:29:d3:d2:3c:2e:bf:81:2c:58:cf:1c:22:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5f:d4:0d:77:55:c9:f7:18:56:ee:a6:49:c7:e4: cb:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c9:58:33:15:c8:77:ff:25:2e:62:db:01:a7:03:89:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: af:98:cd:d4:f2:54:f8:f4:82:4c:87:9d:54:42:3f:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a5:74:59:95:fe:ec:53:a1:12:51:c5:b4:60:55:8a:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6b:e2:ce:37:52:9d:9d:41:c1:f7:12:cc:f9:a2:f2:da Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3c:d1:e5:63:31:8c:7a:29:13:55:4e:cd:ea:c5:2c:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 62:2b:bb:ce:72:ec:43:cb:c1:cc:38:22:df:b3:3f:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ac:69:eb:1e:60:8b:68:e6:50:08:4b:1a:67:d3:cc:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:f7:d8:22:02:2a:5e:b8:55:00:09:1f:bf:59:9c:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 49:e6:23:9c:d7:0f:b9:af:0e:75:32:8e:9c:e5:50:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:03:b4:c6:f5:91:cc:80:a9:49:81:63:32:0b:b1:29 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0d:df:53:6d:82:3a:89:43:5c:ac:39:c1:3d:97: 6e:06 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: d1:ee:e5:69:a3:a7:df:b5:0d:67:51:61:57:a7:4b:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:4e:54:4e:b7:9b:bb:0b:ca:e0:52:02:f2:36:ec:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e9:cc:f2:db:45:da:1e:13:47:72:0e:e9:1d:d8:1d:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a6:22:6e:e1:fb:2c:4a:dd:24:7f:ba:70:43:09:f4:2c Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a3:91:d0:0b:45:3f:48:50:40:04:be:f6:f0:8d:2d:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ff:99:4b:49:83:e4:82:c6:ca:93:10:de:e0:e9:63:59 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: d0:67:b3:40:9c:72:b7:d7:e3:14:ce:14:bc:c9:39:fc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:9b:7a:ef:96:4c:74:40:d7:ed:ac:5c:e5:7b:94:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: e4:65:db:92:00:c4:5a:63:03:27:ef:b0:00:5e:7d:74 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:77:d5:ad:ab:ca:b6:45:6c:66:55:14:4e:c5:9b:cb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:50:26:cf:28:8e:7d:4d:72:de:ce:44:d6:08:b0: f9:f2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6b:98:9a:3a:19:b0:2d:0c:54:1b:ab:64:33:c7:a9:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:b6:9b:51:61:20:f0:90:e6:75:ff:57:67:2f:ce:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 4f:09:2d:2b:9c:5e:be:f1:c4:28:09:85:ea:07:97:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 81:23:92:1a:05:3a:3c:6f:52:3d:3c:a3:0b:11:e2:9f Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ab:67:35:b3:5e:cd:34:42:66:0f:a6:a8:43:48:05:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 16:be:cc:db:e2:28:aa:0e:f3:bc:f6:d5:af:16:64:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:58:2e:26:5a:77:4d:35:8b:52:a1:8c:b0:e9:6e:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:2d:e7:eb:c5:73:4f:b4:66:91:95:5d:00:ce:ee:97 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0b:02:8a:4b:ff:2a:6b:68:5c:8c:5d:f4:c0:47: 98:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 05:e7:4b:3a:c7:32:a1:5a:63:ae:13:15:c0:53:89:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:e5:51:17:a5:ea:e6:97:f8:0c:0c:37:62:d5:b0:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ea:1b:67:92:05:b9:2b:98:50:c6:68:e5:b3:19:c1:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7c:10:c4:ad:d6:b7:5f:4d:3e:30:cc:87:5d:84:f5:d2 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ca:26:ca:8b:68:4d:56:ab:51:29:19:8e:29:3f:63:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c4:a0:8d:45:5d:c4:4f:d2:e4:0a:13:ac:4a:e1:d3:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 80:09:0a:4e:81:e9:80:bd:00:a3:32:45:c1:11:9a:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5f:65:45:c4:06:f6:71:f1:91:49:e7:3e:a2:7a:bc:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 1b:32:ad:ef:ce:d2:33:a3:5f:a3:77:d9:d9:18:00:bc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1e:fb:f3:0d:1a:11:e2:57:4a:aa:5e:a4:3b:fb:76:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d2:3f:04:a7:2b:99:c7:55:10:c4:7a:6a:fa:5a: 01:61 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9e:cf:ea:33:e6:c1:5a:a5:e0:2b:36:40:9c:bf:6d:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:94:29:b5:31:36:d0:9b:ae:fa:d3:67:9f:06:25:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 11:ef:99:56:1b:28:3f:5f:fe:9b:e4:c5:a7:9a:b1:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7c:39:96:6d:1a:00:33:d1:e4:f5:cf:dc:f5:7a:dd:15 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e6:e3:4e:02:33:86:53:ed:2a:97:c5:1a:8f:b7:7b:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a0:f9:9a:aa:74:9a:13:59:b4:a9:62:f6:24:6e:68:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 62:e1:6b:71:d7:85:8f:63:0a:3e:dd:8d:1a:45:56:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:01:3c:30:24:2a:88:8b:86:24:84:66:e7:44:8a:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 7f:8e:20:39:ea:72:3a:48:23:88:41:73:a3:06:d8:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:20:76:0c:75:24:ac:ff:ea:03:18:28:cb:85:6d:0f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ef:af:c4:47:6d:ac:b3:62:cd:1d:a2:81:95:fb: 8b:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 73:7d:fe:00:05:fc:13:bf:7a:8e:8b:8e:58:69:d3:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:98:a3:49:86:6f:bf:94:f8:50:fc:3d:fa:60:66:10 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 45:48:8a:fc:ad:2f:cc:14:0d:18:15:a5:b8:67:bf:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 7f:30:bc:a1:7c:47:14:02:6d:a6:5b:a8:15:85:21:5e Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 4b:52:57:b8:03:46:ef:ea:4d:42:50:1f:1f:31:e9:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2a:00:f3:9b:5b:df:99:94:56:41:91:19:ad:07:32:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a6:5b:ce:41:47:e2:fc:f4:5d:fa:06:d8:25:19:0e:05 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6c:aa:c6:d8:44:af:43:25:44:c5:6d:a0:17:3b:8b:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 51:07:a1:ec:d0:fa:90:0f:a9:f7:cf:7e:eb:b9:72:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2f:8d:15:c9:a3:f6:ad:2e:20:75:cb:ef:15:2a:be:d7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d3:e5:09:1f:b1:16:29:aa:b5:ed:61:4f:15:42: e8:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7b:fc:06:d1:cc:fe:9a:3f:9b:11:9b:63:00:8b:a6:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0f:2d:11:d9:19:0c:bc:99:53:ac:6e:ef:c4:e1:0a:bf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 92:df:db:08:8a:ff:62:c1:47:5d:e9:ed:6b:74:7c:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6f:7e:e6:b4:3e:c2:1b:db:b0:55:eb:da:91:f9:28:45 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 79:6a:f9:e4:bb:11:0e:31:49:f8:a9:35:cc:74:00:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 45:51:18:00:c3:e3:da:15:8d:5a:a5:4e:93:f3:66:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:65:e9:c9:ca:2a:98:6b:dd:3b:34:8f:e9:fd:bb:23 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bd:9f:22:06:92:2c:fa:90:24:6b:c1:27:e4:6f:44:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:b4:b1:fb:de:1f:c0:4d:62:b2:a9:ac:9a:af:79:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:3a:d8:b0:48:3f:8a:23:cd:12:38:af:f3:bd:fd:74 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4b:ea:e5:f4:9b:46:7a:ce:b8:1f:ee:f7:1e:7c: 46:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:ee:08:3f:e8:bf:ff:53:14:ab:36:98:c5:3d:b7:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:7d:0a:72:76:b0:5c:03:96:dd:44:9e:a9:a0:4a:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d4:19:34:e9:03:0e:fa:aa:f3:e7:17:af:00:36:2f:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b3:3b:45:6a:c8:bb:d7:58:18:5b:08:ff:93:a4:27:1c Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 61:47:23:a1:33:ef:d8:e8:13:77:26:bf:31:9d:e1:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f2:67:8a:41:f8:3c:3f:fb:c9:ba:3b:87:43:76:73:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b1:b0:aa:2d:9c:11:30:ca:5e:3a:23:05:91:f7:6f:b5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:fb:c3:44:dd:b7:14:fe:9f:e1:dd:ef:75:bf:48: bd:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:31:b9:ca:84:9a:1a:38:6a:eb:4b:d8:74:a3:5a:c8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:1c:36:69:b9:53:60:e9:38:b7:b0:04:f8:f4:3e:35 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:fe:28:e1:77:b9:c8:e4:ba:7c:2b:aa:e2:af:b8: f4:9d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:cb:73:74:16:23:49:82:71:d6:1e:f1:0e:3a:f4:34 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:30:c9:34:b6:29:63:b5:a7:fa:86:ea:58:38: 30:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 43:0d:d9:c6:b6:5b:fe:18:8c:ba:a9:02:41:38:70:a6 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:8e:cd:3b:db:a4:38:26:cb:17:3f:95:57:c3:3f: 99:29 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bc:fd:41:f9:8c:54:54:42:30:73:e8:e0:b0:b3:c1:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:30:a4:00:2e:ec:41:0b:51:15:2e:92:e9:1c:12:2f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:40:eb:ec:7c:3c:0a:d0:46:21:68:58:9e:82:c1: 31:23 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7a:69:4b:df:b3:48:e8:7f:c0:df:6e:e8:01:68:5e:73 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:4d:b1:68:30:c8:61:f3:38:d5:d9:64:88:78:8e: 0b:67 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:7f:80:90:ac:a6:1f:17:7e:b2:c0:21:d6:9c:50:95 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:33:b2:c5:b6:ce:f1:41:bb:71:f0:00:15:97:9f: d2:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 21:b2:66:e2:91:2e:42:a6:c0:d3:44:49:2c:c4:db:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b3:44:62:26:6b:a3:22:6f:1d:be:5f:e9:f1:44:25:8b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:45:c2:d1:d0:f2:78:c3:c6:42:38:20:e8:0a:2f: b3:bd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 03:c6:e2:52:e3:d2:e6:6e:13:6e:8f:70:fd:41:df:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c7:2a:62:f7:47:fd:bc:18:a6:53:14:0d:6b:81:1b:57 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:b1:6d:5c:b2:67:ee:d9:00:24:84:34:0e:4f:5a: ee:9b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:ff:6c:48:00:f2:2f:fc:d2:db:a2:3d:c0:d6:c3:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f2:aa:66:93:91:40:7c:3b:df:41:83:f0:e3:00: ba:68 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:14:1c:c4:90:d8:c4:ca:d6:e4:bb:7d:8b:8c:4c:66 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:ee:fa:3a:28:e2:c7:3a:e2:84:c5:47:7e:34:63: 87:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f1:ab:51:d4:7b:65:36:3e:8a:17:9d:7f:3b:79:1b:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cb:4f:82:16:3e:7a:e4:9b:96:92:45:68:7b:51:6d:48 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:c3:93:5f:d2:df:6c:ad:f5:93:f7:67:e7:e3:0d: d1:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:f8:82:89:da:4a:d7:1b:9d:8c:9e:b8:c0:6d:b5:55 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:7e:47:c8:80:5f:2d:1f:65:4c:cb:78:0c:34:6e: 14:63 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:0a:22:86:9a:36:b1:59:0c:ef:cd:30:2e:11:ec:7f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:5d:e6:aa:1c:a5:56:b0:a3:83:35:70:a7:e6:f6: a0:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0f:2b:86:66:4b:98:0b:70:a6:2a:98:6f:31:3a:c6:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:94:81:68:72:36:1a:1d:85:3b:d2:96:e1:24:6d:73 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:2d:d2:14:4d:e6:a7:c0:d6:a5:64:b8:f1:7a:88: 5b:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:42:90:ce:d6:76:50:ab:08:a5:b8:ed:12:31:b8:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:d0:21:06:dc:4a:99:af:d5:a1:1d:56:8f:b4:b8:24 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:11:f5:47:d9:83:e3:da:6d:22:e5:83:99:39:c5: 27:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:93:02:55:fb:09:9a:f2:b4:aa:3c:2a:f4:b5:6c:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2f:9c:9a:9c:9b:a4:75:fd:0d:fa:89:df:0a:27:e3:e7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:56:7b:76:cf:e7:98:10:c8:54:81:f1:5e:23:ea: 7c:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:d4:1c:66:17:04:3c:91:87:15:36:3c:68:75:a3:bb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:8b:20:0d:86:5a:ea:a3:b6:86:c7:2e:f3:36:7f: e7:89 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:05:2d:99:2a:f5:da:b3:1f:66:a3:57:cb:b4:40:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:94:ce:8f:41:0d:4c:af:f6:5d:99:f9:02:d3:44: fd:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: eb:04:6d:56:0f:6c:2c:c6:11:a2:32:2e:dd:6c:78:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:61:b2:6f:50:28:40:22:85:90:5c:4e:14:72:36:39 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:0d:94:3c:5b:ac:4e:2d:5a:dc:57:a3:c2:66:bc: cd:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 84:75:29:e8:a7:4c:4a:4f:43:12:ae:07:33:5d:f5:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6a:17:aa:a3:9c:2a:2a:94:ca:e4:a4:64:fd:23:d2:92 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:b7:13:77:4e:24:a8:11:c0:e0:d1:2f:00:7f:3d: 2a:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 70:9a:ec:1a:cd:f4:43:6a:39:d0:73:ad:d7:d4:3c:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:94:d7:c1:64:48:e7:e4:a6:c0:da:f9:86:69:c7: 5e:d1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:a9:f7:ef:44:af:c4:cc:75:07:2f:41:3d:82:09:48 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:e9:ed:cc:17:32:b9:bf:3c:a0:c9:f3:85:6c:d8: 04:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:c1:36:fc:a5:20:21:83:ac:72:38:63:32:25:a9:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:64:a1:a0:34:b4:e4:27:e2:54:01:90:70:e1:ac:96 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:0b:ff:f0:46:67:83:d2:dc:7d:00:08:01:99:60: c4:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b8:55:b5:17:f2:d0:41:2c:70:c6:c3:78:2d:e3:c7:21 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:33:15:98:46:0a:d4:b3:bc:54:25:d2:65:87:61: f2:d7 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 58:8e:c5:83:80:19:b3:57:99:30:d0:0f:66:b9:61:2a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:35:b9:28:c1:87:94:32:d2:4e:d0:50:aa:01:fe: 4a:4b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3a:73:72:c1:95:d8:c0:89:e2:22:8f:41:cb:ea:17:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:50:cc:5a:2b:47:55:9f:c9:04:82:f2:31:a8:27:bd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:2c:07:ac:9b:ae:d6:11:40:66:33:3c:d0:27:67: 9d:08 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e8:dc:48:16:fd:e5:50:17:90:78:23:cc:fa:f9:56:d5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:7c:f9:ed:94:5c:46:e1:c9:4c:f3:fe:0b:a1:01:36 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:23:24:ba:44:dd:10:18:38:5d:d1:b8:3f:0e:ac: 52:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6a:72:61:95:c5:c4:c7:89:1f:8c:ea:2d:52:56:09:26 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:75:3f:d5:ed:68:aa:92:58:6f:43:35:6f:75:87: 16:db Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:69:7f:7c:f3:d4:27:cb:92:dd:a3:b6:f0:b2:1c:5e Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:41:2e:75:6c:c9:55:64:c8:1e:96:22:d8:d6:44: 9d:5b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 89:44:10:77:18:b8:ff:b5:cc:73:5c:14:17:87:71:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:51:46:59:22:27:d9:52:6d:8e:14:34:17:92:a0:56 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:e9:d9:20:17:03:1f:eb:b4:73:90:bb:67:34:b3: 85:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d6:79:51:7d:93:84:0b:8c:ce:b4:98:f3:dd:d3:dd:25 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:d3:76:6c:22:05:a3:4c:51:69:7e:7f:07:63:0d: a7:d9 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 66:98:ef:85:79:69:90:07:5d:e6:53:8c:07:15:78:8a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:1d:45:d2:e6:fb:b8:08:15:62:71:f0:95:aa:c4: f1:57 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ce:c1:48:81:77:4f:65:62:c2:bd:20:ec:d1:06:81:2f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:ad:9f:2f:a9:65:8f:16:d5:52:87:00:77:8f:d4:ed Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:0e:d4:8e:ac:d2:b1:2f:fe:3a:7b:6d:07:d4:07: 79:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 79:c0:1f:e1:75:38:35:2e:41:8d:6e:90:7e:b1:97:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:9a:1e:26:eb:1e:b8:db:26:e4:df:80:68:94:52:d2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:52:e8:a8:0d:3b:19:ba:e8:e9:c6:34:c6:6a:a7: 24:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ae:93:9e:f3:6b:86:3e:99:5d:3d:5a:b6:18:4a:3b:71 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ba:a3:36:40:94:4f:d7:8e:2b:d9:ef:22:4a:f8: 29:f0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ee:34:a4:55:50:73:8f:3e:ab:38:54:cc:79:5c:e4:6c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d4:cf:7f:14:28:14:b4:71:18:da:a2:89:ad:7e: 94:9a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 08:7e:36:b4:d3:0a:68:16:24:74:c6:6e:e5:fa:15:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d3:8c:bd:b0:af:65:3b:f6:45:77:51:e0:aa:5d:d5:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:59:f1:76:60:15:cb:cf:a2:02:1b:9e:b9:d1:e9: 7e:66 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 99:98:39:14:64:ee:3f:3f:80:76:9a:d1:5d:22:ed:36 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:c4:07:be:f0:c4:17:4e:09:1a:88:e5:4c:e0:89: 9a:18 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 21:82:12:19:64:cd:6a:30:9d:04:bf:57:4f:03:87:25 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:1f:12:65:82:8b:26:ca:d8:7e:41:bc:f9:8f:24: 56:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2f:97:90:06:c7:2e:74:b0:10:4a:9a:a8:18:c0:d9:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 07:f4:59:63:98:17:41:a8:73:f1:30:13:38:ea:83:0e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 31:86:16:80:d9:42:ce:98:4d:a3:c3:7e:93:fe:9b:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 63:67:18:49:35:80:e9:56:87:4b:52:87:0c:72:83:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: da:4f:e2:9d:3c:1c:01:9e:d5:c0:6e:b2:bd:f6:6b:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cf:0b:6e:a8:16:3a:2d:cb:7d:6f:bc:d3:2c:a8:e3:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 91:ca:52:e4:df:8e:92:a7:26:2d:ad:57:50:08:ae:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:9b:3e:1e:2c:6d:15:9c:61:a6:8d:74:27:45:4d:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:4f:24:b5:a4:a4:4a:e7:e3:1a:1e:42:59:e8:27:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:d1:58:40:96:4a:65:c2:f4:f3:d6:bd:c4:72:02:f2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:d4:3d:c8:08:e1:db:2e:ff:9f:03:35:c2:6f:66:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:f4:63:96:a9:82:c3:ba:b2:ec:4b:fb:87:6f:49:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:05:e2:0f:10:9e:fc:91:cb:80:02:ed:04:15:c2:7d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:99:d1:7c:45:c5:e7:f3:e1:5e:47:97:61:aa:48: e4:83 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:40:17:9f:3f:8a:77:23:f9:d1:9a:30:1c:4a:14:c1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:fc:4e:e7:64:8a:c0:19:b2:b4:33:51:74:03:23: 5c:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:ba:2a:6e:d1:a0:18:38:c9:54:ff:ad:95:3f:09:45 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:cb:74:d7:7d:d2:1d:58:30:da:da:90:3a:91:67: a7:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 19:5c:96:8c:1d:d8:d9:1d:ff:82:98:76:c2:a1:9f:e4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:ed:6e:bd:f5:76:82:6d:f1:67:66:a8:c7:d2:c8: ba:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 93:a3:20:08:7a:bf:15:de:b4:c2:95:da:43:74:ce:88 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:fc:aa:90:39:a9:66:d5:de:07:2d:9f:42:39:fa: 0c:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 14:53:bd:25:54:9c:8d:df:8b:57:59:96:de:aa:c8:df Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bf:fd:75:27:86:e8:77:77:5a:4c:b2:f8:99:a1: 17:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 39:5c:c8:95:6e:df:25:84:7b:d0:56:24:07:a2:2a:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:eb:fd:dd:cd:9c:1a:14:86:ab:1d:c2:8e:1a:d3:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:0b:4f:24:71:88:bc:0c:ca:74:f7:5c:19:61:ba:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:c1:8e:0b:56:75:6d:70:8f:d5:bc:91:ed:4f:08:10 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:11:58:b6:d1:a7:ef:64:40:da:a5:a5:83:6a:54:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:fc:1e:1a:29:6d:af:65:54:fd:6b:e1:29:16:47:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:41:20 2023 Not After : Wed Oct 18 13:41:20 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:7b:07:69:33:1e:43:26:ca:9d:0a:de:b4:ff:70:90: ae:4f:09:b5:50:f0:ae:3a:60:ca:de:c4:6d:b3:3b:37: 77:44:26:19:29:57:5a:b3:eb:1f:1e:a1:ec:97:96:38: 49:38:44:a7:87:17:30:da:da:f4:7d:12:c4:21:73:b9: 32:f7:55:e8:87:13:ca:1d:a3:5a:48:87:f8:96:c8:9f: b4:6f:a4:be:29:27:a1:8f:82:a2:4e:f8:83:58:41:3c: 24:53:16:aa:c9:35:dd:cd:24:5b:b9:1f:4b:8a:54:50: 6b:31:a2:fb:b6:c6:09:84:39:04:7d:88:85:ae:18:80: 3e:73:12:eb:2e:60:48:33:69:86:e5:12:d5:5c:ad:e8: fc:ca:b8:8d:07:d0:12:c6:b0:7e:11:37:8f:15:7d:a0: dc:c0:4d:85:1c:6a:3e:bd:af:a8:f7:f5:44:99:c9:17: 23:a9:18:93:c7:56:0e:97:a9:ce:7c:10:01:48:96:fe: 9c:d4:bc:b8:af:c0:2e:c5:2f:75:7e:00:fe:52:01:dc: 7a:33:d1:3f:fb:72:c1:7b:9a:ec:d6:c4:aa:55:e9:18: 21:59:47:3e:7b:3d:33:20:ac:1f:84:84:b9:46:3a:55: 8a:4e:63:3d:be:b0:9a:b3:e2:0c:5e:64:83:a3:ec:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:16:d6:fd:a6:7f:93:7f:88:48:19:1a:b9:e3:fe:67: f6:61:cf:b2:ae:63:9d:75:ad:f9:dc:b5:79:64:04:ae: d7:4a:08:e9:2e:2f:a0:a8:70:1f:19:13:e4:8a:34:ec: db:7f:7b:cc:3b:b7:96:ff:50:9d:5d:bc:f0:83:66:68: eb:8f:19:8b:09:6b:36:5b:57:cb:f4:8f:52:f6:d7:0c: 53:89:37:c8:cb:b7:9e:9f:41:cb:2e:3e:42:cf:c4:d5: 5b:0d:e5:f5:38:2f:6e:a1:9b:a4:f9:e0:62:3d:59:cf: 65:b9:57:2f:f8:cf:11:83:13:bf:ad:0c:70:e5:4a:4d: dd:e6:61:83:c0:b5:0f:e5:97:35:d9:88:c5:16:eb:33: 6a:05:55:19:c4:bb:38:91:e6:bb:b4:37:47:ef:25:2c: 38:70:33:18:f1:fb:3f:5d:38:8d:3a:35:b0:ef:e4:91: c5:93:1a:78:94:3f:73:c6:07:38:52:39:31:76:0b:02: fd:7a:4f:92:a4:5d:19:96:4d:6c:23:61:8c:84:e3:f2: 4c:f7:6c:d4:08:95:69:ff:57:f6:ff:71:55:88:7c:93: 3a:f9:81:69:51:ef:22:12:a2:70:23:ea:a5:a3:24:64: 83:61:72:09:b4:65:5c:f8:73:6b:59:da:02:9c:f6:a3 Fingerprint (SHA-256): 0B:16:69:14:33:49:7B:4C:06:6B:93:A3:6A:23:6A:37:3B:18:15:8B:E9:98:BF:3A:4A:BD:29:27:A6:40:E2:79 Fingerprint (SHA1): 5E:F0:AD:E3:21:AF:F5:95:C3:61:20:52:7C:68:A1:81:C1:B5:63:D6 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:02 2023 Not After : Wed Oct 18 13:42:02 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:74:8b:43:a9:b0:31:b2:eb:0d:57:49:b1:f7:18:0e: 0f:db:90:d1:34:f0:e3:71:0d:f8:13:e8:c5:c7:1e:f4: 34:24:65:b6:69:f7:d6:f8:9e:ec:92:8f:09:74:c0:f5: e2:45:fb:ca:53:ad:27:4b:75:a6:e9:57:93:37:92:7b: e8:e4:35:fb:53:e8:2e:a8:ec:c6:9d:a0:37:5a:7f:cf: 6c:2b:f4:a1:14:68:ac:cd:45:a4:02:1c:c8:f1:18:ee: 8c:63:42:82:7b:06:9c:c8:11:b1:cf:e7:23:51:9b:e6: 84:b5:41:22:89:3d:0a:04:c4:3b:91:6b:48:c0:87:5b: 5c:d2:69:80:49:bd:68:a1:da:55:fe:9c:df:4b:22:f2: 03:30:08:13:5c:73:16:cf:f2:ae:f3:56:8e:a6:9d:59: 65:7f:fe:be:b2:1d:96:57:e6:d5:b4:f9:ff:f1:a5:86: 8b:37:f6:bc:9d:f9:66:d6:12:93:7b:66:bb:69:3e:64: c9:1d:5d:28:86:e1:2e:e1:ea:85:07:75:40:a3:d6:bf: 20:11:e8:52:32:e8:12:db:68:6d:df:8d:db:8c:09:2c: da:a8:da:69:51:0d:59:8a:90:9b:ed:1f:d7:d6:e9:6d: 9e:03:a3:86:88:60:49:ae:de:6f:c8:05:fb:66:89:b1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:bc:8f:9c:5e:50:cf:6a:23:35:ff:75:c1:dc:cd:b1: 05:7e:dc:19:49:80:79:50:e3:f8:5a:74:44:2a:22:ef: c7:c7:b5:14:79:28:71:57:20:4f:65:58:0a:62:43:62: d3:6c:34:ec:f4:25:be:0f:8b:60:69:0e:fd:3f:95:99: 55:11:f8:fb:ff:32:0b:84:c4:d0:e8:8a:e7:d2:42:ac: d0:53:82:7e:99:a5:fb:bd:2f:c0:21:9a:ed:3c:85:67: b9:e3:a0:1c:f3:57:e7:46:ed:61:48:5a:2e:72:67:65: 51:a5:c8:5f:c3:5f:c9:c2:1d:11:f3:f3:20:50:26:7d: d1:d9:dd:58:65:f8:b9:8f:16:5c:28:fc:0b:a5:6d:f9: c2:b2:7a:71:3e:d4:a0:8c:fb:6e:5b:a9:99:d7:6e:da: f1:de:23:cb:0d:34:b1:26:49:e4:a2:1b:58:f0:c9:9c: 4a:4c:1a:35:d6:b3:06:92:64:4d:77:72:b0:85:6a:b7: 7a:d7:a0:34:49:af:ff:1e:af:06:a6:91:d6:b5:89:e3: 78:03:e9:40:59:f6:c3:a6:1b:81:18:63:cc:ec:bb:7a: 82:fd:2a:bf:42:b0:62:05:fd:49:2a:86:97:b1:96:a4: 22:8d:83:fd:2d:61:27:ef:cb:fa:27:96:b9:bb:17:a3 Fingerprint (SHA-256): BE:D6:F7:41:BE:66:39:2D:4A:13:60:5E:8E:1E:D5:3E:7A:5E:6E:20:EA:E4:5F:B6:C9:61:97:22:C1:6B:B2:E0 Fingerprint (SHA1): A4:9D:A2:54:C8:72:A4:3C:B5:FD:E5:E4:27:E2:A2:7A:FE:88:E2:B3 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 15:51:28 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 15:51:28 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 17228cc6e2ffbe28450879de406e63e8954ff90c FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00042d80 (273792): from 21 (33) to 01 (1) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 15:51:49 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 15:51:49 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 15:51:50 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 15:51:50 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 15:52:36 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 15:52:36 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9087 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9087 found at Wed Oct 18 15:52:36 UTC 2023 selfserv_9355 with PID 9087 started at Wed Oct 18 15:52:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9087 at Wed Oct 18 15:52:37 UTC 2023 kill -USR1 9087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9087 killed at Wed Oct 18 15:52:37 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9139 found at Wed Oct 18 15:52:37 UTC 2023 selfserv_9355 with PID 9139 started at Wed Oct 18 15:52:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9139 at Wed Oct 18 15:52:38 UTC 2023 kill -USR1 9139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9139 killed at Wed Oct 18 15:52:38 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9191 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9191 found at Wed Oct 18 15:52:39 UTC 2023 selfserv_9355 with PID 9191 started at Wed Oct 18 15:52:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9191 at Wed Oct 18 15:52:40 UTC 2023 kill -USR1 9191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9191 killed at Wed Oct 18 15:52:40 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9257 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9257 found at Wed Oct 18 15:52:40 UTC 2023 selfserv_9355 with PID 9257 started at Wed Oct 18 15:52:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9257 at Wed Oct 18 15:52:41 UTC 2023 kill -USR1 9257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9257 killed at Wed Oct 18 15:52:41 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9309 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9309 found at Wed Oct 18 15:52:41 UTC 2023 selfserv_9355 with PID 9309 started at Wed Oct 18 15:52:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9309 at Wed Oct 18 15:52:42 UTC 2023 kill -USR1 9309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9309 killed at Wed Oct 18 15:52:42 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9361 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9361 found at Wed Oct 18 15:52:42 UTC 2023 selfserv_9355 with PID 9361 started at Wed Oct 18 15:52:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9361 at Wed Oct 18 15:52:43 UTC 2023 kill -USR1 9361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9361 killed at Wed Oct 18 15:52:43 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9427 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9427 found at Wed Oct 18 15:52:43 UTC 2023 selfserv_9355 with PID 9427 started at Wed Oct 18 15:52:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9427 at Wed Oct 18 15:52:44 UTC 2023 kill -USR1 9427 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9427 killed at Wed Oct 18 15:52:44 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9479 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9479 found at Wed Oct 18 15:52:44 UTC 2023 selfserv_9355 with PID 9479 started at Wed Oct 18 15:52:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9479 at Wed Oct 18 15:52:45 UTC 2023 kill -USR1 9479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9479 killed at Wed Oct 18 15:52:45 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9531 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9531 found at Wed Oct 18 15:52:46 UTC 2023 selfserv_9355 with PID 9531 started at Wed Oct 18 15:52:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9531 at Wed Oct 18 15:52:46 UTC 2023 kill -USR1 9531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9531 killed at Wed Oct 18 15:52:47 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9597 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9597 found at Wed Oct 18 15:52:47 UTC 2023 selfserv_9355 with PID 9597 started at Wed Oct 18 15:52:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9597 at Wed Oct 18 15:52:48 UTC 2023 kill -USR1 9597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9597 killed at Wed Oct 18 15:52:48 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9649 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9649 found at Wed Oct 18 15:52:48 UTC 2023 selfserv_9355 with PID 9649 started at Wed Oct 18 15:52:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9649 at Wed Oct 18 15:52:49 UTC 2023 kill -USR1 9649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9649 killed at Wed Oct 18 15:52:49 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9701 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9701 found at Wed Oct 18 15:52:49 UTC 2023 selfserv_9355 with PID 9701 started at Wed Oct 18 15:52:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9701 at Wed Oct 18 15:52:50 UTC 2023 kill -USR1 9701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9701 killed at Wed Oct 18 15:52:50 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9767 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9767 found at Wed Oct 18 15:52:51 UTC 2023 selfserv_9355 with PID 9767 started at Wed Oct 18 15:52:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9767 at Wed Oct 18 15:52:51 UTC 2023 kill -USR1 9767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9767 killed at Wed Oct 18 15:52:51 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9819 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9819 found at Wed Oct 18 15:52:52 UTC 2023 selfserv_9355 with PID 9819 started at Wed Oct 18 15:52:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9819 at Wed Oct 18 15:52:52 UTC 2023 kill -USR1 9819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9819 killed at Wed Oct 18 15:52:52 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:52:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9871 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9871 found at Wed Oct 18 15:52:53 UTC 2023 selfserv_9355 with PID 9871 started at Wed Oct 18 15:52:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9871 at Wed Oct 18 15:52:53 UTC 2023 kill -USR1 9871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9871 killed at Wed Oct 18 15:52:53 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9937 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9937 found at Wed Oct 18 15:52:54 UTC 2023 selfserv_9355 with PID 9937 started at Wed Oct 18 15:52:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 9937 at Wed Oct 18 15:52:54 UTC 2023 kill -USR1 9937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9937 killed at Wed Oct 18 15:52:55 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9990 found at Wed Oct 18 15:52:55 UTC 2023 selfserv_9355 with PID 9990 started at Wed Oct 18 15:52:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9990 at Wed Oct 18 15:52:56 UTC 2023 kill -USR1 9990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9990 killed at Wed Oct 18 15:52:56 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10042 found at Wed Oct 18 15:52:56 UTC 2023 selfserv_9355 with PID 10042 started at Wed Oct 18 15:52:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10042 at Wed Oct 18 15:52:57 UTC 2023 kill -USR1 10042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10042 killed at Wed Oct 18 15:52:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10108 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10108 found at Wed Oct 18 15:52:57 UTC 2023 selfserv_9355 with PID 10108 started at Wed Oct 18 15:52:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10108 at Wed Oct 18 15:52:58 UTC 2023 kill -USR1 10108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10108 killed at Wed Oct 18 15:52:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:52:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:52:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10160 found at Wed Oct 18 15:52:59 UTC 2023 selfserv_9355 with PID 10160 started at Wed Oct 18 15:52:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10160 at Wed Oct 18 15:52:59 UTC 2023 kill -USR1 10160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10160 killed at Wed Oct 18 15:52:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10212 found at Wed Oct 18 15:53:00 UTC 2023 selfserv_9355 with PID 10212 started at Wed Oct 18 15:53:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10212 at Wed Oct 18 15:53:01 UTC 2023 kill -USR1 10212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10212 killed at Wed Oct 18 15:53:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10278 found at Wed Oct 18 15:53:01 UTC 2023 selfserv_9355 with PID 10278 started at Wed Oct 18 15:53:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10278 at Wed Oct 18 15:53:02 UTC 2023 kill -USR1 10278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10278 killed at Wed Oct 18 15:53:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10330 found at Wed Oct 18 15:53:02 UTC 2023 selfserv_9355 with PID 10330 started at Wed Oct 18 15:53:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10330 at Wed Oct 18 15:53:03 UTC 2023 kill -USR1 10330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10330 killed at Wed Oct 18 15:53:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10382 found at Wed Oct 18 15:53:03 UTC 2023 selfserv_9355 with PID 10382 started at Wed Oct 18 15:53:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10382 at Wed Oct 18 15:53:04 UTC 2023 kill -USR1 10382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10382 killed at Wed Oct 18 15:53:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10448 found at Wed Oct 18 15:53:04 UTC 2023 selfserv_9355 with PID 10448 started at Wed Oct 18 15:53:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10448 at Wed Oct 18 15:53:05 UTC 2023 kill -USR1 10448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10448 killed at Wed Oct 18 15:53:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10500 found at Wed Oct 18 15:53:05 UTC 2023 selfserv_9355 with PID 10500 started at Wed Oct 18 15:53:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10500 at Wed Oct 18 15:53:06 UTC 2023 kill -USR1 10500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10500 killed at Wed Oct 18 15:53:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10552 found at Wed Oct 18 15:53:06 UTC 2023 selfserv_9355 with PID 10552 started at Wed Oct 18 15:53:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10552 at Wed Oct 18 15:53:07 UTC 2023 kill -USR1 10552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10552 killed at Wed Oct 18 15:53:07 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10618 found at Wed Oct 18 15:53:07 UTC 2023 selfserv_9355 with PID 10618 started at Wed Oct 18 15:53:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10618 at Wed Oct 18 15:53:08 UTC 2023 kill -USR1 10618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10618 killed at Wed Oct 18 15:53:08 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10670 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10670 found at Wed Oct 18 15:53:08 UTC 2023 selfserv_9355 with PID 10670 started at Wed Oct 18 15:53:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10670 at Wed Oct 18 15:53:09 UTC 2023 kill -USR1 10670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10670 killed at Wed Oct 18 15:53:09 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10722 found at Wed Oct 18 15:53:10 UTC 2023 selfserv_9355 with PID 10722 started at Wed Oct 18 15:53:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10722 at Wed Oct 18 15:53:10 UTC 2023 kill -USR1 10722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10722 killed at Wed Oct 18 15:53:10 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10788 found at Wed Oct 18 15:53:11 UTC 2023 selfserv_9355 with PID 10788 started at Wed Oct 18 15:53:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10788 at Wed Oct 18 15:53:11 UTC 2023 kill -USR1 10788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10788 killed at Wed Oct 18 15:53:11 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10840 found at Wed Oct 18 15:53:12 UTC 2023 selfserv_9355 with PID 10840 started at Wed Oct 18 15:53:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10840 at Wed Oct 18 15:53:12 UTC 2023 kill -USR1 10840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10840 killed at Wed Oct 18 15:53:12 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10892 found at Wed Oct 18 15:53:13 UTC 2023 selfserv_9355 with PID 10892 started at Wed Oct 18 15:53:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10892 at Wed Oct 18 15:53:13 UTC 2023 kill -USR1 10892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10892 killed at Wed Oct 18 15:53:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10958 found at Wed Oct 18 15:53:14 UTC 2023 selfserv_9355 with PID 10958 started at Wed Oct 18 15:53:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10958 at Wed Oct 18 15:53:14 UTC 2023 kill -USR1 10958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10958 killed at Wed Oct 18 15:53:14 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11010 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11010 found at Wed Oct 18 15:53:15 UTC 2023 selfserv_9355 with PID 11010 started at Wed Oct 18 15:53:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11010 at Wed Oct 18 15:53:15 UTC 2023 kill -USR1 11010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11010 killed at Wed Oct 18 15:53:15 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11062 found at Wed Oct 18 15:53:16 UTC 2023 selfserv_9355 with PID 11062 started at Wed Oct 18 15:53:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 11062 at Wed Oct 18 15:53:16 UTC 2023 kill -USR1 11062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11062 killed at Wed Oct 18 15:53:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11128 found at Wed Oct 18 15:53:17 UTC 2023 selfserv_9355 with PID 11128 started at Wed Oct 18 15:53:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11128 at Wed Oct 18 15:53:18 UTC 2023 kill -USR1 11128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11128 killed at Wed Oct 18 15:53:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11185 found at Wed Oct 18 15:53:18 UTC 2023 selfserv_9355 with PID 11185 started at Wed Oct 18 15:53:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11185 at Wed Oct 18 15:53:19 UTC 2023 kill -USR1 11185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11185 killed at Wed Oct 18 15:53:19 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11237 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11237 found at Wed Oct 18 15:53:20 UTC 2023 selfserv_9355 with PID 11237 started at Wed Oct 18 15:53:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11237 at Wed Oct 18 15:53:21 UTC 2023 kill -USR1 11237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11237 killed at Wed Oct 18 15:53:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11305 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11305 found at Wed Oct 18 15:53:21 UTC 2023 selfserv_9355 with PID 11305 started at Wed Oct 18 15:53:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11305 at Wed Oct 18 15:53:22 UTC 2023 kill -USR1 11305 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11305 killed at Wed Oct 18 15:53:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11359 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11359 found at Wed Oct 18 15:53:22 UTC 2023 selfserv_9355 with PID 11359 started at Wed Oct 18 15:53:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11359 at Wed Oct 18 15:53:23 UTC 2023 kill -USR1 11359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11359 killed at Wed Oct 18 15:53:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11411 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11411 found at Wed Oct 18 15:53:23 UTC 2023 selfserv_9355 with PID 11411 started at Wed Oct 18 15:53:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11411 at Wed Oct 18 15:53:24 UTC 2023 kill -USR1 11411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11411 killed at Wed Oct 18 15:53:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11479 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11479 found at Wed Oct 18 15:53:25 UTC 2023 selfserv_9355 with PID 11479 started at Wed Oct 18 15:53:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11479 at Wed Oct 18 15:53:25 UTC 2023 kill -USR1 11479 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11479 killed at Wed Oct 18 15:53:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11531 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11531 found at Wed Oct 18 15:53:26 UTC 2023 selfserv_9355 with PID 11531 started at Wed Oct 18 15:53:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11531 at Wed Oct 18 15:53:27 UTC 2023 kill -USR1 11531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11531 killed at Wed Oct 18 15:53:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11583 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11583 found at Wed Oct 18 15:53:27 UTC 2023 selfserv_9355 with PID 11583 started at Wed Oct 18 15:53:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11583 at Wed Oct 18 15:53:28 UTC 2023 kill -USR1 11583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11583 killed at Wed Oct 18 15:53:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11649 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11649 found at Wed Oct 18 15:53:29 UTC 2023 selfserv_9355 with PID 11649 started at Wed Oct 18 15:53:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11649 at Wed Oct 18 15:53:30 UTC 2023 kill -USR1 11649 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11649 killed at Wed Oct 18 15:53:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11701 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11701 found at Wed Oct 18 15:53:30 UTC 2023 selfserv_9355 with PID 11701 started at Wed Oct 18 15:53:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11701 at Wed Oct 18 15:53:31 UTC 2023 kill -USR1 11701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11701 killed at Wed Oct 18 15:53:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11753 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11753 found at Wed Oct 18 15:53:31 UTC 2023 selfserv_9355 with PID 11753 started at Wed Oct 18 15:53:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11753 at Wed Oct 18 15:53:32 UTC 2023 kill -USR1 11753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11753 killed at Wed Oct 18 15:53:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11819 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11819 found at Wed Oct 18 15:53:33 UTC 2023 selfserv_9355 with PID 11819 started at Wed Oct 18 15:53:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11819 at Wed Oct 18 15:53:34 UTC 2023 kill -USR1 11819 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11819 killed at Wed Oct 18 15:53:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11871 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11871 found at Wed Oct 18 15:53:34 UTC 2023 selfserv_9355 with PID 11871 started at Wed Oct 18 15:53:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11871 at Wed Oct 18 15:53:35 UTC 2023 kill -USR1 11871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11871 killed at Wed Oct 18 15:53:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11923 found at Wed Oct 18 15:53:35 UTC 2023 selfserv_9355 with PID 11923 started at Wed Oct 18 15:53:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11923 at Wed Oct 18 15:53:36 UTC 2023 kill -USR1 11923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11923 killed at Wed Oct 18 15:53:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11989 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11989 found at Wed Oct 18 15:53:36 UTC 2023 selfserv_9355 with PID 11989 started at Wed Oct 18 15:53:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11989 at Wed Oct 18 15:53:37 UTC 2023 kill -USR1 11989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11989 killed at Wed Oct 18 15:53:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12041 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12041 found at Wed Oct 18 15:53:38 UTC 2023 selfserv_9355 with PID 12041 started at Wed Oct 18 15:53:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12041 at Wed Oct 18 15:53:39 UTC 2023 kill -USR1 12041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12041 killed at Wed Oct 18 15:53:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12093 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12093 found at Wed Oct 18 15:53:39 UTC 2023 selfserv_9355 with PID 12093 started at Wed Oct 18 15:53:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12093 at Wed Oct 18 15:53:40 UTC 2023 kill -USR1 12093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12093 killed at Wed Oct 18 15:53:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12159 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12159 found at Wed Oct 18 15:53:40 UTC 2023 selfserv_9355 with PID 12159 started at Wed Oct 18 15:53:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12159 at Wed Oct 18 15:53:41 UTC 2023 kill -USR1 12159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12159 killed at Wed Oct 18 15:53:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12211 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12211 found at Wed Oct 18 15:53:42 UTC 2023 selfserv_9355 with PID 12211 started at Wed Oct 18 15:53:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12211 at Wed Oct 18 15:53:43 UTC 2023 kill -USR1 12211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12211 killed at Wed Oct 18 15:53:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12263 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12263 found at Wed Oct 18 15:53:43 UTC 2023 selfserv_9355 with PID 12263 started at Wed Oct 18 15:53:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12263 at Wed Oct 18 15:53:44 UTC 2023 kill -USR1 12263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12263 killed at Wed Oct 18 15:53:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12329 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12329 found at Wed Oct 18 15:53:45 UTC 2023 selfserv_9355 with PID 12329 started at Wed Oct 18 15:53:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12329 at Wed Oct 18 15:53:46 UTC 2023 kill -USR1 12329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12329 killed at Wed Oct 18 15:53:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12381 found at Wed Oct 18 15:53:46 UTC 2023 selfserv_9355 with PID 12381 started at Wed Oct 18 15:53:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12381 at Wed Oct 18 15:53:47 UTC 2023 kill -USR1 12381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12381 killed at Wed Oct 18 15:53:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12433 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12433 found at Wed Oct 18 15:53:47 UTC 2023 selfserv_9355 with PID 12433 started at Wed Oct 18 15:53:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12433 at Wed Oct 18 15:53:48 UTC 2023 kill -USR1 12433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12433 killed at Wed Oct 18 15:53:48 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12499 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12499 found at Wed Oct 18 15:53:48 UTC 2023 selfserv_9355 with PID 12499 started at Wed Oct 18 15:53:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12499 at Wed Oct 18 15:53:49 UTC 2023 kill -USR1 12499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12499 killed at Wed Oct 18 15:53:49 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12551 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12551 found at Wed Oct 18 15:53:50 UTC 2023 selfserv_9355 with PID 12551 started at Wed Oct 18 15:53:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12551 at Wed Oct 18 15:53:51 UTC 2023 kill -USR1 12551 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12551 killed at Wed Oct 18 15:53:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12603 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12603 found at Wed Oct 18 15:53:51 UTC 2023 selfserv_9355 with PID 12603 started at Wed Oct 18 15:53:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12603 at Wed Oct 18 15:53:52 UTC 2023 kill -USR1 12603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12603 killed at Wed Oct 18 15:53:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12669 found at Wed Oct 18 15:53:52 UTC 2023 selfserv_9355 with PID 12669 started at Wed Oct 18 15:53:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12669 at Wed Oct 18 15:53:53 UTC 2023 kill -USR1 12669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12669 killed at Wed Oct 18 15:53:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12721 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12721 found at Wed Oct 18 15:53:54 UTC 2023 selfserv_9355 with PID 12721 started at Wed Oct 18 15:53:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12721 at Wed Oct 18 15:53:55 UTC 2023 kill -USR1 12721 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12721 killed at Wed Oct 18 15:53:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:53:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12773 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12773 found at Wed Oct 18 15:53:55 UTC 2023 selfserv_9355 with PID 12773 started at Wed Oct 18 15:53:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12773 at Wed Oct 18 15:53:56 UTC 2023 kill -USR1 12773 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12773 killed at Wed Oct 18 15:53:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12839 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12839 found at Wed Oct 18 15:53:57 UTC 2023 selfserv_9355 with PID 12839 started at Wed Oct 18 15:53:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12839 at Wed Oct 18 15:53:57 UTC 2023 kill -USR1 12839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12839 killed at Wed Oct 18 15:53:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12891 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12891 found at Wed Oct 18 15:53:58 UTC 2023 selfserv_9355 with PID 12891 started at Wed Oct 18 15:53:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12891 at Wed Oct 18 15:53:59 UTC 2023 kill -USR1 12891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12891 killed at Wed Oct 18 15:53:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:53:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:53:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12943 found at Wed Oct 18 15:53:59 UTC 2023 selfserv_9355 with PID 12943 started at Wed Oct 18 15:53:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12943 at Wed Oct 18 15:54:00 UTC 2023 kill -USR1 12943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12943 killed at Wed Oct 18 15:54:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13009 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13009 found at Wed Oct 18 15:54:00 UTC 2023 selfserv_9355 with PID 13009 started at Wed Oct 18 15:54:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13009 at Wed Oct 18 15:54:01 UTC 2023 kill -USR1 13009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13009 killed at Wed Oct 18 15:54:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13061 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13061 found at Wed Oct 18 15:54:02 UTC 2023 selfserv_9355 with PID 13061 started at Wed Oct 18 15:54:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13061 at Wed Oct 18 15:54:02 UTC 2023 kill -USR1 13061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13061 killed at Wed Oct 18 15:54:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13113 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13113 found at Wed Oct 18 15:54:03 UTC 2023 selfserv_9355 with PID 13113 started at Wed Oct 18 15:54:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13113 at Wed Oct 18 15:54:04 UTC 2023 kill -USR1 13113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13113 killed at Wed Oct 18 15:54:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13179 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13179 found at Wed Oct 18 15:54:04 UTC 2023 selfserv_9355 with PID 13179 started at Wed Oct 18 15:54:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13179 at Wed Oct 18 15:54:05 UTC 2023 kill -USR1 13179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13179 killed at Wed Oct 18 15:54:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13231 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13231 found at Wed Oct 18 15:54:06 UTC 2023 selfserv_9355 with PID 13231 started at Wed Oct 18 15:54:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13231 at Wed Oct 18 15:54:06 UTC 2023 kill -USR1 13231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13231 killed at Wed Oct 18 15:54:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13283 found at Wed Oct 18 15:54:07 UTC 2023 selfserv_9355 with PID 13283 started at Wed Oct 18 15:54:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13283 at Wed Oct 18 15:54:08 UTC 2023 kill -USR1 13283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13283 killed at Wed Oct 18 15:54:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13349 found at Wed Oct 18 15:54:08 UTC 2023 selfserv_9355 with PID 13349 started at Wed Oct 18 15:54:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13349 at Wed Oct 18 15:54:09 UTC 2023 kill -USR1 13349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13349 killed at Wed Oct 18 15:54:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13401 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13401 found at Wed Oct 18 15:54:09 UTC 2023 selfserv_9355 with PID 13401 started at Wed Oct 18 15:54:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13401 at Wed Oct 18 15:54:10 UTC 2023 kill -USR1 13401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13401 killed at Wed Oct 18 15:54:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13453 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13453 found at Wed Oct 18 15:54:10 UTC 2023 selfserv_9355 with PID 13453 started at Wed Oct 18 15:54:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13453 at Wed Oct 18 15:54:11 UTC 2023 kill -USR1 13453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13453 killed at Wed Oct 18 15:54:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13519 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13519 found at Wed Oct 18 15:54:11 UTC 2023 selfserv_9355 with PID 13519 started at Wed Oct 18 15:54:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13519 at Wed Oct 18 15:54:12 UTC 2023 kill -USR1 13519 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13519 killed at Wed Oct 18 15:54:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13571 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13571 found at Wed Oct 18 15:54:12 UTC 2023 selfserv_9355 with PID 13571 started at Wed Oct 18 15:54:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13571 at Wed Oct 18 15:54:13 UTC 2023 kill -USR1 13571 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13571 killed at Wed Oct 18 15:54:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13623 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13623 found at Wed Oct 18 15:54:13 UTC 2023 selfserv_9355 with PID 13623 started at Wed Oct 18 15:54:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13623 at Wed Oct 18 15:54:14 UTC 2023 kill -USR1 13623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13623 killed at Wed Oct 18 15:54:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13689 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13689 found at Wed Oct 18 15:54:15 UTC 2023 selfserv_9355 with PID 13689 started at Wed Oct 18 15:54:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13689 at Wed Oct 18 15:54:15 UTC 2023 kill -USR1 13689 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13689 killed at Wed Oct 18 15:54:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13741 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13741 found at Wed Oct 18 15:54:16 UTC 2023 selfserv_9355 with PID 13741 started at Wed Oct 18 15:54:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13741 at Wed Oct 18 15:54:17 UTC 2023 kill -USR1 13741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13741 killed at Wed Oct 18 15:54:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13797 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13797 found at Wed Oct 18 15:54:17 UTC 2023 selfserv_9355 with PID 13797 started at Wed Oct 18 15:54:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13797 at Wed Oct 18 15:54:18 UTC 2023 kill -USR1 13797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13797 killed at Wed Oct 18 15:54:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13864 found at Wed Oct 18 15:54:19 UTC 2023 selfserv_9355 with PID 13864 started at Wed Oct 18 15:54:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13864 at Wed Oct 18 15:54:19 UTC 2023 kill -USR1 13864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13864 killed at Wed Oct 18 15:54:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13916 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13916 found at Wed Oct 18 15:54:20 UTC 2023 selfserv_9355 with PID 13916 started at Wed Oct 18 15:54:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13916 at Wed Oct 18 15:54:20 UTC 2023 kill -USR1 13916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13916 killed at Wed Oct 18 15:54:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13968 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13968 found at Wed Oct 18 15:54:21 UTC 2023 selfserv_9355 with PID 13968 started at Wed Oct 18 15:54:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13968 at Wed Oct 18 15:54:21 UTC 2023 kill -USR1 13968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13968 killed at Wed Oct 18 15:54:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14036 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14036 found at Wed Oct 18 15:54:22 UTC 2023 selfserv_9355 with PID 14036 started at Wed Oct 18 15:54:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14036 at Wed Oct 18 15:54:22 UTC 2023 kill -USR1 14036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14036 killed at Wed Oct 18 15:54:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14090 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14090 found at Wed Oct 18 15:54:23 UTC 2023 selfserv_9355 with PID 14090 started at Wed Oct 18 15:54:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14090 at Wed Oct 18 15:54:23 UTC 2023 kill -USR1 14090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14090 killed at Wed Oct 18 15:54:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14142 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14142 found at Wed Oct 18 15:54:24 UTC 2023 selfserv_9355 with PID 14142 started at Wed Oct 18 15:54:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14142 at Wed Oct 18 15:54:24 UTC 2023 kill -USR1 14142 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14142 killed at Wed Oct 18 15:54:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14210 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14210 found at Wed Oct 18 15:54:25 UTC 2023 selfserv_9355 with PID 14210 started at Wed Oct 18 15:54:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14210 at Wed Oct 18 15:54:25 UTC 2023 kill -USR1 14210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14210 killed at Wed Oct 18 15:54:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14262 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14262 found at Wed Oct 18 15:54:26 UTC 2023 selfserv_9355 with PID 14262 started at Wed Oct 18 15:54:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14262 at Wed Oct 18 15:54:26 UTC 2023 kill -USR1 14262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14262 killed at Wed Oct 18 15:54:26 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14314 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14314 found at Wed Oct 18 15:54:27 UTC 2023 selfserv_9355 with PID 14314 started at Wed Oct 18 15:54:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14314 at Wed Oct 18 15:54:27 UTC 2023 kill -USR1 14314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14314 killed at Wed Oct 18 15:54:27 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14380 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14380 found at Wed Oct 18 15:54:28 UTC 2023 selfserv_9355 with PID 14380 started at Wed Oct 18 15:54:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14380 at Wed Oct 18 15:54:28 UTC 2023 kill -USR1 14380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14380 killed at Wed Oct 18 15:54:28 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14432 found at Wed Oct 18 15:54:29 UTC 2023 selfserv_9355 with PID 14432 started at Wed Oct 18 15:54:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14432 at Wed Oct 18 15:54:29 UTC 2023 kill -USR1 14432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14432 killed at Wed Oct 18 15:54:29 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14484 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14484 found at Wed Oct 18 15:54:30 UTC 2023 selfserv_9355 with PID 14484 started at Wed Oct 18 15:54:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14484 at Wed Oct 18 15:54:30 UTC 2023 kill -USR1 14484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14484 killed at Wed Oct 18 15:54:30 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14550 found at Wed Oct 18 15:54:31 UTC 2023 selfserv_9355 with PID 14550 started at Wed Oct 18 15:54:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14550 at Wed Oct 18 15:54:31 UTC 2023 kill -USR1 14550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14550 killed at Wed Oct 18 15:54:32 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14604 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14604 found at Wed Oct 18 15:54:32 UTC 2023 selfserv_9355 with PID 14604 started at Wed Oct 18 15:54:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14604 at Wed Oct 18 15:54:33 UTC 2023 kill -USR1 14604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14604 killed at Wed Oct 18 15:54:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14656 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14656 found at Wed Oct 18 15:54:33 UTC 2023 selfserv_9355 with PID 14656 started at Wed Oct 18 15:54:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14656 at Wed Oct 18 15:54:34 UTC 2023 kill -USR1 14656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14656 killed at Wed Oct 18 15:54:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14722 found at Wed Oct 18 15:54:34 UTC 2023 selfserv_9355 with PID 14722 started at Wed Oct 18 15:54:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14722 at Wed Oct 18 15:54:35 UTC 2023 kill -USR1 14722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14722 killed at Wed Oct 18 15:54:35 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14774 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14774 found at Wed Oct 18 15:54:36 UTC 2023 selfserv_9355 with PID 14774 started at Wed Oct 18 15:54:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14774 at Wed Oct 18 15:54:36 UTC 2023 kill -USR1 14774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14774 killed at Wed Oct 18 15:54:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14826 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14826 found at Wed Oct 18 15:54:37 UTC 2023 selfserv_9355 with PID 14826 started at Wed Oct 18 15:54:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14826 at Wed Oct 18 15:54:38 UTC 2023 kill -USR1 14826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14826 killed at Wed Oct 18 15:54:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14892 found at Wed Oct 18 15:54:38 UTC 2023 selfserv_9355 with PID 14892 started at Wed Oct 18 15:54:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14892 at Wed Oct 18 15:54:39 UTC 2023 kill -USR1 14892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14892 killed at Wed Oct 18 15:54:39 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14944 found at Wed Oct 18 15:54:39 UTC 2023 selfserv_9355 with PID 14944 started at Wed Oct 18 15:54:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14944 at Wed Oct 18 15:54:40 UTC 2023 kill -USR1 14944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14944 killed at Wed Oct 18 15:54:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14996 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14996 found at Wed Oct 18 15:54:40 UTC 2023 selfserv_9355 with PID 14996 started at Wed Oct 18 15:54:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14996 at Wed Oct 18 15:54:40 UTC 2023 kill -USR1 14996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14996 killed at Wed Oct 18 15:54:41 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15062 found at Wed Oct 18 15:54:41 UTC 2023 selfserv_9355 with PID 15062 started at Wed Oct 18 15:54:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15062 at Wed Oct 18 15:54:42 UTC 2023 kill -USR1 15062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15062 killed at Wed Oct 18 15:54:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15114 found at Wed Oct 18 15:54:42 UTC 2023 selfserv_9355 with PID 15114 started at Wed Oct 18 15:54:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15114 at Wed Oct 18 15:54:43 UTC 2023 kill -USR1 15114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15114 killed at Wed Oct 18 15:54:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15166 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15166 found at Wed Oct 18 15:54:44 UTC 2023 selfserv_9355 with PID 15166 started at Wed Oct 18 15:54:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15166 at Wed Oct 18 15:54:45 UTC 2023 kill -USR1 15166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15166 killed at Wed Oct 18 15:54:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15232 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15232 found at Wed Oct 18 15:54:45 UTC 2023 selfserv_9355 with PID 15232 started at Wed Oct 18 15:54:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15232 at Wed Oct 18 15:54:46 UTC 2023 kill -USR1 15232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15232 killed at Wed Oct 18 15:54:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15284 found at Wed Oct 18 15:54:46 UTC 2023 selfserv_9355 with PID 15284 started at Wed Oct 18 15:54:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15284 at Wed Oct 18 15:54:47 UTC 2023 kill -USR1 15284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15284 killed at Wed Oct 18 15:54:47 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15336 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15336 found at Wed Oct 18 15:54:47 UTC 2023 selfserv_9355 with PID 15336 started at Wed Oct 18 15:54:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15336 at Wed Oct 18 15:54:48 UTC 2023 kill -USR1 15336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15336 killed at Wed Oct 18 15:54:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15402 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15402 found at Wed Oct 18 15:54:48 UTC 2023 selfserv_9355 with PID 15402 started at Wed Oct 18 15:54:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15402 at Wed Oct 18 15:54:49 UTC 2023 kill -USR1 15402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15402 killed at Wed Oct 18 15:54:49 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15454 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15454 found at Wed Oct 18 15:54:49 UTC 2023 selfserv_9355 with PID 15454 started at Wed Oct 18 15:54:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15454 at Wed Oct 18 15:54:50 UTC 2023 kill -USR1 15454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15454 killed at Wed Oct 18 15:54:50 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15506 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15506 found at Wed Oct 18 15:54:50 UTC 2023 selfserv_9355 with PID 15506 started at Wed Oct 18 15:54:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15506 at Wed Oct 18 15:54:51 UTC 2023 kill -USR1 15506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15506 killed at Wed Oct 18 15:54:51 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15572 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15572 found at Wed Oct 18 15:54:51 UTC 2023 selfserv_9355 with PID 15572 started at Wed Oct 18 15:54:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15572 at Wed Oct 18 15:54:52 UTC 2023 kill -USR1 15572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15572 killed at Wed Oct 18 15:54:52 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15624 found at Wed Oct 18 15:54:52 UTC 2023 selfserv_9355 with PID 15624 started at Wed Oct 18 15:54:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15624 at Wed Oct 18 15:54:53 UTC 2023 kill -USR1 15624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15624 killed at Wed Oct 18 15:54:53 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15676 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15676 found at Wed Oct 18 15:54:53 UTC 2023 selfserv_9355 with PID 15676 started at Wed Oct 18 15:54:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15676 at Wed Oct 18 15:54:54 UTC 2023 kill -USR1 15676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15676 killed at Wed Oct 18 15:54:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15742 found at Wed Oct 18 15:54:54 UTC 2023 selfserv_9355 with PID 15742 started at Wed Oct 18 15:54:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15742 at Wed Oct 18 15:54:55 UTC 2023 kill -USR1 15742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15742 killed at Wed Oct 18 15:54:55 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15794 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15794 found at Wed Oct 18 15:54:55 UTC 2023 selfserv_9355 with PID 15794 started at Wed Oct 18 15:54:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15794 at Wed Oct 18 15:54:56 UTC 2023 kill -USR1 15794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15794 killed at Wed Oct 18 15:54:56 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:54:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15846 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15846 found at Wed Oct 18 15:54:56 UTC 2023 selfserv_9355 with PID 15846 started at Wed Oct 18 15:54:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 15846 at Wed Oct 18 15:54:57 UTC 2023 kill -USR1 15846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15846 killed at Wed Oct 18 15:54:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15912 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15912 found at Wed Oct 18 15:54:57 UTC 2023 selfserv_9355 with PID 15912 started at Wed Oct 18 15:54:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15912 at Wed Oct 18 15:54:58 UTC 2023 kill -USR1 15912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15912 killed at Wed Oct 18 15:54:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15964 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15964 found at Wed Oct 18 15:54:58 UTC 2023 selfserv_9355 with PID 15964 started at Wed Oct 18 15:54:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15964 at Wed Oct 18 15:54:59 UTC 2023 kill -USR1 15964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15964 killed at Wed Oct 18 15:54:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:54:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:54:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16016 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16016 found at Wed Oct 18 15:54:59 UTC 2023 selfserv_9355 with PID 16016 started at Wed Oct 18 15:54:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16016 at Wed Oct 18 15:55:00 UTC 2023 kill -USR1 16016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16016 killed at Wed Oct 18 15:55:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16082 found at Wed Oct 18 15:55:00 UTC 2023 selfserv_9355 with PID 16082 started at Wed Oct 18 15:55:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16082 at Wed Oct 18 15:55:01 UTC 2023 kill -USR1 16082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16082 killed at Wed Oct 18 15:55:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16134 found at Wed Oct 18 15:55:01 UTC 2023 selfserv_9355 with PID 16134 started at Wed Oct 18 15:55:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16134 at Wed Oct 18 15:55:02 UTC 2023 kill -USR1 16134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16134 killed at Wed Oct 18 15:55:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16186 found at Wed Oct 18 15:55:02 UTC 2023 selfserv_9355 with PID 16186 started at Wed Oct 18 15:55:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16186 at Wed Oct 18 15:55:03 UTC 2023 kill -USR1 16186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16186 killed at Wed Oct 18 15:55:03 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16252 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16252 found at Wed Oct 18 15:55:03 UTC 2023 selfserv_9355 with PID 16252 started at Wed Oct 18 15:55:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16252 at Wed Oct 18 15:55:04 UTC 2023 kill -USR1 16252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16252 killed at Wed Oct 18 15:55:04 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16304 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16304 found at Wed Oct 18 15:55:04 UTC 2023 selfserv_9355 with PID 16304 started at Wed Oct 18 15:55:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16304 at Wed Oct 18 15:55:05 UTC 2023 kill -USR1 16304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16304 killed at Wed Oct 18 15:55:05 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16356 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16356 found at Wed Oct 18 15:55:05 UTC 2023 selfserv_9355 with PID 16356 started at Wed Oct 18 15:55:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16356 at Wed Oct 18 15:55:06 UTC 2023 kill -USR1 16356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16356 killed at Wed Oct 18 15:55:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16422 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16422 found at Wed Oct 18 15:55:06 UTC 2023 selfserv_9355 with PID 16422 started at Wed Oct 18 15:55:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16422 at Wed Oct 18 15:55:07 UTC 2023 kill -USR1 16422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16422 killed at Wed Oct 18 15:55:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16474 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16474 found at Wed Oct 18 15:55:07 UTC 2023 selfserv_9355 with PID 16474 started at Wed Oct 18 15:55:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16474 at Wed Oct 18 15:55:08 UTC 2023 kill -USR1 16474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16474 killed at Wed Oct 18 15:55:08 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16526 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16526 found at Wed Oct 18 15:55:08 UTC 2023 selfserv_9355 with PID 16526 started at Wed Oct 18 15:55:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16526 at Wed Oct 18 15:55:09 UTC 2023 kill -USR1 16526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16526 killed at Wed Oct 18 15:55:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16592 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16592 found at Wed Oct 18 15:55:09 UTC 2023 selfserv_9355 with PID 16592 started at Wed Oct 18 15:55:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16592 at Wed Oct 18 15:55:10 UTC 2023 kill -USR1 16592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16592 killed at Wed Oct 18 15:55:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16644 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16644 found at Wed Oct 18 15:55:11 UTC 2023 selfserv_9355 with PID 16644 started at Wed Oct 18 15:55:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16644 at Wed Oct 18 15:55:11 UTC 2023 kill -USR1 16644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16644 killed at Wed Oct 18 15:55:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16696 found at Wed Oct 18 15:55:12 UTC 2023 selfserv_9355 with PID 16696 started at Wed Oct 18 15:55:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16696 at Wed Oct 18 15:55:12 UTC 2023 kill -USR1 16696 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16696 killed at Wed Oct 18 15:55:13 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16763 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16763 found at Wed Oct 18 15:55:13 UTC 2023 selfserv_9355 with PID 16763 started at Wed Oct 18 15:55:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16763 at Wed Oct 18 15:55:14 UTC 2023 kill -USR1 16763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16763 killed at Wed Oct 18 15:55:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16815 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16815 found at Wed Oct 18 15:55:14 UTC 2023 selfserv_9355 with PID 16815 started at Wed Oct 18 15:55:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16815 at Wed Oct 18 15:55:15 UTC 2023 kill -USR1 16815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16815 killed at Wed Oct 18 15:55:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16867 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16867 found at Wed Oct 18 15:55:15 UTC 2023 selfserv_9355 with PID 16867 started at Wed Oct 18 15:55:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16867 at Wed Oct 18 15:55:16 UTC 2023 kill -USR1 16867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16867 killed at Wed Oct 18 15:55:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16933 found at Wed Oct 18 15:55:17 UTC 2023 selfserv_9355 with PID 16933 started at Wed Oct 18 15:55:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16933 at Wed Oct 18 15:55:17 UTC 2023 kill -USR1 16933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16933 killed at Wed Oct 18 15:55:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16989 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16989 found at Wed Oct 18 15:55:18 UTC 2023 selfserv_9355 with PID 16989 started at Wed Oct 18 15:55:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16989 at Wed Oct 18 15:55:18 UTC 2023 kill -USR1 16989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16989 killed at Wed Oct 18 15:55:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17042 found at Wed Oct 18 15:55:19 UTC 2023 selfserv_9355 with PID 17042 started at Wed Oct 18 15:55:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17042 at Wed Oct 18 15:55:20 UTC 2023 kill -USR1 17042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17042 killed at Wed Oct 18 15:55:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17108 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17108 found at Wed Oct 18 15:55:20 UTC 2023 selfserv_9355 with PID 17108 started at Wed Oct 18 15:55:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17108 at Wed Oct 18 15:55:21 UTC 2023 kill -USR1 17108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17108 killed at Wed Oct 18 15:55:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17162 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17162 found at Wed Oct 18 15:55:21 UTC 2023 selfserv_9355 with PID 17162 started at Wed Oct 18 15:55:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17162 at Wed Oct 18 15:55:22 UTC 2023 kill -USR1 17162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17162 killed at Wed Oct 18 15:55:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17216 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17216 found at Wed Oct 18 15:55:22 UTC 2023 selfserv_9355 with PID 17216 started at Wed Oct 18 15:55:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17216 at Wed Oct 18 15:55:23 UTC 2023 kill -USR1 17216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17216 killed at Wed Oct 18 15:55:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17282 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17282 found at Wed Oct 18 15:55:24 UTC 2023 selfserv_9355 with PID 17282 started at Wed Oct 18 15:55:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17282 at Wed Oct 18 15:55:24 UTC 2023 kill -USR1 17282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17282 killed at Wed Oct 18 15:55:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17336 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17336 found at Wed Oct 18 15:55:25 UTC 2023 selfserv_9355 with PID 17336 started at Wed Oct 18 15:55:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17336 at Wed Oct 18 15:55:25 UTC 2023 kill -USR1 17336 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17336 killed at Wed Oct 18 15:55:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17388 found at Wed Oct 18 15:55:26 UTC 2023 selfserv_9355 with PID 17388 started at Wed Oct 18 15:55:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17388 at Wed Oct 18 15:55:27 UTC 2023 kill -USR1 17388 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17388 killed at Wed Oct 18 15:55:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17454 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17454 found at Wed Oct 18 15:55:27 UTC 2023 selfserv_9355 with PID 17454 started at Wed Oct 18 15:55:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17454 at Wed Oct 18 15:55:28 UTC 2023 kill -USR1 17454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17454 killed at Wed Oct 18 15:55:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17506 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17506 found at Wed Oct 18 15:55:28 UTC 2023 selfserv_9355 with PID 17506 started at Wed Oct 18 15:55:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17506 at Wed Oct 18 15:55:29 UTC 2023 kill -USR1 17506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17506 killed at Wed Oct 18 15:55:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17558 found at Wed Oct 18 15:55:29 UTC 2023 selfserv_9355 with PID 17558 started at Wed Oct 18 15:55:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17558 at Wed Oct 18 15:55:30 UTC 2023 kill -USR1 17558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17558 killed at Wed Oct 18 15:55:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17624 found at Wed Oct 18 15:55:31 UTC 2023 selfserv_9355 with PID 17624 started at Wed Oct 18 15:55:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17624 at Wed Oct 18 15:55:31 UTC 2023 kill -USR1 17624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17624 killed at Wed Oct 18 15:55:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17676 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17676 found at Wed Oct 18 15:55:32 UTC 2023 selfserv_9355 with PID 17676 started at Wed Oct 18 15:55:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17676 at Wed Oct 18 15:55:33 UTC 2023 kill -USR1 17676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17676 killed at Wed Oct 18 15:55:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17728 found at Wed Oct 18 15:55:33 UTC 2023 selfserv_9355 with PID 17728 started at Wed Oct 18 15:55:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17728 at Wed Oct 18 15:55:34 UTC 2023 kill -USR1 17728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17728 killed at Wed Oct 18 15:55:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17794 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17794 found at Wed Oct 18 15:55:34 UTC 2023 selfserv_9355 with PID 17794 started at Wed Oct 18 15:55:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17794 at Wed Oct 18 15:55:35 UTC 2023 kill -USR1 17794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17794 killed at Wed Oct 18 15:55:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17846 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17846 found at Wed Oct 18 15:55:35 UTC 2023 selfserv_9355 with PID 17846 started at Wed Oct 18 15:55:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17846 at Wed Oct 18 15:55:36 UTC 2023 kill -USR1 17846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17846 killed at Wed Oct 18 15:55:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17898 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17898 found at Wed Oct 18 15:55:37 UTC 2023 selfserv_9355 with PID 17898 started at Wed Oct 18 15:55:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17898 at Wed Oct 18 15:55:37 UTC 2023 kill -USR1 17898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17898 killed at Wed Oct 18 15:55:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17964 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17964 found at Wed Oct 18 15:55:38 UTC 2023 selfserv_9355 with PID 17964 started at Wed Oct 18 15:55:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17964 at Wed Oct 18 15:55:38 UTC 2023 kill -USR1 17964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17964 killed at Wed Oct 18 15:55:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18016 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18016 found at Wed Oct 18 15:55:39 UTC 2023 selfserv_9355 with PID 18016 started at Wed Oct 18 15:55:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18016 at Wed Oct 18 15:55:39 UTC 2023 kill -USR1 18016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18016 killed at Wed Oct 18 15:55:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18068 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18068 found at Wed Oct 18 15:55:40 UTC 2023 selfserv_9355 with PID 18068 started at Wed Oct 18 15:55:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18068 at Wed Oct 18 15:55:40 UTC 2023 kill -USR1 18068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18068 killed at Wed Oct 18 15:55:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18134 found at Wed Oct 18 15:55:41 UTC 2023 selfserv_9355 with PID 18134 started at Wed Oct 18 15:55:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18134 at Wed Oct 18 15:55:41 UTC 2023 kill -USR1 18134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18134 killed at Wed Oct 18 15:55:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18186 found at Wed Oct 18 15:55:42 UTC 2023 selfserv_9355 with PID 18186 started at Wed Oct 18 15:55:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18186 at Wed Oct 18 15:55:43 UTC 2023 kill -USR1 18186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18186 killed at Wed Oct 18 15:55:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18238 found at Wed Oct 18 15:55:43 UTC 2023 selfserv_9355 with PID 18238 started at Wed Oct 18 15:55:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18238 at Wed Oct 18 15:55:44 UTC 2023 kill -USR1 18238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18238 killed at Wed Oct 18 15:55:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18304 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18304 found at Wed Oct 18 15:55:44 UTC 2023 selfserv_9355 with PID 18304 started at Wed Oct 18 15:55:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18304 at Wed Oct 18 15:55:45 UTC 2023 kill -USR1 18304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18304 killed at Wed Oct 18 15:55:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18356 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18356 found at Wed Oct 18 15:55:45 UTC 2023 selfserv_9355 with PID 18356 started at Wed Oct 18 15:55:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18356 at Wed Oct 18 15:55:46 UTC 2023 kill -USR1 18356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18356 killed at Wed Oct 18 15:55:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 15:55:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18408 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18408 found at Wed Oct 18 15:55:46 UTC 2023 selfserv_9355 with PID 18408 started at Wed Oct 18 15:55:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18408 at Wed Oct 18 15:55:47 UTC 2023 kill -USR1 18408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18408 killed at Wed Oct 18 15:55:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18474 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18474 found at Wed Oct 18 15:55:47 UTC 2023 selfserv_9355 with PID 18474 started at Wed Oct 18 15:55:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18474 at Wed Oct 18 15:55:48 UTC 2023 kill -USR1 18474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18474 killed at Wed Oct 18 15:55:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18527 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18527 found at Wed Oct 18 15:55:48 UTC 2023 selfserv_9355 with PID 18527 started at Wed Oct 18 15:55:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18527 at Wed Oct 18 15:55:49 UTC 2023 kill -USR1 18527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18527 killed at Wed Oct 18 15:55:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18580 found at Wed Oct 18 15:55:50 UTC 2023 selfserv_9355 with PID 18580 started at Wed Oct 18 15:55:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18580 at Wed Oct 18 15:55:50 UTC 2023 kill -USR1 18580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18580 killed at Wed Oct 18 15:55:50 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18647 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18647 found at Wed Oct 18 15:55:51 UTC 2023 selfserv_9355 with PID 18647 started at Wed Oct 18 15:55:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18647 at Wed Oct 18 15:55:52 UTC 2023 kill -USR1 18647 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18647 killed at Wed Oct 18 15:55:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18699 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18699 found at Wed Oct 18 15:55:52 UTC 2023 selfserv_9355 with PID 18699 started at Wed Oct 18 15:55:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18699 at Wed Oct 18 15:55:53 UTC 2023 kill -USR1 18699 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18699 killed at Wed Oct 18 15:55:54 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18751 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18751 found at Wed Oct 18 15:55:54 UTC 2023 selfserv_9355 with PID 18751 started at Wed Oct 18 15:55:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18751 at Wed Oct 18 15:55:55 UTC 2023 kill -USR1 18751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18751 killed at Wed Oct 18 15:55:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18817 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18817 found at Wed Oct 18 15:55:56 UTC 2023 selfserv_9355 with PID 18817 started at Wed Oct 18 15:55:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18817 at Wed Oct 18 15:55:56 UTC 2023 kill -USR1 18817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18817 killed at Wed Oct 18 15:55:56 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18869 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18869 found at Wed Oct 18 15:55:57 UTC 2023 selfserv_9355 with PID 18869 started at Wed Oct 18 15:55:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18869 at Wed Oct 18 15:55:58 UTC 2023 kill -USR1 18869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18869 killed at Wed Oct 18 15:55:58 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:55:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18921 found at Wed Oct 18 15:55:58 UTC 2023 selfserv_9355 with PID 18921 started at Wed Oct 18 15:55:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18921 at Wed Oct 18 15:55:59 UTC 2023 kill -USR1 18921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18921 killed at Wed Oct 18 15:55:59 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9355 starting at Wed Oct 18 15:55:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:55:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:55:59 UTC 2023 selfserv_9355 with PID 18992 started at Wed Oct 18 15:55:59 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:00 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:01 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:01 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:02 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:03 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:03 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:04 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:04 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:05 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:06 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:06 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:07 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:07 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:08 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:09 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:10 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:10 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:11 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:11 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:12 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:12 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:13 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:14 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:14 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:15 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:15 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:17 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:17 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:18 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:18 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:19 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:19 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:20 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:21 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:21 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:22 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:22 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:23 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18992 found at Wed Oct 18 15:56:23 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18992 at Wed Oct 18 15:56:23 UTC 2023 kill -USR1 18992 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18992 killed at Wed Oct 18 15:56:24 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:56:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:56:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:24 UTC 2023 selfserv_9355 with PID 20261 started at Wed Oct 18 15:56:24 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:24 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:25 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:25 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:26 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:26 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:27 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:27 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:27 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:28 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:28 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:29 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:29 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:30 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:31 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:31 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:31 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:32 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:32 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:33 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:33 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:34 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:34 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:34 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:35 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:35 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:36 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:37 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:37 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:37 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:38 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:38 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:39 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:39 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:39 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:40 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:40 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:41 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:41 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20261 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20261 found at Wed Oct 18 15:56:42 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20261 at Wed Oct 18 15:56:42 UTC 2023 kill -USR1 20261 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20261 killed at Wed Oct 18 15:56:42 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:56:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:56:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:42 UTC 2023 selfserv_9355 with PID 21521 started at Wed Oct 18 15:56:42 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:43 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:43 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:43 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:44 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:44 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:45 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:45 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:46 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:46 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:47 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:47 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:48 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:48 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:49 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:49 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:50 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:50 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:51 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:51 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:51 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:52 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:52 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:53 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:53 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:54 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:54 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:55 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:55 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:56 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:56 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:57 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:57 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:57 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:58 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:58 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:59 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:56:59 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:57:00 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21521 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21521 found at Wed Oct 18 15:57:00 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 21521 at Wed Oct 18 15:57:00 UTC 2023 kill -USR1 21521 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21521 killed at Wed Oct 18 15:57:00 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:57:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:57:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:00 UTC 2023 selfserv_9355 with PID 22780 started at Wed Oct 18 15:57:00 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:01 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:01 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:02 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:02 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:03 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:03 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:04 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:04 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:05 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:05 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:06 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:06 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:07 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:08 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:08 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:09 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:09 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:10 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:10 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:10 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:11 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:11 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:12 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:12 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:13 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:13 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:14 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:15 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:15 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:16 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:16 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:17 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:17 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:17 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:18 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:18 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:19 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:19 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22780 found at Wed Oct 18 15:57:20 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 22780 at Wed Oct 18 15:57:20 UTC 2023 kill -USR1 22780 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22780 killed at Wed Oct 18 15:57:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:57:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:57:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24043 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24043 found at Wed Oct 18 15:57:20 UTC 2023 selfserv_9355 with PID 24043 started at Wed Oct 18 15:57:20 UTC 2023 trying to kill selfserv_9355 with PID 24043 at Wed Oct 18 15:57:20 UTC 2023 kill -USR1 24043 ./ssl.sh: line 228: 24043 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24043 killed at Wed Oct 18 15:57:20 UTC 2023 selfserv_9355 starting at Wed Oct 18 15:57:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:57:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:21 UTC 2023 selfserv_9355 with PID 24085 started at Wed Oct 18 15:57:21 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:22 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:22 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:23 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:24 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:24 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:25 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:26 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:27 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:27 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:28 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:29 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:29 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:30 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:32 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:32 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:33 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:34 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:34 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:35 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:36 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:36 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:37 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:38 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:39 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:39 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:40 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:41 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:42 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:43 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:44 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:44 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:45 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:46 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:46 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:47 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:48 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:48 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:49 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24085 found at Wed Oct 18 15:57:50 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24085 at Wed Oct 18 15:57:50 UTC 2023 kill -USR1 24085 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24085 killed at Wed Oct 18 15:57:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:57:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:57:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:50 UTC 2023 selfserv_9355 with PID 25349 started at Wed Oct 18 15:57:50 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:51 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:52 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:53 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:53 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:54 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:55 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:56 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:56 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:57 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:58 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:59 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:57:59 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:00 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:02 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:02 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:03 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:04 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:05 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:05 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:06 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:07 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:08 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:08 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:09 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:10 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:11 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:12 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:13 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:13 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:14 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:15 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:16 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:16 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:17 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:18 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:19 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:19 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:20 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25349 found at Wed Oct 18 15:58:21 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25349 at Wed Oct 18 15:58:21 UTC 2023 kill -USR1 25349 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25349 killed at Wed Oct 18 15:58:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:58:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:58:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:21 UTC 2023 selfserv_9355 with PID 26613 started at Wed Oct 18 15:58:21 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:22 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:22 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:23 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:23 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:24 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:24 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:25 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:25 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:26 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:26 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:27 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:27 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:28 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:29 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:30 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:30 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:31 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:31 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:31 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:32 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:32 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:33 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:33 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:34 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:34 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:35 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:36 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:37 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:37 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:38 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:38 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:39 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:39 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:39 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:40 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:40 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:41 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:41 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26613 found at Wed Oct 18 15:58:42 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26613 at Wed Oct 18 15:58:42 UTC 2023 kill -USR1 26613 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26613 killed at Wed Oct 18 15:58:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:58:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:58:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:42 UTC 2023 selfserv_9355 with PID 27881 started at Wed Oct 18 15:58:42 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:43 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:44 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:44 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:45 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:45 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:46 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:47 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:47 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:48 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:48 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:49 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:49 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:50 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:51 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:51 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:52 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:52 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:53 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:53 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:54 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:54 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:55 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:55 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:56 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:57 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:57 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:58 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:58 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:58:59 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:00 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:00 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:01 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:01 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:02 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:02 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:03 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:03 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:04 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:04 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:05 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27881 found at Wed Oct 18 15:59:05 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27881 at Wed Oct 18 15:59:06 UTC 2023 kill -USR1 27881 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27881 killed at Wed Oct 18 15:59:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:59:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:59:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:06 UTC 2023 selfserv_9355 with PID 29140 started at Wed Oct 18 15:59:06 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:07 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:07 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:08 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:08 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:09 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:10 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:10 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:11 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:12 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:12 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:13 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:13 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:14 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:15 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:16 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:16 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:17 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:18 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:18 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:19 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:19 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:20 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:20 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:21 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:22 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:22 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:24 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:24 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:25 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:25 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:26 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:26 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:27 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:28 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:28 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:29 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:29 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:30 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29140 found at Wed Oct 18 15:59:31 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29140 at Wed Oct 18 15:59:31 UTC 2023 kill -USR1 29140 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29140 killed at Wed Oct 18 15:59:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:59:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:59:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:31 UTC 2023 selfserv_9355 with PID 30409 started at Wed Oct 18 15:59:31 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:32 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:32 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:33 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:33 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:34 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:35 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:35 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:36 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:36 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:37 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:37 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:38 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:39 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:40 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:40 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:41 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:41 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:42 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:42 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:43 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:44 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:44 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:45 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:45 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:46 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:46 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:48 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:48 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:49 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:49 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:50 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:50 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:51 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:51 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:52 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:53 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:53 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:54 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30409 found at Wed Oct 18 15:59:54 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30409 at Wed Oct 18 15:59:54 UTC 2023 kill -USR1 30409 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30409 killed at Wed Oct 18 15:59:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 15:59:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:59:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31667 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31667 found at Wed Oct 18 15:59:55 UTC 2023 selfserv_9355 with PID 31667 started at Wed Oct 18 15:59:55 UTC 2023 trying to kill selfserv_9355 with PID 31667 at Wed Oct 18 15:59:55 UTC 2023 kill -USR1 31667 ./ssl.sh: line 228: 31667 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31667 killed at Wed Oct 18 15:59:55 UTC 2023 selfserv_9355 starting at Wed Oct 18 15:59:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 15:59:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:55 UTC 2023 selfserv_9355 with PID 31709 started at Wed Oct 18 15:59:55 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:56 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:57 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:57 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:58 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 15:59:59 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:00 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:00 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:01 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:02 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:03 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:03 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:04 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:05 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:06 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:07 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:07 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:08 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:09 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:10 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:10 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:11 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:12 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:12 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:13 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:14 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:15 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:16 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:17 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:17 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:18 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:19 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:19 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:20 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:21 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:22 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:22 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:23 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:24 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31709 found at Wed Oct 18 16:00:24 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31709 at Wed Oct 18 16:00:24 UTC 2023 kill -USR1 31709 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31709 killed at Wed Oct 18 16:00:24 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:00:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:00:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:25 UTC 2023 selfserv_9355 with PID 611 started at Wed Oct 18 16:00:25 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:26 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:26 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:27 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:28 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:29 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:29 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:30 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:31 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:32 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:32 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:33 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:34 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:35 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:36 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:37 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:38 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:38 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:39 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:40 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:41 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:41 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:42 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:43 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:44 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:44 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:45 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:46 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:47 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:47 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:48 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:49 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:50 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:50 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:51 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:52 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:52 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:53 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:54 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:55 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 611 found at Wed Oct 18 16:00:55 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 611 at Wed Oct 18 16:00:55 UTC 2023 kill -USR1 611 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 611 killed at Wed Oct 18 16:00:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:00:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:00:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:56 UTC 2023 selfserv_9355 with PID 1893 started at Wed Oct 18 16:00:56 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:57 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:57 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:58 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:58 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:58 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:59 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:00:59 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:00 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:00 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:01 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:01 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:02 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:02 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:04 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:04 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:05 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:05 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:06 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:06 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:07 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:07 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:08 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:08 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:09 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:09 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:10 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:11 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:11 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:12 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:12 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:13 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:13 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:14 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:14 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:15 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:15 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:16 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:16 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1893 found at Wed Oct 18 16:01:17 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1893 at Wed Oct 18 16:01:17 UTC 2023 kill -USR1 1893 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1893 killed at Wed Oct 18 16:01:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:01:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:01:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:17 UTC 2023 selfserv_9355 with PID 3169 started at Wed Oct 18 16:01:17 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:18 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:18 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:19 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:19 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:20 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:21 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:21 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:22 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:22 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:23 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:24 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:24 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:25 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:26 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:26 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:27 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:27 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:28 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:28 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:29 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:30 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:30 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:31 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:31 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:32 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:33 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:34 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:34 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:35 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:35 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:36 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:36 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:37 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:37 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:38 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:38 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:39 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:40 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3169 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3169 found at Wed Oct 18 16:01:40 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3169 at Wed Oct 18 16:01:40 UTC 2023 kill -USR1 3169 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3169 killed at Wed Oct 18 16:01:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:01:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:01:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:41 UTC 2023 selfserv_9355 with PID 4438 started at Wed Oct 18 16:01:41 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:41 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:42 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:43 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:43 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:44 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:44 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:45 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:46 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:46 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:47 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:47 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:48 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:49 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:50 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:51 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:51 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:52 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:52 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:53 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:53 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:54 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:55 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:55 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:56 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:56 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:57 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:58 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:58 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:59 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:01:59 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:00 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:01 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:01 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:02 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:02 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:03 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:03 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:04 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:05 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4438 found at Wed Oct 18 16:02:05 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4438 at Wed Oct 18 16:02:05 UTC 2023 kill -USR1 4438 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4438 killed at Wed Oct 18 16:02:05 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:02:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:06 UTC 2023 selfserv_9355 with PID 5696 started at Wed Oct 18 16:02:06 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:06 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:07 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:08 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:08 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:09 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:09 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:10 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:10 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:11 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:12 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:12 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:13 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:13 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:14 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:15 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:16 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:16 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:17 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:17 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:18 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:18 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:19 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:19 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:20 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:21 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:21 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:22 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:23 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:23 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:24 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:25 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:25 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:26 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:26 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:27 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:27 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:28 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:28 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5696 found at Wed Oct 18 16:02:29 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5696 at Wed Oct 18 16:02:29 UTC 2023 kill -USR1 5696 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5696 killed at Wed Oct 18 16:02:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:02:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:02:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6966 found at Wed Oct 18 16:02:29 UTC 2023 selfserv_9355 with PID 6966 started at Wed Oct 18 16:02:29 UTC 2023 trying to kill selfserv_9355 with PID 6966 at Wed Oct 18 16:02:30 UTC 2023 kill -USR1 6966 ./ssl.sh: line 228: 6966 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6966 killed at Wed Oct 18 16:02:30 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:02:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:02:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 7011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7011 found at Wed Oct 18 16:02:30 UTC 2023 selfserv_9355 with PID 7011 started at Wed Oct 18 16:02:30 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 7011 at Wed Oct 18 16:02:44 UTC 2023 kill -USR1 7011 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7011 killed at Wed Oct 18 16:02:44 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:02:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:02:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 7560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7560 found at Wed Oct 18 16:02:44 UTC 2023 selfserv_9355 with PID 7560 started at Wed Oct 18 16:02:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7560 at Wed Oct 18 16:03:08 UTC 2023 kill -USR1 7560 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7560 killed at Wed Oct 18 16:03:08 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:03:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8358 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8358 found at Wed Oct 18 16:03:08 UTC 2023 selfserv_9355 with PID 8358 started at Wed Oct 18 16:03:08 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8358 at Wed Oct 18 16:03:09 UTC 2023 kill -USR1 8358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8358 killed at Wed Oct 18 16:03:09 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8424 found at Wed Oct 18 16:03:09 UTC 2023 selfserv_9355 with PID 8424 started at Wed Oct 18 16:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8424 at Wed Oct 18 16:03:10 UTC 2023 kill -USR1 8424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8424 killed at Wed Oct 18 16:03:10 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8476 found at Wed Oct 18 16:03:11 UTC 2023 selfserv_9355 with PID 8476 started at Wed Oct 18 16:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8476 at Wed Oct 18 16:03:11 UTC 2023 kill -USR1 8476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8476 killed at Wed Oct 18 16:03:11 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8528 found at Wed Oct 18 16:03:12 UTC 2023 selfserv_9355 with PID 8528 started at Wed Oct 18 16:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8528 at Wed Oct 18 16:03:13 UTC 2023 kill -USR1 8528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8528 killed at Wed Oct 18 16:03:13 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8580 found at Wed Oct 18 16:03:13 UTC 2023 selfserv_9355 with PID 8580 started at Wed Oct 18 16:03:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8580 at Wed Oct 18 16:03:14 UTC 2023 kill -USR1 8580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8580 killed at Wed Oct 18 16:03:14 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8632 found at Wed Oct 18 16:03:14 UTC 2023 selfserv_9355 with PID 8632 started at Wed Oct 18 16:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8632 at Wed Oct 18 16:03:15 UTC 2023 kill -USR1 8632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8632 killed at Wed Oct 18 16:03:15 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8684 found at Wed Oct 18 16:03:15 UTC 2023 selfserv_9355 with PID 8684 started at Wed Oct 18 16:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8684 at Wed Oct 18 16:03:16 UTC 2023 kill -USR1 8684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8684 killed at Wed Oct 18 16:03:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8736 found at Wed Oct 18 16:03:17 UTC 2023 selfserv_9355 with PID 8736 started at Wed Oct 18 16:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8736 at Wed Oct 18 16:03:17 UTC 2023 kill -USR1 8736 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8736 killed at Wed Oct 18 16:03:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8788 found at Wed Oct 18 16:03:18 UTC 2023 selfserv_9355 with PID 8788 started at Wed Oct 18 16:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8788 at Wed Oct 18 16:03:18 UTC 2023 kill -USR1 8788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8788 killed at Wed Oct 18 16:03:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8845 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8845 found at Wed Oct 18 16:03:19 UTC 2023 selfserv_9355 with PID 8845 started at Wed Oct 18 16:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8845 at Wed Oct 18 16:03:19 UTC 2023 kill -USR1 8845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8845 killed at Wed Oct 18 16:03:19 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8897 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8897 found at Wed Oct 18 16:03:20 UTC 2023 selfserv_9355 with PID 8897 started at Wed Oct 18 16:03:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8897 at Wed Oct 18 16:03:21 UTC 2023 kill -USR1 8897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8897 killed at Wed Oct 18 16:03:21 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8951 found at Wed Oct 18 16:03:21 UTC 2023 selfserv_9355 with PID 8951 started at Wed Oct 18 16:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8951 at Wed Oct 18 16:03:21 UTC 2023 kill -USR1 8951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8951 killed at Wed Oct 18 16:03:22 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9003 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9003 found at Wed Oct 18 16:03:22 UTC 2023 selfserv_9355 with PID 9003 started at Wed Oct 18 16:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9003 at Wed Oct 18 16:03:23 UTC 2023 kill -USR1 9003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9003 killed at Wed Oct 18 16:03:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9058 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9058 found at Wed Oct 18 16:03:23 UTC 2023 selfserv_9355 with PID 9058 started at Wed Oct 18 16:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9058 at Wed Oct 18 16:03:24 UTC 2023 kill -USR1 9058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9058 killed at Wed Oct 18 16:03:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9112 found at Wed Oct 18 16:03:24 UTC 2023 selfserv_9355 with PID 9112 started at Wed Oct 18 16:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9112 at Wed Oct 18 16:03:25 UTC 2023 kill -USR1 9112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9112 killed at Wed Oct 18 16:03:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9164 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9164 found at Wed Oct 18 16:03:26 UTC 2023 selfserv_9355 with PID 9164 started at Wed Oct 18 16:03:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9164 at Wed Oct 18 16:03:27 UTC 2023 kill -USR1 9164 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9164 killed at Wed Oct 18 16:03:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9216 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9216 found at Wed Oct 18 16:03:27 UTC 2023 selfserv_9355 with PID 9216 started at Wed Oct 18 16:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9216 at Wed Oct 18 16:03:28 UTC 2023 kill -USR1 9216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9216 killed at Wed Oct 18 16:03:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9268 found at Wed Oct 18 16:03:28 UTC 2023 selfserv_9355 with PID 9268 started at Wed Oct 18 16:03:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9268 at Wed Oct 18 16:03:29 UTC 2023 kill -USR1 9268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9268 killed at Wed Oct 18 16:03:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9320 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9320 found at Wed Oct 18 16:03:30 UTC 2023 selfserv_9355 with PID 9320 started at Wed Oct 18 16:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9320 at Wed Oct 18 16:03:30 UTC 2023 kill -USR1 9320 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9320 killed at Wed Oct 18 16:03:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9372 found at Wed Oct 18 16:03:31 UTC 2023 selfserv_9355 with PID 9372 started at Wed Oct 18 16:03:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9372 at Wed Oct 18 16:03:32 UTC 2023 kill -USR1 9372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9372 killed at Wed Oct 18 16:03:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9424 found at Wed Oct 18 16:03:32 UTC 2023 selfserv_9355 with PID 9424 started at Wed Oct 18 16:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9424 at Wed Oct 18 16:03:33 UTC 2023 kill -USR1 9424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9424 killed at Wed Oct 18 16:03:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9476 found at Wed Oct 18 16:03:34 UTC 2023 selfserv_9355 with PID 9476 started at Wed Oct 18 16:03:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9476 at Wed Oct 18 16:03:34 UTC 2023 kill -USR1 9476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9476 killed at Wed Oct 18 16:03:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9528 found at Wed Oct 18 16:03:35 UTC 2023 selfserv_9355 with PID 9528 started at Wed Oct 18 16:03:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9528 at Wed Oct 18 16:03:36 UTC 2023 kill -USR1 9528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9528 killed at Wed Oct 18 16:03:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9580 found at Wed Oct 18 16:03:36 UTC 2023 selfserv_9355 with PID 9580 started at Wed Oct 18 16:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9580 at Wed Oct 18 16:03:37 UTC 2023 kill -USR1 9580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9580 killed at Wed Oct 18 16:03:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9632 found at Wed Oct 18 16:03:38 UTC 2023 selfserv_9355 with PID 9632 started at Wed Oct 18 16:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9632 at Wed Oct 18 16:03:38 UTC 2023 kill -USR1 9632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9632 killed at Wed Oct 18 16:03:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9684 found at Wed Oct 18 16:03:39 UTC 2023 selfserv_9355 with PID 9684 started at Wed Oct 18 16:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9684 at Wed Oct 18 16:03:40 UTC 2023 kill -USR1 9684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9684 killed at Wed Oct 18 16:03:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9736 found at Wed Oct 18 16:03:40 UTC 2023 selfserv_9355 with PID 9736 started at Wed Oct 18 16:03:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9736 at Wed Oct 18 16:03:41 UTC 2023 kill -USR1 9736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9736 killed at Wed Oct 18 16:03:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9788 found at Wed Oct 18 16:03:41 UTC 2023 selfserv_9355 with PID 9788 started at Wed Oct 18 16:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9788 at Wed Oct 18 16:03:42 UTC 2023 kill -USR1 9788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9788 killed at Wed Oct 18 16:03:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9840 found at Wed Oct 18 16:03:42 UTC 2023 selfserv_9355 with PID 9840 started at Wed Oct 18 16:03:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9840 at Wed Oct 18 16:03:43 UTC 2023 kill -USR1 9840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9840 killed at Wed Oct 18 16:03:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9892 found at Wed Oct 18 16:03:44 UTC 2023 selfserv_9355 with PID 9892 started at Wed Oct 18 16:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9892 at Wed Oct 18 16:03:44 UTC 2023 kill -USR1 9892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9892 killed at Wed Oct 18 16:03:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9944 found at Wed Oct 18 16:03:45 UTC 2023 selfserv_9355 with PID 9944 started at Wed Oct 18 16:03:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9944 at Wed Oct 18 16:03:45 UTC 2023 kill -USR1 9944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9944 killed at Wed Oct 18 16:03:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9997 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9997 found at Wed Oct 18 16:03:46 UTC 2023 selfserv_9355 with PID 9997 started at Wed Oct 18 16:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9997 at Wed Oct 18 16:03:46 UTC 2023 kill -USR1 9997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9997 killed at Wed Oct 18 16:03:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10049 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10049 found at Wed Oct 18 16:03:47 UTC 2023 selfserv_9355 with PID 10049 started at Wed Oct 18 16:03:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10049 at Wed Oct 18 16:03:47 UTC 2023 kill -USR1 10049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10049 killed at Wed Oct 18 16:03:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10101 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10101 found at Wed Oct 18 16:03:48 UTC 2023 selfserv_9355 with PID 10101 started at Wed Oct 18 16:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10101 at Wed Oct 18 16:03:48 UTC 2023 kill -USR1 10101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10101 killed at Wed Oct 18 16:03:48 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10153 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10153 found at Wed Oct 18 16:03:49 UTC 2023 selfserv_9355 with PID 10153 started at Wed Oct 18 16:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10153 at Wed Oct 18 16:03:50 UTC 2023 kill -USR1 10153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10153 killed at Wed Oct 18 16:03:50 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10205 found at Wed Oct 18 16:03:50 UTC 2023 selfserv_9355 with PID 10205 started at Wed Oct 18 16:03:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10205 at Wed Oct 18 16:03:51 UTC 2023 kill -USR1 10205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10205 killed at Wed Oct 18 16:03:51 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10257 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10257 found at Wed Oct 18 16:03:51 UTC 2023 selfserv_9355 with PID 10257 started at Wed Oct 18 16:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10257 at Wed Oct 18 16:03:52 UTC 2023 kill -USR1 10257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10257 killed at Wed Oct 18 16:03:52 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10309 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10309 found at Wed Oct 18 16:03:52 UTC 2023 selfserv_9355 with PID 10309 started at Wed Oct 18 16:03:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10309 at Wed Oct 18 16:03:53 UTC 2023 kill -USR1 10309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10309 killed at Wed Oct 18 16:03:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10361 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10361 found at Wed Oct 18 16:03:53 UTC 2023 selfserv_9355 with PID 10361 started at Wed Oct 18 16:03:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10361 at Wed Oct 18 16:03:54 UTC 2023 kill -USR1 10361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10361 killed at Wed Oct 18 16:03:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10413 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10413 found at Wed Oct 18 16:03:55 UTC 2023 selfserv_9355 with PID 10413 started at Wed Oct 18 16:03:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10413 at Wed Oct 18 16:03:55 UTC 2023 kill -USR1 10413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10413 killed at Wed Oct 18 16:03:55 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10465 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10465 found at Wed Oct 18 16:03:55 UTC 2023 selfserv_9355 with PID 10465 started at Wed Oct 18 16:03:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10465 at Wed Oct 18 16:03:56 UTC 2023 kill -USR1 10465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10465 killed at Wed Oct 18 16:03:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10517 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10517 found at Wed Oct 18 16:03:57 UTC 2023 selfserv_9355 with PID 10517 started at Wed Oct 18 16:03:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10517 at Wed Oct 18 16:03:57 UTC 2023 kill -USR1 10517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10517 killed at Wed Oct 18 16:03:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10569 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10569 found at Wed Oct 18 16:03:58 UTC 2023 selfserv_9355 with PID 10569 started at Wed Oct 18 16:03:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10569 at Wed Oct 18 16:03:58 UTC 2023 kill -USR1 10569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10569 killed at Wed Oct 18 16:03:58 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:03:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10621 found at Wed Oct 18 16:03:59 UTC 2023 selfserv_9355 with PID 10621 started at Wed Oct 18 16:03:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10621 at Wed Oct 18 16:03:59 UTC 2023 kill -USR1 10621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10621 killed at Wed Oct 18 16:03:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:03:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:03:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10673 found at Wed Oct 18 16:04:00 UTC 2023 selfserv_9355 with PID 10673 started at Wed Oct 18 16:04:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10673 at Wed Oct 18 16:04:00 UTC 2023 kill -USR1 10673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10673 killed at Wed Oct 18 16:04:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10725 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10725 found at Wed Oct 18 16:04:01 UTC 2023 selfserv_9355 with PID 10725 started at Wed Oct 18 16:04:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10725 at Wed Oct 18 16:04:01 UTC 2023 kill -USR1 10725 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10725 killed at Wed Oct 18 16:04:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10777 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10777 found at Wed Oct 18 16:04:02 UTC 2023 selfserv_9355 with PID 10777 started at Wed Oct 18 16:04:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10777 at Wed Oct 18 16:04:03 UTC 2023 kill -USR1 10777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10777 killed at Wed Oct 18 16:04:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10829 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10829 found at Wed Oct 18 16:04:03 UTC 2023 selfserv_9355 with PID 10829 started at Wed Oct 18 16:04:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10829 at Wed Oct 18 16:04:04 UTC 2023 kill -USR1 10829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10829 killed at Wed Oct 18 16:04:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10881 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10881 found at Wed Oct 18 16:04:04 UTC 2023 selfserv_9355 with PID 10881 started at Wed Oct 18 16:04:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10881 at Wed Oct 18 16:04:05 UTC 2023 kill -USR1 10881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10881 killed at Wed Oct 18 16:04:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10933 found at Wed Oct 18 16:04:05 UTC 2023 selfserv_9355 with PID 10933 started at Wed Oct 18 16:04:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10933 at Wed Oct 18 16:04:06 UTC 2023 kill -USR1 10933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10933 killed at Wed Oct 18 16:04:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10985 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10985 found at Wed Oct 18 16:04:07 UTC 2023 selfserv_9355 with PID 10985 started at Wed Oct 18 16:04:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10985 at Wed Oct 18 16:04:07 UTC 2023 kill -USR1 10985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10985 killed at Wed Oct 18 16:04:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11037 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11037 found at Wed Oct 18 16:04:08 UTC 2023 selfserv_9355 with PID 11037 started at Wed Oct 18 16:04:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11037 at Wed Oct 18 16:04:08 UTC 2023 kill -USR1 11037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11037 killed at Wed Oct 18 16:04:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11089 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11089 found at Wed Oct 18 16:04:09 UTC 2023 selfserv_9355 with PID 11089 started at Wed Oct 18 16:04:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11089 at Wed Oct 18 16:04:10 UTC 2023 kill -USR1 11089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11089 killed at Wed Oct 18 16:04:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11141 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11141 found at Wed Oct 18 16:04:10 UTC 2023 selfserv_9355 with PID 11141 started at Wed Oct 18 16:04:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11141 at Wed Oct 18 16:04:11 UTC 2023 kill -USR1 11141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11141 killed at Wed Oct 18 16:04:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11193 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11193 found at Wed Oct 18 16:04:11 UTC 2023 selfserv_9355 with PID 11193 started at Wed Oct 18 16:04:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11193 at Wed Oct 18 16:04:12 UTC 2023 kill -USR1 11193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11193 killed at Wed Oct 18 16:04:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:04:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11245 found at Wed Oct 18 16:04:12 UTC 2023 selfserv_9355 with PID 11245 started at Wed Oct 18 16:04:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11245 at Wed Oct 18 16:04:13 UTC 2023 kill -USR1 11245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11245 killed at Wed Oct 18 16:04:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11297 found at Wed Oct 18 16:04:13 UTC 2023 selfserv_9355 with PID 11297 started at Wed Oct 18 16:04:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11297 at Wed Oct 18 16:04:14 UTC 2023 kill -USR1 11297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11297 killed at Wed Oct 18 16:04:14 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11349 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11349 found at Wed Oct 18 16:04:15 UTC 2023 selfserv_9355 with PID 11349 started at Wed Oct 18 16:04:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11349 at Wed Oct 18 16:04:16 UTC 2023 kill -USR1 11349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11349 killed at Wed Oct 18 16:04:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:04:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11401 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11401 found at Wed Oct 18 16:04:16 UTC 2023 selfserv_9355 with PID 11401 started at Wed Oct 18 16:04:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11401 at Wed Oct 18 16:04:17 UTC 2023 kill -USR1 11401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11401 killed at Wed Oct 18 16:04:17 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:04:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11459 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11459 found at Wed Oct 18 16:04:17 UTC 2023 selfserv_9355 with PID 11459 started at Wed Oct 18 16:04:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11459 at Wed Oct 18 16:04:18 UTC 2023 kill -USR1 11459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11459 killed at Wed Oct 18 16:04:18 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:04:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11522 found at Wed Oct 18 16:04:18 UTC 2023 selfserv_9355 with PID 11522 started at Wed Oct 18 16:04:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11522 at Wed Oct 18 16:04:19 UTC 2023 kill -USR1 11522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11522 killed at Wed Oct 18 16:04:19 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:04:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11580 found at Wed Oct 18 16:04:19 UTC 2023 selfserv_9355 with PID 11580 started at Wed Oct 18 16:04:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11580 at Wed Oct 18 16:04:20 UTC 2023 kill -USR1 11580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11580 killed at Wed Oct 18 16:04:20 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:04:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11638 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11638 found at Wed Oct 18 16:04:20 UTC 2023 selfserv_9355 with PID 11638 started at Wed Oct 18 16:04:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11638 at Wed Oct 18 16:04:21 UTC 2023 kill -USR1 11638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11638 killed at Wed Oct 18 16:04:21 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 16:04:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11698 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11698 found at Wed Oct 18 16:04:21 UTC 2023 selfserv_9355 with PID 11698 started at Wed Oct 18 16:04:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11698 at Wed Oct 18 16:04:22 UTC 2023 kill -USR1 11698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11698 killed at Wed Oct 18 16:04:22 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:04:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11758 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11758 found at Wed Oct 18 16:04:22 UTC 2023 selfserv_9355 with PID 11758 started at Wed Oct 18 16:04:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11758 at Wed Oct 18 16:04:23 UTC 2023 kill -USR1 11758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11758 killed at Wed Oct 18 16:04:23 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:04:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11816 found at Wed Oct 18 16:04:23 UTC 2023 selfserv_9355 with PID 11816 started at Wed Oct 18 16:04:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11816 at Wed Oct 18 16:04:24 UTC 2023 kill -USR1 11816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11816 killed at Wed Oct 18 16:04:24 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:04:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11876 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11876 found at Wed Oct 18 16:04:24 UTC 2023 selfserv_9355 with PID 11876 started at Wed Oct 18 16:04:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11876 at Wed Oct 18 16:04:25 UTC 2023 kill -USR1 11876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11876 killed at Wed Oct 18 16:04:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:04:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11934 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11934 found at Wed Oct 18 16:04:25 UTC 2023 selfserv_9355 with PID 11934 started at Wed Oct 18 16:04:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11934 at Wed Oct 18 16:04:25 UTC 2023 kill -USR1 11934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11934 killed at Wed Oct 18 16:04:26 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:04:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11992 found at Wed Oct 18 16:04:26 UTC 2023 selfserv_9355 with PID 11992 started at Wed Oct 18 16:04:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11992 at Wed Oct 18 16:04:26 UTC 2023 kill -USR1 11992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11992 killed at Wed Oct 18 16:04:26 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 16:04:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12034 found at Wed Oct 18 16:04:27 UTC 2023 selfserv_9355 with PID 12034 started at Wed Oct 18 16:04:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12034 at Wed Oct 18 16:04:27 UTC 2023 kill -USR1 12034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12034 killed at Wed Oct 18 16:04:27 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 16:04:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12076 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12076 found at Wed Oct 18 16:04:28 UTC 2023 selfserv_9355 with PID 12076 started at Wed Oct 18 16:04:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 12076 at Wed Oct 18 16:04:28 UTC 2023 kill -USR1 12076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12076 killed at Wed Oct 18 16:04:28 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 16:04:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12118 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12118 found at Wed Oct 18 16:04:28 UTC 2023 selfserv_9355 with PID 12118 started at Wed Oct 18 16:04:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12118 at Wed Oct 18 16:04:29 UTC 2023 kill -USR1 12118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12118 killed at Wed Oct 18 16:04:29 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 16:04:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12160 found at Wed Oct 18 16:04:29 UTC 2023 selfserv_9355 with PID 12160 started at Wed Oct 18 16:04:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12160 at Wed Oct 18 16:04:30 UTC 2023 kill -USR1 12160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12160 killed at Wed Oct 18 16:04:30 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 16:04:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12202 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12202 found at Wed Oct 18 16:04:30 UTC 2023 selfserv_9355 with PID 12202 started at Wed Oct 18 16:04:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12202 at Wed Oct 18 16:04:30 UTC 2023 kill -USR1 12202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12202 killed at Wed Oct 18 16:04:31 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 16:04:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12244 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12244 found at Wed Oct 18 16:04:31 UTC 2023 selfserv_9355 with PID 12244 started at Wed Oct 18 16:04:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12244 at Wed Oct 18 16:04:31 UTC 2023 kill -USR1 12244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12244 killed at Wed Oct 18 16:04:31 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 16:04:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12286 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12286 found at Wed Oct 18 16:04:32 UTC 2023 selfserv_9355 with PID 12286 started at Wed Oct 18 16:04:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12286 at Wed Oct 18 16:04:32 UTC 2023 kill -USR1 12286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12286 killed at Wed Oct 18 16:04:32 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 16:04:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:04:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12328 found at Wed Oct 18 16:04:33 UTC 2023 selfserv_9355 with PID 12328 started at Wed Oct 18 16:04:33 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:04:33 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:05:16 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 12328 at Wed Oct 18 16:05:16 UTC 2023 kill -USR1 12328 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12328 killed at Wed Oct 18 16:05:16 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:05:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12379 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12379 found at Wed Oct 18 16:05:16 UTC 2023 selfserv_9355 with PID 12379 started at Wed Oct 18 16:05:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12379 at Wed Oct 18 16:05:17 UTC 2023 kill -USR1 12379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12379 killed at Wed Oct 18 16:05:17 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12421 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12421 found at Wed Oct 18 16:05:17 UTC 2023 selfserv_9355 with PID 12421 started at Wed Oct 18 16:05:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12421 at Wed Oct 18 16:05:17 UTC 2023 kill -USR1 12421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12421 killed at Wed Oct 18 16:05:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12460 found at Wed Oct 18 16:05:18 UTC 2023 selfserv_9355 with PID 12460 started at Wed Oct 18 16:05:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12460 at Wed Oct 18 16:05:18 UTC 2023 kill -USR1 12460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12460 killed at Wed Oct 18 16:05:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12504 found at Wed Oct 18 16:05:18 UTC 2023 selfserv_9355 with PID 12504 started at Wed Oct 18 16:05:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12504 at Wed Oct 18 16:05:19 UTC 2023 kill -USR1 12504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12504 killed at Wed Oct 18 16:05:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12543 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12543 found at Wed Oct 18 16:05:19 UTC 2023 selfserv_9355 with PID 12543 started at Wed Oct 18 16:05:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12543 at Wed Oct 18 16:05:19 UTC 2023 kill -USR1 12543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12543 killed at Wed Oct 18 16:05:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12582 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12582 found at Wed Oct 18 16:05:20 UTC 2023 selfserv_9355 with PID 12582 started at Wed Oct 18 16:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12582 at Wed Oct 18 16:05:20 UTC 2023 kill -USR1 12582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12582 killed at Wed Oct 18 16:05:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12621 found at Wed Oct 18 16:05:20 UTC 2023 selfserv_9355 with PID 12621 started at Wed Oct 18 16:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12621 at Wed Oct 18 16:05:21 UTC 2023 kill -USR1 12621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12621 killed at Wed Oct 18 16:05:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12660 found at Wed Oct 18 16:05:21 UTC 2023 selfserv_9355 with PID 12660 started at Wed Oct 18 16:05:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12660 at Wed Oct 18 16:05:21 UTC 2023 kill -USR1 12660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12660 killed at Wed Oct 18 16:05:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12701 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12701 found at Wed Oct 18 16:05:22 UTC 2023 selfserv_9355 with PID 12701 started at Wed Oct 18 16:05:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12701 at Wed Oct 18 16:05:22 UTC 2023 kill -USR1 12701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12701 killed at Wed Oct 18 16:05:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12742 found at Wed Oct 18 16:05:23 UTC 2023 selfserv_9355 with PID 12742 started at Wed Oct 18 16:05:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12742 at Wed Oct 18 16:05:23 UTC 2023 kill -USR1 12742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12742 killed at Wed Oct 18 16:05:23 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12781 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12781 found at Wed Oct 18 16:05:23 UTC 2023 selfserv_9355 with PID 12781 started at Wed Oct 18 16:05:23 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12781 at Wed Oct 18 16:05:24 UTC 2023 kill -USR1 12781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12781 killed at Wed Oct 18 16:05:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12821 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12821 found at Wed Oct 18 16:05:24 UTC 2023 selfserv_9355 with PID 12821 started at Wed Oct 18 16:05:24 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12821 at Wed Oct 18 16:05:24 UTC 2023 kill -USR1 12821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12821 killed at Wed Oct 18 16:05:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12863 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12863 found at Wed Oct 18 16:05:25 UTC 2023 selfserv_9355 with PID 12863 started at Wed Oct 18 16:05:25 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12863 at Wed Oct 18 16:05:25 UTC 2023 kill -USR1 12863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12863 killed at Wed Oct 18 16:05:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12903 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12903 found at Wed Oct 18 16:05:25 UTC 2023 selfserv_9355 with PID 12903 started at Wed Oct 18 16:05:25 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12903 at Wed Oct 18 16:05:26 UTC 2023 kill -USR1 12903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12903 killed at Wed Oct 18 16:05:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12943 found at Wed Oct 18 16:05:26 UTC 2023 selfserv_9355 with PID 12943 started at Wed Oct 18 16:05:26 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12943 at Wed Oct 18 16:05:26 UTC 2023 kill -USR1 12943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12943 killed at Wed Oct 18 16:05:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12983 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12983 found at Wed Oct 18 16:05:27 UTC 2023 selfserv_9355 with PID 12983 started at Wed Oct 18 16:05:27 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12983 at Wed Oct 18 16:05:27 UTC 2023 kill -USR1 12983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12983 killed at Wed Oct 18 16:05:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13023 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13023 found at Wed Oct 18 16:05:28 UTC 2023 selfserv_9355 with PID 13023 started at Wed Oct 18 16:05:28 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13023 at Wed Oct 18 16:05:28 UTC 2023 kill -USR1 13023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13023 killed at Wed Oct 18 16:05:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13063 found at Wed Oct 18 16:05:28 UTC 2023 selfserv_9355 with PID 13063 started at Wed Oct 18 16:05:28 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13063 at Wed Oct 18 16:05:29 UTC 2023 kill -USR1 13063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13063 killed at Wed Oct 18 16:05:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:05:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13103 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13103 found at Wed Oct 18 16:05:29 UTC 2023 selfserv_9355 with PID 13103 started at Wed Oct 18 16:05:29 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13103 at Wed Oct 18 16:05:29 UTC 2023 kill -USR1 13103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13103 killed at Wed Oct 18 16:05:29 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:05:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 13143 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13143 found at Wed Oct 18 16:05:30 UTC 2023 selfserv_9355 with PID 13143 started at Wed Oct 18 16:05:30 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 13143 at Wed Oct 18 16:05:44 UTC 2023 kill -USR1 13143 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13143 killed at Wed Oct 18 16:05:44 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:05:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:05:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 13692 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13692 found at Wed Oct 18 16:05:45 UTC 2023 selfserv_9355 with PID 13692 started at Wed Oct 18 16:05:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13692 at Wed Oct 18 16:06:07 UTC 2023 kill -USR1 13692 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13692 killed at Wed Oct 18 16:06:07 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14502 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14502 found at Wed Oct 18 16:06:07 UTC 2023 selfserv_9355 with PID 14502 started at Wed Oct 18 16:06:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14502 at Wed Oct 18 16:06:08 UTC 2023 kill -USR1 14502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14502 killed at Wed Oct 18 16:06:09 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14554 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14554 found at Wed Oct 18 16:06:09 UTC 2023 selfserv_9355 with PID 14554 started at Wed Oct 18 16:06:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14554 at Wed Oct 18 16:06:10 UTC 2023 kill -USR1 14554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14554 killed at Wed Oct 18 16:06:10 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14606 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14606 found at Wed Oct 18 16:06:11 UTC 2023 selfserv_9355 with PID 14606 started at Wed Oct 18 16:06:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14606 at Wed Oct 18 16:06:12 UTC 2023 kill -USR1 14606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14606 killed at Wed Oct 18 16:06:12 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14658 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14658 found at Wed Oct 18 16:06:13 UTC 2023 selfserv_9355 with PID 14658 started at Wed Oct 18 16:06:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14658 at Wed Oct 18 16:06:14 UTC 2023 kill -USR1 14658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14658 killed at Wed Oct 18 16:06:14 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14710 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14710 found at Wed Oct 18 16:06:14 UTC 2023 selfserv_9355 with PID 14710 started at Wed Oct 18 16:06:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14710 at Wed Oct 18 16:06:16 UTC 2023 kill -USR1 14710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14710 killed at Wed Oct 18 16:06:16 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14762 found at Wed Oct 18 16:06:16 UTC 2023 selfserv_9355 with PID 14762 started at Wed Oct 18 16:06:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14762 at Wed Oct 18 16:06:18 UTC 2023 kill -USR1 14762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14762 killed at Wed Oct 18 16:06:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14814 found at Wed Oct 18 16:06:18 UTC 2023 selfserv_9355 with PID 14814 started at Wed Oct 18 16:06:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14814 at Wed Oct 18 16:06:20 UTC 2023 kill -USR1 14814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14814 killed at Wed Oct 18 16:06:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14871 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14871 found at Wed Oct 18 16:06:20 UTC 2023 selfserv_9355 with PID 14871 started at Wed Oct 18 16:06:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14871 at Wed Oct 18 16:06:21 UTC 2023 kill -USR1 14871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14871 killed at Wed Oct 18 16:06:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14925 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14925 found at Wed Oct 18 16:06:22 UTC 2023 selfserv_9355 with PID 14925 started at Wed Oct 18 16:06:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14925 at Wed Oct 18 16:06:24 UTC 2023 kill -USR1 14925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14925 killed at Wed Oct 18 16:06:24 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14979 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14979 found at Wed Oct 18 16:06:24 UTC 2023 selfserv_9355 with PID 14979 started at Wed Oct 18 16:06:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14979 at Wed Oct 18 16:06:25 UTC 2023 kill -USR1 14979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14979 killed at Wed Oct 18 16:06:25 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15033 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15033 found at Wed Oct 18 16:06:26 UTC 2023 selfserv_9355 with PID 15033 started at Wed Oct 18 16:06:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15033 at Wed Oct 18 16:06:27 UTC 2023 kill -USR1 15033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15033 killed at Wed Oct 18 16:06:27 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15085 found at Wed Oct 18 16:06:28 UTC 2023 selfserv_9355 with PID 15085 started at Wed Oct 18 16:06:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15085 at Wed Oct 18 16:06:29 UTC 2023 kill -USR1 15085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15085 killed at Wed Oct 18 16:06:29 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15137 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15137 found at Wed Oct 18 16:06:30 UTC 2023 selfserv_9355 with PID 15137 started at Wed Oct 18 16:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15137 at Wed Oct 18 16:06:31 UTC 2023 kill -USR1 15137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15137 killed at Wed Oct 18 16:06:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15189 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15189 found at Wed Oct 18 16:06:32 UTC 2023 selfserv_9355 with PID 15189 started at Wed Oct 18 16:06:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15189 at Wed Oct 18 16:06:33 UTC 2023 kill -USR1 15189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15189 killed at Wed Oct 18 16:06:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15241 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15241 found at Wed Oct 18 16:06:33 UTC 2023 selfserv_9355 with PID 15241 started at Wed Oct 18 16:06:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15241 at Wed Oct 18 16:06:35 UTC 2023 kill -USR1 15241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15241 killed at Wed Oct 18 16:06:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15293 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15293 found at Wed Oct 18 16:06:35 UTC 2023 selfserv_9355 with PID 15293 started at Wed Oct 18 16:06:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15293 at Wed Oct 18 16:06:37 UTC 2023 kill -USR1 15293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15293 killed at Wed Oct 18 16:06:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15345 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15345 found at Wed Oct 18 16:06:37 UTC 2023 selfserv_9355 with PID 15345 started at Wed Oct 18 16:06:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15345 at Wed Oct 18 16:06:39 UTC 2023 kill -USR1 15345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15345 killed at Wed Oct 18 16:06:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15397 found at Wed Oct 18 16:06:39 UTC 2023 selfserv_9355 with PID 15397 started at Wed Oct 18 16:06:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15397 at Wed Oct 18 16:06:41 UTC 2023 kill -USR1 15397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15397 killed at Wed Oct 18 16:06:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15449 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15449 found at Wed Oct 18 16:06:41 UTC 2023 selfserv_9355 with PID 15449 started at Wed Oct 18 16:06:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15449 at Wed Oct 18 16:06:43 UTC 2023 kill -USR1 15449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15449 killed at Wed Oct 18 16:06:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15501 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15501 found at Wed Oct 18 16:06:43 UTC 2023 selfserv_9355 with PID 15501 started at Wed Oct 18 16:06:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15501 at Wed Oct 18 16:06:44 UTC 2023 kill -USR1 15501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15501 killed at Wed Oct 18 16:06:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15553 found at Wed Oct 18 16:06:45 UTC 2023 selfserv_9355 with PID 15553 started at Wed Oct 18 16:06:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15553 at Wed Oct 18 16:06:47 UTC 2023 kill -USR1 15553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15553 killed at Wed Oct 18 16:06:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15605 found at Wed Oct 18 16:06:47 UTC 2023 selfserv_9355 with PID 15605 started at Wed Oct 18 16:06:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15605 at Wed Oct 18 16:06:49 UTC 2023 kill -USR1 15605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15605 killed at Wed Oct 18 16:06:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15657 found at Wed Oct 18 16:06:49 UTC 2023 selfserv_9355 with PID 15657 started at Wed Oct 18 16:06:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15657 at Wed Oct 18 16:06:50 UTC 2023 kill -USR1 15657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15657 killed at Wed Oct 18 16:06:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15709 found at Wed Oct 18 16:06:51 UTC 2023 selfserv_9355 with PID 15709 started at Wed Oct 18 16:06:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15709 at Wed Oct 18 16:06:53 UTC 2023 kill -USR1 15709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15709 killed at Wed Oct 18 16:06:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15761 found at Wed Oct 18 16:06:53 UTC 2023 selfserv_9355 with PID 15761 started at Wed Oct 18 16:06:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15761 at Wed Oct 18 16:06:54 UTC 2023 kill -USR1 15761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15761 killed at Wed Oct 18 16:06:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:06:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15813 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15813 found at Wed Oct 18 16:06:55 UTC 2023 selfserv_9355 with PID 15813 started at Wed Oct 18 16:06:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15813 at Wed Oct 18 16:06:56 UTC 2023 kill -USR1 15813 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15813 killed at Wed Oct 18 16:06:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15865 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15865 found at Wed Oct 18 16:06:57 UTC 2023 selfserv_9355 with PID 15865 started at Wed Oct 18 16:06:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15865 at Wed Oct 18 16:06:58 UTC 2023 kill -USR1 15865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15865 killed at Wed Oct 18 16:06:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:06:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:06:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15917 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15917 found at Wed Oct 18 16:06:59 UTC 2023 selfserv_9355 with PID 15917 started at Wed Oct 18 16:06:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15917 at Wed Oct 18 16:07:00 UTC 2023 kill -USR1 15917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15917 killed at Wed Oct 18 16:07:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15969 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15969 found at Wed Oct 18 16:07:01 UTC 2023 selfserv_9355 with PID 15969 started at Wed Oct 18 16:07:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15969 at Wed Oct 18 16:07:02 UTC 2023 kill -USR1 15969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15969 killed at Wed Oct 18 16:07:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16021 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16021 found at Wed Oct 18 16:07:03 UTC 2023 selfserv_9355 with PID 16021 started at Wed Oct 18 16:07:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16021 at Wed Oct 18 16:07:04 UTC 2023 kill -USR1 16021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16021 killed at Wed Oct 18 16:07:04 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16073 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16073 found at Wed Oct 18 16:07:05 UTC 2023 selfserv_9355 with PID 16073 started at Wed Oct 18 16:07:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16073 at Wed Oct 18 16:07:06 UTC 2023 kill -USR1 16073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16073 killed at Wed Oct 18 16:07:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16125 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16125 found at Wed Oct 18 16:07:07 UTC 2023 selfserv_9355 with PID 16125 started at Wed Oct 18 16:07:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16125 at Wed Oct 18 16:07:09 UTC 2023 kill -USR1 16125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16125 killed at Wed Oct 18 16:07:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16177 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16177 found at Wed Oct 18 16:07:09 UTC 2023 selfserv_9355 with PID 16177 started at Wed Oct 18 16:07:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16177 at Wed Oct 18 16:07:10 UTC 2023 kill -USR1 16177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16177 killed at Wed Oct 18 16:07:10 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16229 found at Wed Oct 18 16:07:11 UTC 2023 selfserv_9355 with PID 16229 started at Wed Oct 18 16:07:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16229 at Wed Oct 18 16:07:12 UTC 2023 kill -USR1 16229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16229 killed at Wed Oct 18 16:07:12 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16281 found at Wed Oct 18 16:07:13 UTC 2023 selfserv_9355 with PID 16281 started at Wed Oct 18 16:07:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16281 at Wed Oct 18 16:07:14 UTC 2023 kill -USR1 16281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16281 killed at Wed Oct 18 16:07:14 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16333 found at Wed Oct 18 16:07:15 UTC 2023 selfserv_9355 with PID 16333 started at Wed Oct 18 16:07:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16333 at Wed Oct 18 16:07:16 UTC 2023 kill -USR1 16333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16333 killed at Wed Oct 18 16:07:16 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16385 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16385 found at Wed Oct 18 16:07:17 UTC 2023 selfserv_9355 with PID 16385 started at Wed Oct 18 16:07:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16385 at Wed Oct 18 16:07:18 UTC 2023 kill -USR1 16385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16385 killed at Wed Oct 18 16:07:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16442 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16442 found at Wed Oct 18 16:07:19 UTC 2023 selfserv_9355 with PID 16442 started at Wed Oct 18 16:07:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16442 at Wed Oct 18 16:07:20 UTC 2023 kill -USR1 16442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16442 killed at Wed Oct 18 16:07:20 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16494 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16494 found at Wed Oct 18 16:07:21 UTC 2023 selfserv_9355 with PID 16494 started at Wed Oct 18 16:07:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16494 at Wed Oct 18 16:07:22 UTC 2023 kill -USR1 16494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16494 killed at Wed Oct 18 16:07:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16548 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16548 found at Wed Oct 18 16:07:22 UTC 2023 selfserv_9355 with PID 16548 started at Wed Oct 18 16:07:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16548 at Wed Oct 18 16:07:24 UTC 2023 kill -USR1 16548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16548 killed at Wed Oct 18 16:07:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16602 found at Wed Oct 18 16:07:24 UTC 2023 selfserv_9355 with PID 16602 started at Wed Oct 18 16:07:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16602 at Wed Oct 18 16:07:26 UTC 2023 kill -USR1 16602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16602 killed at Wed Oct 18 16:07:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16656 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16656 found at Wed Oct 18 16:07:26 UTC 2023 selfserv_9355 with PID 16656 started at Wed Oct 18 16:07:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16656 at Wed Oct 18 16:07:28 UTC 2023 kill -USR1 16656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16656 killed at Wed Oct 18 16:07:28 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16709 found at Wed Oct 18 16:07:28 UTC 2023 selfserv_9355 with PID 16709 started at Wed Oct 18 16:07:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16709 at Wed Oct 18 16:07:29 UTC 2023 kill -USR1 16709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16709 killed at Wed Oct 18 16:07:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16761 found at Wed Oct 18 16:07:30 UTC 2023 selfserv_9355 with PID 16761 started at Wed Oct 18 16:07:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16761 at Wed Oct 18 16:07:32 UTC 2023 kill -USR1 16761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16761 killed at Wed Oct 18 16:07:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16813 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16813 found at Wed Oct 18 16:07:32 UTC 2023 selfserv_9355 with PID 16813 started at Wed Oct 18 16:07:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16813 at Wed Oct 18 16:07:33 UTC 2023 kill -USR1 16813 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16813 killed at Wed Oct 18 16:07:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16865 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16865 found at Wed Oct 18 16:07:34 UTC 2023 selfserv_9355 with PID 16865 started at Wed Oct 18 16:07:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16865 at Wed Oct 18 16:07:35 UTC 2023 kill -USR1 16865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16865 killed at Wed Oct 18 16:07:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16917 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16917 found at Wed Oct 18 16:07:36 UTC 2023 selfserv_9355 with PID 16917 started at Wed Oct 18 16:07:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16917 at Wed Oct 18 16:07:37 UTC 2023 kill -USR1 16917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16917 killed at Wed Oct 18 16:07:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16969 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16969 found at Wed Oct 18 16:07:38 UTC 2023 selfserv_9355 with PID 16969 started at Wed Oct 18 16:07:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16969 at Wed Oct 18 16:07:39 UTC 2023 kill -USR1 16969 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16969 killed at Wed Oct 18 16:07:39 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17021 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17021 found at Wed Oct 18 16:07:40 UTC 2023 selfserv_9355 with PID 17021 started at Wed Oct 18 16:07:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17021 at Wed Oct 18 16:07:41 UTC 2023 kill -USR1 17021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17021 killed at Wed Oct 18 16:07:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17073 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17073 found at Wed Oct 18 16:07:42 UTC 2023 selfserv_9355 with PID 17073 started at Wed Oct 18 16:07:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17073 at Wed Oct 18 16:07:43 UTC 2023 kill -USR1 17073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17073 killed at Wed Oct 18 16:07:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17125 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17125 found at Wed Oct 18 16:07:44 UTC 2023 selfserv_9355 with PID 17125 started at Wed Oct 18 16:07:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17125 at Wed Oct 18 16:07:45 UTC 2023 kill -USR1 17125 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17125 killed at Wed Oct 18 16:07:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17177 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17177 found at Wed Oct 18 16:07:45 UTC 2023 selfserv_9355 with PID 17177 started at Wed Oct 18 16:07:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17177 at Wed Oct 18 16:07:47 UTC 2023 kill -USR1 17177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17177 killed at Wed Oct 18 16:07:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17229 found at Wed Oct 18 16:07:48 UTC 2023 selfserv_9355 with PID 17229 started at Wed Oct 18 16:07:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17229 at Wed Oct 18 16:07:49 UTC 2023 kill -USR1 17229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17229 killed at Wed Oct 18 16:07:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17281 found at Wed Oct 18 16:07:49 UTC 2023 selfserv_9355 with PID 17281 started at Wed Oct 18 16:07:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17281 at Wed Oct 18 16:07:51 UTC 2023 kill -USR1 17281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17281 killed at Wed Oct 18 16:07:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:07:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17333 found at Wed Oct 18 16:07:52 UTC 2023 selfserv_9355 with PID 17333 started at Wed Oct 18 16:07:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17333 at Wed Oct 18 16:07:53 UTC 2023 kill -USR1 17333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17333 killed at Wed Oct 18 16:07:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17385 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17385 found at Wed Oct 18 16:07:53 UTC 2023 selfserv_9355 with PID 17385 started at Wed Oct 18 16:07:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17385 at Wed Oct 18 16:07:55 UTC 2023 kill -USR1 17385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17385 killed at Wed Oct 18 16:07:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17437 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17437 found at Wed Oct 18 16:07:56 UTC 2023 selfserv_9355 with PID 17437 started at Wed Oct 18 16:07:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17437 at Wed Oct 18 16:07:57 UTC 2023 kill -USR1 17437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17437 killed at Wed Oct 18 16:07:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:07:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:07:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17489 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17489 found at Wed Oct 18 16:07:58 UTC 2023 selfserv_9355 with PID 17489 started at Wed Oct 18 16:07:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17489 at Wed Oct 18 16:07:59 UTC 2023 kill -USR1 17489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17489 killed at Wed Oct 18 16:07:59 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:08:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17571 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17571 found at Wed Oct 18 16:08:00 UTC 2023 selfserv_9355 with PID 17571 started at Wed Oct 18 16:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17571 at Wed Oct 18 16:08:01 UTC 2023 kill -USR1 17571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17571 killed at Wed Oct 18 16:08:01 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17613 found at Wed Oct 18 16:08:01 UTC 2023 selfserv_9355 with PID 17613 started at Wed Oct 18 16:08:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17613 at Wed Oct 18 16:08:02 UTC 2023 kill -USR1 17613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17613 killed at Wed Oct 18 16:08:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17652 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17652 found at Wed Oct 18 16:08:02 UTC 2023 selfserv_9355 with PID 17652 started at Wed Oct 18 16:08:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17652 at Wed Oct 18 16:08:03 UTC 2023 kill -USR1 17652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17652 killed at Wed Oct 18 16:08:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17691 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17691 found at Wed Oct 18 16:08:03 UTC 2023 selfserv_9355 with PID 17691 started at Wed Oct 18 16:08:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17691 at Wed Oct 18 16:08:04 UTC 2023 kill -USR1 17691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17691 killed at Wed Oct 18 16:08:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17730 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17730 found at Wed Oct 18 16:08:04 UTC 2023 selfserv_9355 with PID 17730 started at Wed Oct 18 16:08:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 17730 at Wed Oct 18 16:08:05 UTC 2023 kill -USR1 17730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17730 killed at Wed Oct 18 16:08:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17769 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17769 found at Wed Oct 18 16:08:05 UTC 2023 selfserv_9355 with PID 17769 started at Wed Oct 18 16:08:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17769 at Wed Oct 18 16:08:06 UTC 2023 kill -USR1 17769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17769 killed at Wed Oct 18 16:08:06 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17808 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17808 found at Wed Oct 18 16:08:06 UTC 2023 selfserv_9355 with PID 17808 started at Wed Oct 18 16:08:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17808 at Wed Oct 18 16:08:07 UTC 2023 kill -USR1 17808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17808 killed at Wed Oct 18 16:08:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17847 found at Wed Oct 18 16:08:07 UTC 2023 selfserv_9355 with PID 17847 started at Wed Oct 18 16:08:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17847 at Wed Oct 18 16:08:08 UTC 2023 kill -USR1 17847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17847 killed at Wed Oct 18 16:08:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17886 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17886 found at Wed Oct 18 16:08:08 UTC 2023 selfserv_9355 with PID 17886 started at Wed Oct 18 16:08:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17886 at Wed Oct 18 16:08:09 UTC 2023 kill -USR1 17886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17886 killed at Wed Oct 18 16:08:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17925 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17925 found at Wed Oct 18 16:08:09 UTC 2023 selfserv_9355 with PID 17925 started at Wed Oct 18 16:08:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17925 at Wed Oct 18 16:08:10 UTC 2023 kill -USR1 17925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17925 killed at Wed Oct 18 16:08:10 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17964 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17964 found at Wed Oct 18 16:08:10 UTC 2023 selfserv_9355 with PID 17964 started at Wed Oct 18 16:08:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17964 at Wed Oct 18 16:08:11 UTC 2023 kill -USR1 17964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17964 killed at Wed Oct 18 16:08:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18004 found at Wed Oct 18 16:08:11 UTC 2023 selfserv_9355 with PID 18004 started at Wed Oct 18 16:08:11 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18004 at Wed Oct 18 16:08:12 UTC 2023 kill -USR1 18004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18004 killed at Wed Oct 18 16:08:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18044 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18044 found at Wed Oct 18 16:08:12 UTC 2023 selfserv_9355 with PID 18044 started at Wed Oct 18 16:08:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18044 at Wed Oct 18 16:08:13 UTC 2023 kill -USR1 18044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18044 killed at Wed Oct 18 16:08:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18084 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18084 found at Wed Oct 18 16:08:13 UTC 2023 selfserv_9355 with PID 18084 started at Wed Oct 18 16:08:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18084 at Wed Oct 18 16:08:13 UTC 2023 kill -USR1 18084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18084 killed at Wed Oct 18 16:08:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18124 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18124 found at Wed Oct 18 16:08:14 UTC 2023 selfserv_9355 with PID 18124 started at Wed Oct 18 16:08:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18124 at Wed Oct 18 16:08:14 UTC 2023 kill -USR1 18124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18124 killed at Wed Oct 18 16:08:15 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18164 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18164 found at Wed Oct 18 16:08:15 UTC 2023 selfserv_9355 with PID 18164 started at Wed Oct 18 16:08:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18164 at Wed Oct 18 16:08:15 UTC 2023 kill -USR1 18164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18164 killed at Wed Oct 18 16:08:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18204 found at Wed Oct 18 16:08:16 UTC 2023 selfserv_9355 with PID 18204 started at Wed Oct 18 16:08:16 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18204 at Wed Oct 18 16:08:16 UTC 2023 kill -USR1 18204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18204 killed at Wed Oct 18 16:08:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18244 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18244 found at Wed Oct 18 16:08:17 UTC 2023 selfserv_9355 with PID 18244 started at Wed Oct 18 16:08:17 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18244 at Wed Oct 18 16:08:17 UTC 2023 kill -USR1 18244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18244 killed at Wed Oct 18 16:08:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:08:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18284 found at Wed Oct 18 16:08:18 UTC 2023 selfserv_9355 with PID 18284 started at Wed Oct 18 16:08:18 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18284 at Wed Oct 18 16:08:18 UTC 2023 kill -USR1 18284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18284 killed at Wed Oct 18 16:08:19 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:08:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 18373 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18373 found at Wed Oct 18 16:08:20 UTC 2023 selfserv_9355 with PID 18373 started at Wed Oct 18 16:08:20 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 18373 at Wed Oct 18 16:08:35 UTC 2023 kill -USR1 18373 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18373 killed at Wed Oct 18 16:08:35 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:08:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 18931 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18931 found at Wed Oct 18 16:08:35 UTC 2023 selfserv_9355 with PID 18931 started at Wed Oct 18 16:08:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18931 at Wed Oct 18 16:08:59 UTC 2023 kill -USR1 18931 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18931 killed at Wed Oct 18 16:08:59 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:08:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19730 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19730 found at Wed Oct 18 16:08:59 UTC 2023 selfserv_9355 with PID 19730 started at Wed Oct 18 16:08:59 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19730 at Wed Oct 18 16:09:00 UTC 2023 kill -USR1 19730 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19730 killed at Wed Oct 18 16:09:00 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19796 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19796 found at Wed Oct 18 16:09:00 UTC 2023 selfserv_9355 with PID 19796 started at Wed Oct 18 16:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19796 at Wed Oct 18 16:09:01 UTC 2023 kill -USR1 19796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19796 killed at Wed Oct 18 16:09:01 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19848 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19848 found at Wed Oct 18 16:09:02 UTC 2023 selfserv_9355 with PID 19848 started at Wed Oct 18 16:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19848 at Wed Oct 18 16:09:02 UTC 2023 kill -USR1 19848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19848 killed at Wed Oct 18 16:09:02 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19900 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19900 found at Wed Oct 18 16:09:03 UTC 2023 selfserv_9355 with PID 19900 started at Wed Oct 18 16:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19900 at Wed Oct 18 16:09:04 UTC 2023 kill -USR1 19900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19900 killed at Wed Oct 18 16:09:04 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19952 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19952 found at Wed Oct 18 16:09:04 UTC 2023 selfserv_9355 with PID 19952 started at Wed Oct 18 16:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19952 at Wed Oct 18 16:09:05 UTC 2023 kill -USR1 19952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19952 killed at Wed Oct 18 16:09:05 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20004 found at Wed Oct 18 16:09:05 UTC 2023 selfserv_9355 with PID 20004 started at Wed Oct 18 16:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20004 at Wed Oct 18 16:09:06 UTC 2023 kill -USR1 20004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20004 killed at Wed Oct 18 16:09:06 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20056 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20056 found at Wed Oct 18 16:09:06 UTC 2023 selfserv_9355 with PID 20056 started at Wed Oct 18 16:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20056 at Wed Oct 18 16:09:07 UTC 2023 kill -USR1 20056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20056 killed at Wed Oct 18 16:09:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20108 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20108 found at Wed Oct 18 16:09:08 UTC 2023 selfserv_9355 with PID 20108 started at Wed Oct 18 16:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20108 at Wed Oct 18 16:09:08 UTC 2023 kill -USR1 20108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20108 killed at Wed Oct 18 16:09:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20160 found at Wed Oct 18 16:09:09 UTC 2023 selfserv_9355 with PID 20160 started at Wed Oct 18 16:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20160 at Wed Oct 18 16:09:09 UTC 2023 kill -USR1 20160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20160 killed at Wed Oct 18 16:09:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20212 found at Wed Oct 18 16:09:10 UTC 2023 selfserv_9355 with PID 20212 started at Wed Oct 18 16:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20212 at Wed Oct 18 16:09:11 UTC 2023 kill -USR1 20212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20212 killed at Wed Oct 18 16:09:11 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20264 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20264 found at Wed Oct 18 16:09:11 UTC 2023 selfserv_9355 with PID 20264 started at Wed Oct 18 16:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20264 at Wed Oct 18 16:09:12 UTC 2023 kill -USR1 20264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20264 killed at Wed Oct 18 16:09:12 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20316 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20316 found at Wed Oct 18 16:09:12 UTC 2023 selfserv_9355 with PID 20316 started at Wed Oct 18 16:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20316 at Wed Oct 18 16:09:13 UTC 2023 kill -USR1 20316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20316 killed at Wed Oct 18 16:09:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20368 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20368 found at Wed Oct 18 16:09:13 UTC 2023 selfserv_9355 with PID 20368 started at Wed Oct 18 16:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20368 at Wed Oct 18 16:09:14 UTC 2023 kill -USR1 20368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20368 killed at Wed Oct 18 16:09:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20420 found at Wed Oct 18 16:09:14 UTC 2023 selfserv_9355 with PID 20420 started at Wed Oct 18 16:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20420 at Wed Oct 18 16:09:15 UTC 2023 kill -USR1 20420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20420 killed at Wed Oct 18 16:09:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20472 found at Wed Oct 18 16:09:16 UTC 2023 selfserv_9355 with PID 20472 started at Wed Oct 18 16:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20472 at Wed Oct 18 16:09:17 UTC 2023 kill -USR1 20472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20472 killed at Wed Oct 18 16:09:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20524 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20524 found at Wed Oct 18 16:09:17 UTC 2023 selfserv_9355 with PID 20524 started at Wed Oct 18 16:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20524 at Wed Oct 18 16:09:18 UTC 2023 kill -USR1 20524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20524 killed at Wed Oct 18 16:09:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20576 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20576 found at Wed Oct 18 16:09:18 UTC 2023 selfserv_9355 with PID 20576 started at Wed Oct 18 16:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20576 at Wed Oct 18 16:09:19 UTC 2023 kill -USR1 20576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20576 killed at Wed Oct 18 16:09:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20633 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20633 found at Wed Oct 18 16:09:20 UTC 2023 selfserv_9355 with PID 20633 started at Wed Oct 18 16:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20633 at Wed Oct 18 16:09:21 UTC 2023 kill -USR1 20633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20633 killed at Wed Oct 18 16:09:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20685 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20685 found at Wed Oct 18 16:09:21 UTC 2023 selfserv_9355 with PID 20685 started at Wed Oct 18 16:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20685 at Wed Oct 18 16:09:22 UTC 2023 kill -USR1 20685 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20685 killed at Wed Oct 18 16:09:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20739 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20739 found at Wed Oct 18 16:09:22 UTC 2023 selfserv_9355 with PID 20739 started at Wed Oct 18 16:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20739 at Wed Oct 18 16:09:23 UTC 2023 kill -USR1 20739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20739 killed at Wed Oct 18 16:09:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20793 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20793 found at Wed Oct 18 16:09:24 UTC 2023 selfserv_9355 with PID 20793 started at Wed Oct 18 16:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20793 at Wed Oct 18 16:09:25 UTC 2023 kill -USR1 20793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20793 killed at Wed Oct 18 16:09:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20847 found at Wed Oct 18 16:09:25 UTC 2023 selfserv_9355 with PID 20847 started at Wed Oct 18 16:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20847 at Wed Oct 18 16:09:26 UTC 2023 kill -USR1 20847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20847 killed at Wed Oct 18 16:09:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20899 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20899 found at Wed Oct 18 16:09:26 UTC 2023 selfserv_9355 with PID 20899 started at Wed Oct 18 16:09:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20899 at Wed Oct 18 16:09:27 UTC 2023 kill -USR1 20899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20899 killed at Wed Oct 18 16:09:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20951 found at Wed Oct 18 16:09:28 UTC 2023 selfserv_9355 with PID 20951 started at Wed Oct 18 16:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20951 at Wed Oct 18 16:09:29 UTC 2023 kill -USR1 20951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20951 killed at Wed Oct 18 16:09:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21003 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21003 found at Wed Oct 18 16:09:29 UTC 2023 selfserv_9355 with PID 21003 started at Wed Oct 18 16:09:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21003 at Wed Oct 18 16:09:30 UTC 2023 kill -USR1 21003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21003 killed at Wed Oct 18 16:09:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21055 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21055 found at Wed Oct 18 16:09:30 UTC 2023 selfserv_9355 with PID 21055 started at Wed Oct 18 16:09:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21055 at Wed Oct 18 16:09:31 UTC 2023 kill -USR1 21055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21055 killed at Wed Oct 18 16:09:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21107 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21107 found at Wed Oct 18 16:09:32 UTC 2023 selfserv_9355 with PID 21107 started at Wed Oct 18 16:09:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21107 at Wed Oct 18 16:09:33 UTC 2023 kill -USR1 21107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21107 killed at Wed Oct 18 16:09:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21159 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21159 found at Wed Oct 18 16:09:33 UTC 2023 selfserv_9355 with PID 21159 started at Wed Oct 18 16:09:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21159 at Wed Oct 18 16:09:34 UTC 2023 kill -USR1 21159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21159 killed at Wed Oct 18 16:09:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21211 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21211 found at Wed Oct 18 16:09:34 UTC 2023 selfserv_9355 with PID 21211 started at Wed Oct 18 16:09:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21211 at Wed Oct 18 16:09:35 UTC 2023 kill -USR1 21211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21211 killed at Wed Oct 18 16:09:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21263 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21263 found at Wed Oct 18 16:09:36 UTC 2023 selfserv_9355 with PID 21263 started at Wed Oct 18 16:09:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21263 at Wed Oct 18 16:09:36 UTC 2023 kill -USR1 21263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21263 killed at Wed Oct 18 16:09:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21315 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21315 found at Wed Oct 18 16:09:37 UTC 2023 selfserv_9355 with PID 21315 started at Wed Oct 18 16:09:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21315 at Wed Oct 18 16:09:37 UTC 2023 kill -USR1 21315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21315 killed at Wed Oct 18 16:09:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21367 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21367 found at Wed Oct 18 16:09:38 UTC 2023 selfserv_9355 with PID 21367 started at Wed Oct 18 16:09:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21367 at Wed Oct 18 16:09:38 UTC 2023 kill -USR1 21367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21367 killed at Wed Oct 18 16:09:39 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21419 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21419 found at Wed Oct 18 16:09:39 UTC 2023 selfserv_9355 with PID 21419 started at Wed Oct 18 16:09:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21419 at Wed Oct 18 16:09:39 UTC 2023 kill -USR1 21419 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21419 killed at Wed Oct 18 16:09:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21471 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21471 found at Wed Oct 18 16:09:40 UTC 2023 selfserv_9355 with PID 21471 started at Wed Oct 18 16:09:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21471 at Wed Oct 18 16:09:41 UTC 2023 kill -USR1 21471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21471 killed at Wed Oct 18 16:09:41 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21523 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21523 found at Wed Oct 18 16:09:41 UTC 2023 selfserv_9355 with PID 21523 started at Wed Oct 18 16:09:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21523 at Wed Oct 18 16:09:42 UTC 2023 kill -USR1 21523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21523 killed at Wed Oct 18 16:09:42 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21575 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21575 found at Wed Oct 18 16:09:42 UTC 2023 selfserv_9355 with PID 21575 started at Wed Oct 18 16:09:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21575 at Wed Oct 18 16:09:43 UTC 2023 kill -USR1 21575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21575 killed at Wed Oct 18 16:09:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21627 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21627 found at Wed Oct 18 16:09:43 UTC 2023 selfserv_9355 with PID 21627 started at Wed Oct 18 16:09:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21627 at Wed Oct 18 16:09:44 UTC 2023 kill -USR1 21627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21627 killed at Wed Oct 18 16:09:44 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21679 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21679 found at Wed Oct 18 16:09:45 UTC 2023 selfserv_9355 with PID 21679 started at Wed Oct 18 16:09:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21679 at Wed Oct 18 16:09:45 UTC 2023 kill -USR1 21679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21679 killed at Wed Oct 18 16:09:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21731 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21731 found at Wed Oct 18 16:09:46 UTC 2023 selfserv_9355 with PID 21731 started at Wed Oct 18 16:09:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21731 at Wed Oct 18 16:09:46 UTC 2023 kill -USR1 21731 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21731 killed at Wed Oct 18 16:09:46 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21783 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21783 found at Wed Oct 18 16:09:47 UTC 2023 selfserv_9355 with PID 21783 started at Wed Oct 18 16:09:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21783 at Wed Oct 18 16:09:47 UTC 2023 kill -USR1 21783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21783 killed at Wed Oct 18 16:09:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21835 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21835 found at Wed Oct 18 16:09:48 UTC 2023 selfserv_9355 with PID 21835 started at Wed Oct 18 16:09:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21835 at Wed Oct 18 16:09:48 UTC 2023 kill -USR1 21835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21835 killed at Wed Oct 18 16:09:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21887 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21887 found at Wed Oct 18 16:09:49 UTC 2023 selfserv_9355 with PID 21887 started at Wed Oct 18 16:09:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21887 at Wed Oct 18 16:09:49 UTC 2023 kill -USR1 21887 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21887 killed at Wed Oct 18 16:09:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21939 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21939 found at Wed Oct 18 16:09:50 UTC 2023 selfserv_9355 with PID 21939 started at Wed Oct 18 16:09:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21939 at Wed Oct 18 16:09:51 UTC 2023 kill -USR1 21939 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21939 killed at Wed Oct 18 16:09:51 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21991 found at Wed Oct 18 16:09:51 UTC 2023 selfserv_9355 with PID 21991 started at Wed Oct 18 16:09:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21991 at Wed Oct 18 16:09:52 UTC 2023 kill -USR1 21991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21991 killed at Wed Oct 18 16:09:52 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22043 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22043 found at Wed Oct 18 16:09:52 UTC 2023 selfserv_9355 with PID 22043 started at Wed Oct 18 16:09:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22043 at Wed Oct 18 16:09:53 UTC 2023 kill -USR1 22043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22043 killed at Wed Oct 18 16:09:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22095 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22095 found at Wed Oct 18 16:09:53 UTC 2023 selfserv_9355 with PID 22095 started at Wed Oct 18 16:09:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22095 at Wed Oct 18 16:09:54 UTC 2023 kill -USR1 22095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22095 killed at Wed Oct 18 16:09:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22147 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22147 found at Wed Oct 18 16:09:54 UTC 2023 selfserv_9355 with PID 22147 started at Wed Oct 18 16:09:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22147 at Wed Oct 18 16:09:55 UTC 2023 kill -USR1 22147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22147 killed at Wed Oct 18 16:09:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22199 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22199 found at Wed Oct 18 16:09:56 UTC 2023 selfserv_9355 with PID 22199 started at Wed Oct 18 16:09:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22199 at Wed Oct 18 16:09:56 UTC 2023 kill -USR1 22199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22199 killed at Wed Oct 18 16:09:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22251 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22251 found at Wed Oct 18 16:09:57 UTC 2023 selfserv_9355 with PID 22251 started at Wed Oct 18 16:09:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22251 at Wed Oct 18 16:09:58 UTC 2023 kill -USR1 22251 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22251 killed at Wed Oct 18 16:09:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:09:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22303 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22303 found at Wed Oct 18 16:09:58 UTC 2023 selfserv_9355 with PID 22303 started at Wed Oct 18 16:09:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22303 at Wed Oct 18 16:09:59 UTC 2023 kill -USR1 22303 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22303 killed at Wed Oct 18 16:09:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:09:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:09:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22355 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22355 found at Wed Oct 18 16:09:59 UTC 2023 selfserv_9355 with PID 22355 started at Wed Oct 18 16:09:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22355 at Wed Oct 18 16:10:00 UTC 2023 kill -USR1 22355 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22355 killed at Wed Oct 18 16:10:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:10:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22407 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22407 found at Wed Oct 18 16:10:00 UTC 2023 selfserv_9355 with PID 22407 started at Wed Oct 18 16:10:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22407 at Wed Oct 18 16:10:01 UTC 2023 kill -USR1 22407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22407 killed at Wed Oct 18 16:10:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:10:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22459 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22459 found at Wed Oct 18 16:10:02 UTC 2023 selfserv_9355 with PID 22459 started at Wed Oct 18 16:10:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22459 at Wed Oct 18 16:10:02 UTC 2023 kill -USR1 22459 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22459 killed at Wed Oct 18 16:10:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:10:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22511 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22511 found at Wed Oct 18 16:10:03 UTC 2023 selfserv_9355 with PID 22511 started at Wed Oct 18 16:10:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22511 at Wed Oct 18 16:10:04 UTC 2023 kill -USR1 22511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22511 killed at Wed Oct 18 16:10:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:10:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22563 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22563 found at Wed Oct 18 16:10:04 UTC 2023 selfserv_9355 with PID 22563 started at Wed Oct 18 16:10:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22563 at Wed Oct 18 16:10:05 UTC 2023 kill -USR1 22563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22563 killed at Wed Oct 18 16:10:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:10:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22615 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22615 found at Wed Oct 18 16:10:05 UTC 2023 selfserv_9355 with PID 22615 started at Wed Oct 18 16:10:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22615 at Wed Oct 18 16:10:06 UTC 2023 kill -USR1 22615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22615 killed at Wed Oct 18 16:10:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:10:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22667 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22667 found at Wed Oct 18 16:10:06 UTC 2023 selfserv_9355 with PID 22667 started at Wed Oct 18 16:10:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22667 at Wed Oct 18 16:10:07 UTC 2023 kill -USR1 22667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22667 killed at Wed Oct 18 16:10:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:10:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22719 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22719 found at Wed Oct 18 16:10:08 UTC 2023 selfserv_9355 with PID 22719 started at Wed Oct 18 16:10:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22719 at Wed Oct 18 16:10:09 UTC 2023 kill -USR1 22719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22719 killed at Wed Oct 18 16:10:09 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:10:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22772 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22772 found at Wed Oct 18 16:10:09 UTC 2023 selfserv_9355 with PID 22772 started at Wed Oct 18 16:10:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22772 at Wed Oct 18 16:10:10 UTC 2023 kill -USR1 22772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22772 killed at Wed Oct 18 16:10:10 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:10:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22830 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22830 found at Wed Oct 18 16:10:11 UTC 2023 selfserv_9355 with PID 22830 started at Wed Oct 18 16:10:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22830 at Wed Oct 18 16:10:11 UTC 2023 kill -USR1 22830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22830 killed at Wed Oct 18 16:10:11 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:10:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22888 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22888 found at Wed Oct 18 16:10:12 UTC 2023 selfserv_9355 with PID 22888 started at Wed Oct 18 16:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22888 at Wed Oct 18 16:10:12 UTC 2023 kill -USR1 22888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22888 killed at Wed Oct 18 16:10:12 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:10:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22946 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22946 found at Wed Oct 18 16:10:13 UTC 2023 selfserv_9355 with PID 22946 started at Wed Oct 18 16:10:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22946 at Wed Oct 18 16:10:13 UTC 2023 kill -USR1 22946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22946 killed at Wed Oct 18 16:10:13 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:10:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23004 found at Wed Oct 18 16:10:13 UTC 2023 selfserv_9355 with PID 23004 started at Wed Oct 18 16:10:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23004 at Wed Oct 18 16:10:14 UTC 2023 kill -USR1 23004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23004 killed at Wed Oct 18 16:10:14 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 16:10:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23062 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23062 found at Wed Oct 18 16:10:14 UTC 2023 selfserv_9355 with PID 23062 started at Wed Oct 18 16:10:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23062 at Wed Oct 18 16:10:15 UTC 2023 kill -USR1 23062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23062 killed at Wed Oct 18 16:10:15 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:10:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23120 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23120 found at Wed Oct 18 16:10:15 UTC 2023 selfserv_9355 with PID 23120 started at Wed Oct 18 16:10:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23120 at Wed Oct 18 16:10:16 UTC 2023 kill -USR1 23120 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23120 killed at Wed Oct 18 16:10:16 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:10:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23178 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23178 found at Wed Oct 18 16:10:16 UTC 2023 selfserv_9355 with PID 23178 started at Wed Oct 18 16:10:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23178 at Wed Oct 18 16:10:17 UTC 2023 kill -USR1 23178 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23178 killed at Wed Oct 18 16:10:17 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:10:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23236 found at Wed Oct 18 16:10:17 UTC 2023 selfserv_9355 with PID 23236 started at Wed Oct 18 16:10:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23236 at Wed Oct 18 16:10:18 UTC 2023 kill -USR1 23236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23236 killed at Wed Oct 18 16:10:18 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:10:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23294 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23294 found at Wed Oct 18 16:10:18 UTC 2023 selfserv_9355 with PID 23294 started at Wed Oct 18 16:10:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23294 at Wed Oct 18 16:10:19 UTC 2023 kill -USR1 23294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23294 killed at Wed Oct 18 16:10:19 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:10:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23357 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23357 found at Wed Oct 18 16:10:19 UTC 2023 selfserv_9355 with PID 23357 started at Wed Oct 18 16:10:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23357 at Wed Oct 18 16:10:20 UTC 2023 kill -USR1 23357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23357 killed at Wed Oct 18 16:10:20 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 16:10:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23399 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23399 found at Wed Oct 18 16:10:20 UTC 2023 selfserv_9355 with PID 23399 started at Wed Oct 18 16:10:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23399 at Wed Oct 18 16:10:20 UTC 2023 kill -USR1 23399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23399 killed at Wed Oct 18 16:10:21 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 16:10:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23441 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23441 found at Wed Oct 18 16:10:21 UTC 2023 selfserv_9355 with PID 23441 started at Wed Oct 18 16:10:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 23441 at Wed Oct 18 16:10:21 UTC 2023 kill -USR1 23441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23441 killed at Wed Oct 18 16:10:21 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 16:10:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23485 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23485 found at Wed Oct 18 16:10:22 UTC 2023 selfserv_9355 with PID 23485 started at Wed Oct 18 16:10:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 23485 at Wed Oct 18 16:10:22 UTC 2023 kill -USR1 23485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23485 killed at Wed Oct 18 16:10:22 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 16:10:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23527 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23527 found at Wed Oct 18 16:10:23 UTC 2023 selfserv_9355 with PID 23527 started at Wed Oct 18 16:10:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 23527 at Wed Oct 18 16:10:23 UTC 2023 kill -USR1 23527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23527 killed at Wed Oct 18 16:10:23 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 16:10:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23571 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23571 found at Wed Oct 18 16:10:23 UTC 2023 selfserv_9355 with PID 23571 started at Wed Oct 18 16:10:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 23571 at Wed Oct 18 16:10:24 UTC 2023 kill -USR1 23571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23571 killed at Wed Oct 18 16:10:24 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 16:10:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23613 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23613 found at Wed Oct 18 16:10:24 UTC 2023 selfserv_9355 with PID 23613 started at Wed Oct 18 16:10:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 23613 at Wed Oct 18 16:10:25 UTC 2023 kill -USR1 23613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23613 killed at Wed Oct 18 16:10:25 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 16:10:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23657 found at Wed Oct 18 16:10:25 UTC 2023 selfserv_9355 with PID 23657 started at Wed Oct 18 16:10:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 23657 at Wed Oct 18 16:10:25 UTC 2023 kill -USR1 23657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23657 killed at Wed Oct 18 16:10:26 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 16:10:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:10:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23699 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23699 found at Wed Oct 18 16:10:26 UTC 2023 selfserv_9355 with PID 23699 started at Wed Oct 18 16:10:26 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:10:26 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:11:09 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 23699 at Wed Oct 18 16:11:09 UTC 2023 kill -USR1 23699 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23699 killed at Wed Oct 18 16:11:09 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:11:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23750 found at Wed Oct 18 16:11:10 UTC 2023 selfserv_9355 with PID 23750 started at Wed Oct 18 16:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23750 at Wed Oct 18 16:11:10 UTC 2023 kill -USR1 23750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23750 killed at Wed Oct 18 16:11:10 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23792 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23792 found at Wed Oct 18 16:11:10 UTC 2023 selfserv_9355 with PID 23792 started at Wed Oct 18 16:11:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23792 at Wed Oct 18 16:11:11 UTC 2023 kill -USR1 23792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23792 killed at Wed Oct 18 16:11:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23831 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23831 found at Wed Oct 18 16:11:11 UTC 2023 selfserv_9355 with PID 23831 started at Wed Oct 18 16:11:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 23831 at Wed Oct 18 16:11:11 UTC 2023 kill -USR1 23831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23831 killed at Wed Oct 18 16:11:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23870 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23870 found at Wed Oct 18 16:11:12 UTC 2023 selfserv_9355 with PID 23870 started at Wed Oct 18 16:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23870 at Wed Oct 18 16:11:12 UTC 2023 kill -USR1 23870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23870 killed at Wed Oct 18 16:11:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23909 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23909 found at Wed Oct 18 16:11:13 UTC 2023 selfserv_9355 with PID 23909 started at Wed Oct 18 16:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 23909 at Wed Oct 18 16:11:13 UTC 2023 kill -USR1 23909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23909 killed at Wed Oct 18 16:11:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23948 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23948 found at Wed Oct 18 16:11:13 UTC 2023 selfserv_9355 with PID 23948 started at Wed Oct 18 16:11:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23948 at Wed Oct 18 16:11:14 UTC 2023 kill -USR1 23948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23948 killed at Wed Oct 18 16:11:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23987 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23987 found at Wed Oct 18 16:11:14 UTC 2023 selfserv_9355 with PID 23987 started at Wed Oct 18 16:11:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23987 at Wed Oct 18 16:11:14 UTC 2023 kill -USR1 23987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23987 killed at Wed Oct 18 16:11:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24026 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24026 found at Wed Oct 18 16:11:15 UTC 2023 selfserv_9355 with PID 24026 started at Wed Oct 18 16:11:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24026 at Wed Oct 18 16:11:15 UTC 2023 kill -USR1 24026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24026 killed at Wed Oct 18 16:11:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24065 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24065 found at Wed Oct 18 16:11:15 UTC 2023 selfserv_9355 with PID 24065 started at Wed Oct 18 16:11:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24065 at Wed Oct 18 16:11:16 UTC 2023 kill -USR1 24065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24065 killed at Wed Oct 18 16:11:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24104 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24104 found at Wed Oct 18 16:11:16 UTC 2023 selfserv_9355 with PID 24104 started at Wed Oct 18 16:11:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24104 at Wed Oct 18 16:11:16 UTC 2023 kill -USR1 24104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24104 killed at Wed Oct 18 16:11:16 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24143 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24143 found at Wed Oct 18 16:11:17 UTC 2023 selfserv_9355 with PID 24143 started at Wed Oct 18 16:11:17 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24143 at Wed Oct 18 16:11:17 UTC 2023 kill -USR1 24143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24143 killed at Wed Oct 18 16:11:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24183 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24183 found at Wed Oct 18 16:11:17 UTC 2023 selfserv_9355 with PID 24183 started at Wed Oct 18 16:11:17 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24183 at Wed Oct 18 16:11:18 UTC 2023 kill -USR1 24183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24183 killed at Wed Oct 18 16:11:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24228 found at Wed Oct 18 16:11:18 UTC 2023 selfserv_9355 with PID 24228 started at Wed Oct 18 16:11:18 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24228 at Wed Oct 18 16:11:18 UTC 2023 kill -USR1 24228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24228 killed at Wed Oct 18 16:11:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24268 found at Wed Oct 18 16:11:19 UTC 2023 selfserv_9355 with PID 24268 started at Wed Oct 18 16:11:19 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24268 at Wed Oct 18 16:11:19 UTC 2023 kill -USR1 24268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24268 killed at Wed Oct 18 16:11:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24308 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24308 found at Wed Oct 18 16:11:20 UTC 2023 selfserv_9355 with PID 24308 started at Wed Oct 18 16:11:20 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24308 at Wed Oct 18 16:11:20 UTC 2023 kill -USR1 24308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24308 killed at Wed Oct 18 16:11:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24348 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24348 found at Wed Oct 18 16:11:20 UTC 2023 selfserv_9355 with PID 24348 started at Wed Oct 18 16:11:20 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24348 at Wed Oct 18 16:11:21 UTC 2023 kill -USR1 24348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24348 killed at Wed Oct 18 16:11:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24390 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24390 found at Wed Oct 18 16:11:21 UTC 2023 selfserv_9355 with PID 24390 started at Wed Oct 18 16:11:21 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24390 at Wed Oct 18 16:11:21 UTC 2023 kill -USR1 24390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24390 killed at Wed Oct 18 16:11:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24430 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24430 found at Wed Oct 18 16:11:22 UTC 2023 selfserv_9355 with PID 24430 started at Wed Oct 18 16:11:22 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24430 at Wed Oct 18 16:11:22 UTC 2023 kill -USR1 24430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24430 killed at Wed Oct 18 16:11:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:11:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24472 found at Wed Oct 18 16:11:22 UTC 2023 selfserv_9355 with PID 24472 started at Wed Oct 18 16:11:22 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24472 at Wed Oct 18 16:11:23 UTC 2023 kill -USR1 24472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24472 killed at Wed Oct 18 16:11:23 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 16:11:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 24512 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24512 found at Wed Oct 18 16:11:23 UTC 2023 selfserv_9355 with PID 24512 started at Wed Oct 18 16:11:23 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 24512 at Wed Oct 18 16:11:38 UTC 2023 kill -USR1 24512 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24512 killed at Wed Oct 18 16:11:39 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:11:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 25063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25063 found at Wed Oct 18 16:11:39 UTC 2023 selfserv_9355 with PID 25063 started at Wed Oct 18 16:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25063 at Wed Oct 18 16:12:01 UTC 2023 kill -USR1 25063 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25063 killed at Wed Oct 18 16:12:01 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25874 found at Wed Oct 18 16:12:01 UTC 2023 selfserv_9355 with PID 25874 started at Wed Oct 18 16:12:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25874 at Wed Oct 18 16:12:03 UTC 2023 kill -USR1 25874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25874 killed at Wed Oct 18 16:12:03 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25926 found at Wed Oct 18 16:12:03 UTC 2023 selfserv_9355 with PID 25926 started at Wed Oct 18 16:12:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25926 at Wed Oct 18 16:12:04 UTC 2023 kill -USR1 25926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25926 killed at Wed Oct 18 16:12:05 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25978 found at Wed Oct 18 16:12:05 UTC 2023 selfserv_9355 with PID 25978 started at Wed Oct 18 16:12:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25978 at Wed Oct 18 16:12:07 UTC 2023 kill -USR1 25978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25978 killed at Wed Oct 18 16:12:07 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26030 found at Wed Oct 18 16:12:07 UTC 2023 selfserv_9355 with PID 26030 started at Wed Oct 18 16:12:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26030 at Wed Oct 18 16:12:08 UTC 2023 kill -USR1 26030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26030 killed at Wed Oct 18 16:12:09 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26082 found at Wed Oct 18 16:12:09 UTC 2023 selfserv_9355 with PID 26082 started at Wed Oct 18 16:12:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26082 at Wed Oct 18 16:12:10 UTC 2023 kill -USR1 26082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26082 killed at Wed Oct 18 16:12:10 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26134 found at Wed Oct 18 16:12:11 UTC 2023 selfserv_9355 with PID 26134 started at Wed Oct 18 16:12:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26134 at Wed Oct 18 16:12:12 UTC 2023 kill -USR1 26134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26134 killed at Wed Oct 18 16:12:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26186 found at Wed Oct 18 16:12:13 UTC 2023 selfserv_9355 with PID 26186 started at Wed Oct 18 16:12:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26186 at Wed Oct 18 16:12:14 UTC 2023 kill -USR1 26186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26186 killed at Wed Oct 18 16:12:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26238 found at Wed Oct 18 16:12:15 UTC 2023 selfserv_9355 with PID 26238 started at Wed Oct 18 16:12:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26238 at Wed Oct 18 16:12:16 UTC 2023 kill -USR1 26238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26238 killed at Wed Oct 18 16:12:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26291 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26291 found at Wed Oct 18 16:12:16 UTC 2023 selfserv_9355 with PID 26291 started at Wed Oct 18 16:12:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26291 at Wed Oct 18 16:12:18 UTC 2023 kill -USR1 26291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26291 killed at Wed Oct 18 16:12:18 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26348 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26348 found at Wed Oct 18 16:12:19 UTC 2023 selfserv_9355 with PID 26348 started at Wed Oct 18 16:12:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26348 at Wed Oct 18 16:12:20 UTC 2023 kill -USR1 26348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26348 killed at Wed Oct 18 16:12:20 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26400 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26400 found at Wed Oct 18 16:12:21 UTC 2023 selfserv_9355 with PID 26400 started at Wed Oct 18 16:12:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26400 at Wed Oct 18 16:12:22 UTC 2023 kill -USR1 26400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26400 killed at Wed Oct 18 16:12:22 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26456 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26456 found at Wed Oct 18 16:12:22 UTC 2023 selfserv_9355 with PID 26456 started at Wed Oct 18 16:12:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26456 at Wed Oct 18 16:12:24 UTC 2023 kill -USR1 26456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26456 killed at Wed Oct 18 16:12:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26510 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26510 found at Wed Oct 18 16:12:25 UTC 2023 selfserv_9355 with PID 26510 started at Wed Oct 18 16:12:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26510 at Wed Oct 18 16:12:26 UTC 2023 kill -USR1 26510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26510 killed at Wed Oct 18 16:12:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26562 found at Wed Oct 18 16:12:26 UTC 2023 selfserv_9355 with PID 26562 started at Wed Oct 18 16:12:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26562 at Wed Oct 18 16:12:28 UTC 2023 kill -USR1 26562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26562 killed at Wed Oct 18 16:12:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26614 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26614 found at Wed Oct 18 16:12:28 UTC 2023 selfserv_9355 with PID 26614 started at Wed Oct 18 16:12:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26614 at Wed Oct 18 16:12:30 UTC 2023 kill -USR1 26614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26614 killed at Wed Oct 18 16:12:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26666 found at Wed Oct 18 16:12:30 UTC 2023 selfserv_9355 with PID 26666 started at Wed Oct 18 16:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26666 at Wed Oct 18 16:12:32 UTC 2023 kill -USR1 26666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26666 killed at Wed Oct 18 16:12:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26718 found at Wed Oct 18 16:12:32 UTC 2023 selfserv_9355 with PID 26718 started at Wed Oct 18 16:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26718 at Wed Oct 18 16:12:34 UTC 2023 kill -USR1 26718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26718 killed at Wed Oct 18 16:12:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26770 found at Wed Oct 18 16:12:34 UTC 2023 selfserv_9355 with PID 26770 started at Wed Oct 18 16:12:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26770 at Wed Oct 18 16:12:36 UTC 2023 kill -USR1 26770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26770 killed at Wed Oct 18 16:12:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26822 found at Wed Oct 18 16:12:36 UTC 2023 selfserv_9355 with PID 26822 started at Wed Oct 18 16:12:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26822 at Wed Oct 18 16:12:38 UTC 2023 kill -USR1 26822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26822 killed at Wed Oct 18 16:12:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26874 found at Wed Oct 18 16:12:38 UTC 2023 selfserv_9355 with PID 26874 started at Wed Oct 18 16:12:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26874 at Wed Oct 18 16:12:40 UTC 2023 kill -USR1 26874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26874 killed at Wed Oct 18 16:12:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26926 found at Wed Oct 18 16:12:40 UTC 2023 selfserv_9355 with PID 26926 started at Wed Oct 18 16:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26926 at Wed Oct 18 16:12:42 UTC 2023 kill -USR1 26926 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26926 killed at Wed Oct 18 16:12:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26978 found at Wed Oct 18 16:12:42 UTC 2023 selfserv_9355 with PID 26978 started at Wed Oct 18 16:12:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26978 at Wed Oct 18 16:12:44 UTC 2023 kill -USR1 26978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26978 killed at Wed Oct 18 16:12:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27030 found at Wed Oct 18 16:12:44 UTC 2023 selfserv_9355 with PID 27030 started at Wed Oct 18 16:12:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27030 at Wed Oct 18 16:12:45 UTC 2023 kill -USR1 27030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27030 killed at Wed Oct 18 16:12:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27082 found at Wed Oct 18 16:12:46 UTC 2023 selfserv_9355 with PID 27082 started at Wed Oct 18 16:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27082 at Wed Oct 18 16:12:48 UTC 2023 kill -USR1 27082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27082 killed at Wed Oct 18 16:12:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27134 found at Wed Oct 18 16:12:48 UTC 2023 selfserv_9355 with PID 27134 started at Wed Oct 18 16:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27134 at Wed Oct 18 16:12:50 UTC 2023 kill -USR1 27134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27134 killed at Wed Oct 18 16:12:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27186 found at Wed Oct 18 16:12:50 UTC 2023 selfserv_9355 with PID 27186 started at Wed Oct 18 16:12:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27186 at Wed Oct 18 16:12:52 UTC 2023 kill -USR1 27186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27186 killed at Wed Oct 18 16:12:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27238 found at Wed Oct 18 16:12:52 UTC 2023 selfserv_9355 with PID 27238 started at Wed Oct 18 16:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27238 at Wed Oct 18 16:12:54 UTC 2023 kill -USR1 27238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27238 killed at Wed Oct 18 16:12:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27290 found at Wed Oct 18 16:12:54 UTC 2023 selfserv_9355 with PID 27290 started at Wed Oct 18 16:12:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27290 at Wed Oct 18 16:12:56 UTC 2023 kill -USR1 27290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27290 killed at Wed Oct 18 16:12:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:12:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 16:12:56 UTC 2023 selfserv_9355 with PID 27342 started at Wed Oct 18 16:12:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27342 at Wed Oct 18 16:12:58 UTC 2023 kill -USR1 27342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27342 killed at Wed Oct 18 16:12:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:12:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27394 found at Wed Oct 18 16:12:58 UTC 2023 selfserv_9355 with PID 27394 started at Wed Oct 18 16:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27394 at Wed Oct 18 16:13:00 UTC 2023 kill -USR1 27394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27394 killed at Wed Oct 18 16:13:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27448 found at Wed Oct 18 16:13:01 UTC 2023 selfserv_9355 with PID 27448 started at Wed Oct 18 16:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27448 at Wed Oct 18 16:13:02 UTC 2023 kill -USR1 27448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27448 killed at Wed Oct 18 16:13:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27500 found at Wed Oct 18 16:13:03 UTC 2023 selfserv_9355 with PID 27500 started at Wed Oct 18 16:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27500 at Wed Oct 18 16:13:04 UTC 2023 kill -USR1 27500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27500 killed at Wed Oct 18 16:13:04 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27552 found at Wed Oct 18 16:13:05 UTC 2023 selfserv_9355 with PID 27552 started at Wed Oct 18 16:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27552 at Wed Oct 18 16:13:06 UTC 2023 kill -USR1 27552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27552 killed at Wed Oct 18 16:13:06 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27606 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27606 found at Wed Oct 18 16:13:07 UTC 2023 selfserv_9355 with PID 27606 started at Wed Oct 18 16:13:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27606 at Wed Oct 18 16:13:08 UTC 2023 kill -USR1 27606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27606 killed at Wed Oct 18 16:13:08 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27658 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27658 found at Wed Oct 18 16:13:08 UTC 2023 selfserv_9355 with PID 27658 started at Wed Oct 18 16:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27658 at Wed Oct 18 16:13:10 UTC 2023 kill -USR1 27658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27658 killed at Wed Oct 18 16:13:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27710 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27710 found at Wed Oct 18 16:13:11 UTC 2023 selfserv_9355 with PID 27710 started at Wed Oct 18 16:13:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27710 at Wed Oct 18 16:13:12 UTC 2023 kill -USR1 27710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27710 killed at Wed Oct 18 16:13:12 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27762 found at Wed Oct 18 16:13:13 UTC 2023 selfserv_9355 with PID 27762 started at Wed Oct 18 16:13:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27762 at Wed Oct 18 16:13:14 UTC 2023 kill -USR1 27762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27762 killed at Wed Oct 18 16:13:14 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27814 found at Wed Oct 18 16:13:15 UTC 2023 selfserv_9355 with PID 27814 started at Wed Oct 18 16:13:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27814 at Wed Oct 18 16:13:16 UTC 2023 kill -USR1 27814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27814 killed at Wed Oct 18 16:13:16 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27866 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27866 found at Wed Oct 18 16:13:17 UTC 2023 selfserv_9355 with PID 27866 started at Wed Oct 18 16:13:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27866 at Wed Oct 18 16:13:18 UTC 2023 kill -USR1 27866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27866 killed at Wed Oct 18 16:13:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27923 found at Wed Oct 18 16:13:18 UTC 2023 selfserv_9355 with PID 27923 started at Wed Oct 18 16:13:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27923 at Wed Oct 18 16:13:20 UTC 2023 kill -USR1 27923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27923 killed at Wed Oct 18 16:13:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27975 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27975 found at Wed Oct 18 16:13:20 UTC 2023 selfserv_9355 with PID 27975 started at Wed Oct 18 16:13:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27975 at Wed Oct 18 16:13:22 UTC 2023 kill -USR1 27975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27975 killed at Wed Oct 18 16:13:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28031 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28031 found at Wed Oct 18 16:13:22 UTC 2023 selfserv_9355 with PID 28031 started at Wed Oct 18 16:13:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28031 at Wed Oct 18 16:13:24 UTC 2023 kill -USR1 28031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28031 killed at Wed Oct 18 16:13:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28085 found at Wed Oct 18 16:13:24 UTC 2023 selfserv_9355 with PID 28085 started at Wed Oct 18 16:13:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28085 at Wed Oct 18 16:13:26 UTC 2023 kill -USR1 28085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28085 killed at Wed Oct 18 16:13:26 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28137 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28137 found at Wed Oct 18 16:13:26 UTC 2023 selfserv_9355 with PID 28137 started at Wed Oct 18 16:13:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28137 at Wed Oct 18 16:13:28 UTC 2023 kill -USR1 28137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28137 killed at Wed Oct 18 16:13:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28189 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28189 found at Wed Oct 18 16:13:28 UTC 2023 selfserv_9355 with PID 28189 started at Wed Oct 18 16:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28189 at Wed Oct 18 16:13:30 UTC 2023 kill -USR1 28189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28189 killed at Wed Oct 18 16:13:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28241 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28241 found at Wed Oct 18 16:13:30 UTC 2023 selfserv_9355 with PID 28241 started at Wed Oct 18 16:13:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28241 at Wed Oct 18 16:13:32 UTC 2023 kill -USR1 28241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28241 killed at Wed Oct 18 16:13:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28293 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28293 found at Wed Oct 18 16:13:32 UTC 2023 selfserv_9355 with PID 28293 started at Wed Oct 18 16:13:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28293 at Wed Oct 18 16:13:34 UTC 2023 kill -USR1 28293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28293 killed at Wed Oct 18 16:13:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28345 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28345 found at Wed Oct 18 16:13:34 UTC 2023 selfserv_9355 with PID 28345 started at Wed Oct 18 16:13:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28345 at Wed Oct 18 16:13:36 UTC 2023 kill -USR1 28345 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28345 killed at Wed Oct 18 16:13:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28397 found at Wed Oct 18 16:13:36 UTC 2023 selfserv_9355 with PID 28397 started at Wed Oct 18 16:13:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28397 at Wed Oct 18 16:13:38 UTC 2023 kill -USR1 28397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28397 killed at Wed Oct 18 16:13:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28449 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28449 found at Wed Oct 18 16:13:38 UTC 2023 selfserv_9355 with PID 28449 started at Wed Oct 18 16:13:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28449 at Wed Oct 18 16:13:40 UTC 2023 kill -USR1 28449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28449 killed at Wed Oct 18 16:13:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28502 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28502 found at Wed Oct 18 16:13:40 UTC 2023 selfserv_9355 with PID 28502 started at Wed Oct 18 16:13:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28502 at Wed Oct 18 16:13:42 UTC 2023 kill -USR1 28502 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28502 killed at Wed Oct 18 16:13:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28554 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28554 found at Wed Oct 18 16:13:42 UTC 2023 selfserv_9355 with PID 28554 started at Wed Oct 18 16:13:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28554 at Wed Oct 18 16:13:44 UTC 2023 kill -USR1 28554 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28554 killed at Wed Oct 18 16:13:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28606 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28606 found at Wed Oct 18 16:13:44 UTC 2023 selfserv_9355 with PID 28606 started at Wed Oct 18 16:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28606 at Wed Oct 18 16:13:46 UTC 2023 kill -USR1 28606 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28606 killed at Wed Oct 18 16:13:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28658 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28658 found at Wed Oct 18 16:13:46 UTC 2023 selfserv_9355 with PID 28658 started at Wed Oct 18 16:13:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28658 at Wed Oct 18 16:13:48 UTC 2023 kill -USR1 28658 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28658 killed at Wed Oct 18 16:13:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:13:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28710 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28710 found at Wed Oct 18 16:13:48 UTC 2023 selfserv_9355 with PID 28710 started at Wed Oct 18 16:13:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28710 at Wed Oct 18 16:13:50 UTC 2023 kill -USR1 28710 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28710 killed at Wed Oct 18 16:13:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28762 found at Wed Oct 18 16:13:50 UTC 2023 selfserv_9355 with PID 28762 started at Wed Oct 18 16:13:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28762 at Wed Oct 18 16:13:52 UTC 2023 kill -USR1 28762 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28762 killed at Wed Oct 18 16:13:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28814 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28814 found at Wed Oct 18 16:13:53 UTC 2023 selfserv_9355 with PID 28814 started at Wed Oct 18 16:13:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28814 at Wed Oct 18 16:13:54 UTC 2023 kill -USR1 28814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28814 killed at Wed Oct 18 16:13:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:13:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28866 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28866 found at Wed Oct 18 16:13:55 UTC 2023 selfserv_9355 with PID 28866 started at Wed Oct 18 16:13:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28866 at Wed Oct 18 16:13:56 UTC 2023 kill -USR1 28866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28866 killed at Wed Oct 18 16:13:56 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:13:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28948 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28948 found at Wed Oct 18 16:13:57 UTC 2023 selfserv_9355 with PID 28948 started at Wed Oct 18 16:13:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28948 at Wed Oct 18 16:13:58 UTC 2023 kill -USR1 28948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28948 killed at Wed Oct 18 16:13:58 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:13:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28990 found at Wed Oct 18 16:13:58 UTC 2023 selfserv_9355 with PID 28990 started at Wed Oct 18 16:13:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28990 at Wed Oct 18 16:13:59 UTC 2023 kill -USR1 28990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28990 killed at Wed Oct 18 16:13:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:13:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29029 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29029 found at Wed Oct 18 16:13:59 UTC 2023 selfserv_9355 with PID 29029 started at Wed Oct 18 16:13:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 29029 at Wed Oct 18 16:14:00 UTC 2023 kill -USR1 29029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29029 killed at Wed Oct 18 16:14:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29068 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29068 found at Wed Oct 18 16:14:00 UTC 2023 selfserv_9355 with PID 29068 started at Wed Oct 18 16:14:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29068 at Wed Oct 18 16:14:01 UTC 2023 kill -USR1 29068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29068 killed at Wed Oct 18 16:14:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29107 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29107 found at Wed Oct 18 16:14:01 UTC 2023 selfserv_9355 with PID 29107 started at Wed Oct 18 16:14:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 29107 at Wed Oct 18 16:14:02 UTC 2023 kill -USR1 29107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29107 killed at Wed Oct 18 16:14:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29146 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29146 found at Wed Oct 18 16:14:02 UTC 2023 selfserv_9355 with PID 29146 started at Wed Oct 18 16:14:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29146 at Wed Oct 18 16:14:03 UTC 2023 kill -USR1 29146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29146 killed at Wed Oct 18 16:14:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29185 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29185 found at Wed Oct 18 16:14:03 UTC 2023 selfserv_9355 with PID 29185 started at Wed Oct 18 16:14:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29185 at Wed Oct 18 16:14:04 UTC 2023 kill -USR1 29185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29185 killed at Wed Oct 18 16:14:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29224 found at Wed Oct 18 16:14:04 UTC 2023 selfserv_9355 with PID 29224 started at Wed Oct 18 16:14:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29224 at Wed Oct 18 16:14:05 UTC 2023 kill -USR1 29224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29224 killed at Wed Oct 18 16:14:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29263 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29263 found at Wed Oct 18 16:14:05 UTC 2023 selfserv_9355 with PID 29263 started at Wed Oct 18 16:14:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29263 at Wed Oct 18 16:14:06 UTC 2023 kill -USR1 29263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29263 killed at Wed Oct 18 16:14:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29302 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29302 found at Wed Oct 18 16:14:06 UTC 2023 selfserv_9355 with PID 29302 started at Wed Oct 18 16:14:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29302 at Wed Oct 18 16:14:07 UTC 2023 kill -USR1 29302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29302 killed at Wed Oct 18 16:14:07 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29341 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29341 found at Wed Oct 18 16:14:07 UTC 2023 selfserv_9355 with PID 29341 started at Wed Oct 18 16:14:07 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29341 at Wed Oct 18 16:14:08 UTC 2023 kill -USR1 29341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29341 killed at Wed Oct 18 16:14:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29381 found at Wed Oct 18 16:14:08 UTC 2023 selfserv_9355 with PID 29381 started at Wed Oct 18 16:14:08 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29381 at Wed Oct 18 16:14:09 UTC 2023 kill -USR1 29381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29381 killed at Wed Oct 18 16:14:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29421 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29421 found at Wed Oct 18 16:14:09 UTC 2023 selfserv_9355 with PID 29421 started at Wed Oct 18 16:14:09 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29421 at Wed Oct 18 16:14:10 UTC 2023 kill -USR1 29421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29421 killed at Wed Oct 18 16:14:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29461 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29461 found at Wed Oct 18 16:14:10 UTC 2023 selfserv_9355 with PID 29461 started at Wed Oct 18 16:14:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29461 at Wed Oct 18 16:14:11 UTC 2023 kill -USR1 29461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29461 killed at Wed Oct 18 16:14:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29501 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29501 found at Wed Oct 18 16:14:11 UTC 2023 selfserv_9355 with PID 29501 started at Wed Oct 18 16:14:11 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29501 at Wed Oct 18 16:14:12 UTC 2023 kill -USR1 29501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29501 killed at Wed Oct 18 16:14:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29541 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29541 found at Wed Oct 18 16:14:12 UTC 2023 selfserv_9355 with PID 29541 started at Wed Oct 18 16:14:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29541 at Wed Oct 18 16:14:13 UTC 2023 kill -USR1 29541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29541 killed at Wed Oct 18 16:14:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29581 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29581 found at Wed Oct 18 16:14:13 UTC 2023 selfserv_9355 with PID 29581 started at Wed Oct 18 16:14:13 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29581 at Wed Oct 18 16:14:14 UTC 2023 kill -USR1 29581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29581 killed at Wed Oct 18 16:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29621 found at Wed Oct 18 16:14:14 UTC 2023 selfserv_9355 with PID 29621 started at Wed Oct 18 16:14:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29621 at Wed Oct 18 16:14:15 UTC 2023 kill -USR1 29621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29621 killed at Wed Oct 18 16:14:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:14:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29661 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29661 found at Wed Oct 18 16:14:15 UTC 2023 selfserv_9355 with PID 29661 started at Wed Oct 18 16:14:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29661 at Wed Oct 18 16:14:16 UTC 2023 kill -USR1 29661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29661 killed at Wed Oct 18 16:14:16 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 16:14:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 29788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29788 found at Wed Oct 18 16:14:18 UTC 2023 selfserv_9355 with PID 29788 started at Wed Oct 18 16:14:18 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 29788 at Wed Oct 18 16:14:38 UTC 2023 kill -USR1 29788 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29788 killed at Wed Oct 18 16:14:38 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 30343 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30343 found at Wed Oct 18 16:14:38 UTC 2023 selfserv_9355 with PID 30343 started at Wed Oct 18 16:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30343 at Wed Oct 18 16:15:10 UTC 2023 kill -USR1 30343 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30343 killed at Wed Oct 18 16:15:10 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 16:15:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31140 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31140 found at Wed Oct 18 16:15:11 UTC 2023 selfserv_9355 with PID 31140 started at Wed Oct 18 16:15:11 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31140 at Wed Oct 18 16:15:12 UTC 2023 kill -USR1 31140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31140 killed at Wed Oct 18 16:15:12 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:15:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31218 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31218 found at Wed Oct 18 16:15:12 UTC 2023 selfserv_9355 with PID 31218 started at Wed Oct 18 16:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31218 at Wed Oct 18 16:15:13 UTC 2023 kill -USR1 31218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31218 killed at Wed Oct 18 16:15:13 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:15:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31270 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31270 found at Wed Oct 18 16:15:14 UTC 2023 selfserv_9355 with PID 31270 started at Wed Oct 18 16:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31270 at Wed Oct 18 16:15:38 UTC 2023 kill -USR1 31270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31270 killed at Wed Oct 18 16:15:38 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:15:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31393 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31393 found at Wed Oct 18 16:15:38 UTC 2023 selfserv_9355 with PID 31393 started at Wed Oct 18 16:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31393 at Wed Oct 18 16:15:39 UTC 2023 kill -USR1 31393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31393 killed at Wed Oct 18 16:15:39 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:15:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31457 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31457 found at Wed Oct 18 16:15:40 UTC 2023 selfserv_9355 with PID 31457 started at Wed Oct 18 16:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31457 at Wed Oct 18 16:15:41 UTC 2023 kill -USR1 31457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31457 killed at Wed Oct 18 16:15:41 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:15:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31509 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31509 found at Wed Oct 18 16:15:42 UTC 2023 selfserv_9355 with PID 31509 started at Wed Oct 18 16:15:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31509 at Wed Oct 18 16:16:05 UTC 2023 kill -USR1 31509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31509 killed at Wed Oct 18 16:16:05 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:16:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31561 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31561 found at Wed Oct 18 16:16:05 UTC 2023 selfserv_9355 with PID 31561 started at Wed Oct 18 16:16:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31561 at Wed Oct 18 16:16:06 UTC 2023 kill -USR1 31561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31561 killed at Wed Oct 18 16:16:06 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:16:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31625 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31625 found at Wed Oct 18 16:16:07 UTC 2023 selfserv_9355 with PID 31625 started at Wed Oct 18 16:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31625 at Wed Oct 18 16:16:08 UTC 2023 kill -USR1 31625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31625 killed at Wed Oct 18 16:16:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:16:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31677 found at Wed Oct 18 16:16:09 UTC 2023 selfserv_9355 with PID 31677 started at Wed Oct 18 16:16:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31677 at Wed Oct 18 16:16:33 UTC 2023 kill -USR1 31677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31677 killed at Wed Oct 18 16:16:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:16:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31740 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31740 found at Wed Oct 18 16:16:33 UTC 2023 selfserv_9355 with PID 31740 started at Wed Oct 18 16:16:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31740 at Wed Oct 18 16:16:34 UTC 2023 kill -USR1 31740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31740 killed at Wed Oct 18 16:16:35 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:16:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31804 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31804 found at Wed Oct 18 16:16:35 UTC 2023 selfserv_9355 with PID 31804 started at Wed Oct 18 16:16:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31804 at Wed Oct 18 16:16:36 UTC 2023 kill -USR1 31804 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31804 killed at Wed Oct 18 16:16:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:16:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31856 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31856 found at Wed Oct 18 16:16:37 UTC 2023 selfserv_9355 with PID 31856 started at Wed Oct 18 16:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31856 at Wed Oct 18 16:17:01 UTC 2023 kill -USR1 31856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31856 killed at Wed Oct 18 16:17:01 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31908 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31908 found at Wed Oct 18 16:17:02 UTC 2023 selfserv_9355 with PID 31908 started at Wed Oct 18 16:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31908 at Wed Oct 18 16:17:03 UTC 2023 kill -USR1 31908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31908 killed at Wed Oct 18 16:17:03 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31972 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31972 found at Wed Oct 18 16:17:03 UTC 2023 selfserv_9355 with PID 31972 started at Wed Oct 18 16:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31972 at Wed Oct 18 16:17:05 UTC 2023 kill -USR1 31972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31972 killed at Wed Oct 18 16:17:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:17:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32029 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32029 found at Wed Oct 18 16:17:05 UTC 2023 selfserv_9355 with PID 32029 started at Wed Oct 18 16:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32029 at Wed Oct 18 16:17:28 UTC 2023 kill -USR1 32029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32029 killed at Wed Oct 18 16:17:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32092 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32092 found at Wed Oct 18 16:17:29 UTC 2023 selfserv_9355 with PID 32092 started at Wed Oct 18 16:17:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32092 at Wed Oct 18 16:17:30 UTC 2023 kill -USR1 32092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32092 killed at Wed Oct 18 16:17:30 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32148 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32148 found at Wed Oct 18 16:17:30 UTC 2023 selfserv_9355 with PID 32148 started at Wed Oct 18 16:17:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32148 at Wed Oct 18 16:17:31 UTC 2023 kill -USR1 32148 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32148 killed at Wed Oct 18 16:17:31 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32204 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32204 found at Wed Oct 18 16:17:31 UTC 2023 selfserv_9355 with PID 32204 started at Wed Oct 18 16:17:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32204 at Wed Oct 18 16:17:32 UTC 2023 kill -USR1 32204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32204 killed at Wed Oct 18 16:17:33 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32260 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32260 found at Wed Oct 18 16:17:33 UTC 2023 selfserv_9355 with PID 32260 started at Wed Oct 18 16:17:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32260 at Wed Oct 18 16:17:34 UTC 2023 kill -USR1 32260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32260 killed at Wed Oct 18 16:17:34 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:17:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32320 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32320 found at Wed Oct 18 16:17:35 UTC 2023 selfserv_9355 with PID 32320 started at Wed Oct 18 16:17:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32320 at Wed Oct 18 16:17:59 UTC 2023 kill -USR1 32320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32320 killed at Wed Oct 18 16:17:59 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:17:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:17:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32372 found at Wed Oct 18 16:17:59 UTC 2023 selfserv_9355 with PID 32372 started at Wed Oct 18 16:17:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32372 at Wed Oct 18 16:18:00 UTC 2023 kill -USR1 32372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32372 killed at Wed Oct 18 16:18:00 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:18:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:18:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 16:18:01 UTC 2023 selfserv_9355 with PID 32432 started at Wed Oct 18 16:18:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32432 at Wed Oct 18 16:18:24 UTC 2023 kill -USR1 32432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32432 killed at Wed Oct 18 16:18:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:18:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:18:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32493 found at Wed Oct 18 16:18:25 UTC 2023 selfserv_9355 with PID 32493 started at Wed Oct 18 16:18:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32493 at Wed Oct 18 16:18:25 UTC 2023 kill -USR1 32493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32493 killed at Wed Oct 18 16:18:25 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:18:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:18:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32555 found at Wed Oct 18 16:18:26 UTC 2023 selfserv_9355 with PID 32555 started at Wed Oct 18 16:18:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32555 at Wed Oct 18 16:18:50 UTC 2023 kill -USR1 32555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32555 killed at Wed Oct 18 16:18:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:18:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:18:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32607 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32607 found at Wed Oct 18 16:18:51 UTC 2023 selfserv_9355 with PID 32607 started at Wed Oct 18 16:18:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32607 at Wed Oct 18 16:18:51 UTC 2023 kill -USR1 32607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32607 killed at Wed Oct 18 16:18:52 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:18:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:18:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32667 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32667 found at Wed Oct 18 16:18:52 UTC 2023 selfserv_9355 with PID 32667 started at Wed Oct 18 16:18:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32667 at Wed Oct 18 16:19:16 UTC 2023 kill -USR1 32667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32667 killed at Wed Oct 18 16:19:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:19:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32719 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32719 found at Wed Oct 18 16:19:17 UTC 2023 selfserv_9355 with PID 32719 started at Wed Oct 18 16:19:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32719 at Wed Oct 18 16:19:18 UTC 2023 kill -USR1 32719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32719 killed at Wed Oct 18 16:19:18 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:19:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 311 found at Wed Oct 18 16:19:18 UTC 2023 selfserv_9355 with PID 311 started at Wed Oct 18 16:19:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 311 at Wed Oct 18 16:19:41 UTC 2023 kill -USR1 311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 311 killed at Wed Oct 18 16:19:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:19:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 381 found at Wed Oct 18 16:19:42 UTC 2023 selfserv_9355 with PID 381 started at Wed Oct 18 16:19:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 381 at Wed Oct 18 16:19:43 UTC 2023 kill -USR1 381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 381 killed at Wed Oct 18 16:19:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:19:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 435 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 435 found at Wed Oct 18 16:19:43 UTC 2023 selfserv_9355 with PID 435 started at Wed Oct 18 16:19:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 435 at Wed Oct 18 16:19:45 UTC 2023 kill -USR1 435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 435 killed at Wed Oct 18 16:19:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:19:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 488 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 488 found at Wed Oct 18 16:19:45 UTC 2023 selfserv_9355 with PID 488 started at Wed Oct 18 16:19:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 488 at Wed Oct 18 16:19:46 UTC 2023 kill -USR1 488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 488 killed at Wed Oct 18 16:19:47 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:19:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 552 found at Wed Oct 18 16:19:47 UTC 2023 selfserv_9355 with PID 552 started at Wed Oct 18 16:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 552 at Wed Oct 18 16:19:48 UTC 2023 kill -USR1 552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 552 killed at Wed Oct 18 16:19:48 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:19:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 631 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 631 found at Wed Oct 18 16:19:48 UTC 2023 selfserv_9355 with PID 631 started at Wed Oct 18 16:19:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 631 at Wed Oct 18 16:19:49 UTC 2023 kill -USR1 631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 631 killed at Wed Oct 18 16:19:49 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:19:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 694 found at Wed Oct 18 16:19:49 UTC 2023 selfserv_9355 with PID 694 started at Wed Oct 18 16:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 694 at Wed Oct 18 16:19:50 UTC 2023 kill -USR1 694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 694 killed at Wed Oct 18 16:19:50 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:19:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 752 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 752 found at Wed Oct 18 16:19:50 UTC 2023 selfserv_9355 with PID 752 started at Wed Oct 18 16:19:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 752 at Wed Oct 18 16:19:51 UTC 2023 kill -USR1 752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 752 killed at Wed Oct 18 16:19:51 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 16:19:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 810 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 810 found at Wed Oct 18 16:19:51 UTC 2023 selfserv_9355 with PID 810 started at Wed Oct 18 16:19:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 810 at Wed Oct 18 16:19:52 UTC 2023 kill -USR1 810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 810 killed at Wed Oct 18 16:19:52 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 16:19:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 868 found at Wed Oct 18 16:19:52 UTC 2023 selfserv_9355 with PID 868 started at Wed Oct 18 16:19:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 868 at Wed Oct 18 16:19:53 UTC 2023 kill -USR1 868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 868 killed at Wed Oct 18 16:19:53 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 16:19:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 939 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 939 found at Wed Oct 18 16:19:53 UTC 2023 selfserv_9355 with PID 939 started at Wed Oct 18 16:19:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 939 at Wed Oct 18 16:19:54 UTC 2023 kill -USR1 939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 939 killed at Wed Oct 18 16:19:54 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:19:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1003 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1003 found at Wed Oct 18 16:19:54 UTC 2023 selfserv_9355 with PID 1003 started at Wed Oct 18 16:19:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1003 at Wed Oct 18 16:19:55 UTC 2023 kill -USR1 1003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1003 killed at Wed Oct 18 16:19:55 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 16:19:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1061 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1061 found at Wed Oct 18 16:19:55 UTC 2023 selfserv_9355 with PID 1061 started at Wed Oct 18 16:19:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1061 at Wed Oct 18 16:19:56 UTC 2023 kill -USR1 1061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1061 killed at Wed Oct 18 16:19:56 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 16:19:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1119 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1119 found at Wed Oct 18 16:19:56 UTC 2023 selfserv_9355 with PID 1119 started at Wed Oct 18 16:19:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1119 at Wed Oct 18 16:19:57 UTC 2023 kill -USR1 1119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1119 killed at Wed Oct 18 16:19:57 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 16:19:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1161 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1161 found at Wed Oct 18 16:19:57 UTC 2023 selfserv_9355 with PID 1161 started at Wed Oct 18 16:19:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1161 at Wed Oct 18 16:19:58 UTC 2023 kill -USR1 1161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1161 killed at Wed Oct 18 16:19:58 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 16:19:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1203 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1203 found at Wed Oct 18 16:19:58 UTC 2023 selfserv_9355 with PID 1203 started at Wed Oct 18 16:19:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 1203 at Wed Oct 18 16:19:59 UTC 2023 kill -USR1 1203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1203 killed at Wed Oct 18 16:19:59 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 16:19:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:19:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1245 found at Wed Oct 18 16:19:59 UTC 2023 selfserv_9355 with PID 1245 started at Wed Oct 18 16:19:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1245 at Wed Oct 18 16:20:00 UTC 2023 kill -USR1 1245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1245 killed at Wed Oct 18 16:20:00 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 16:20:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1287 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1287 found at Wed Oct 18 16:20:00 UTC 2023 selfserv_9355 with PID 1287 started at Wed Oct 18 16:20:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1287 at Wed Oct 18 16:20:01 UTC 2023 kill -USR1 1287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1287 killed at Wed Oct 18 16:20:01 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 16:20:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1329 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1329 found at Wed Oct 18 16:20:01 UTC 2023 selfserv_9355 with PID 1329 started at Wed Oct 18 16:20:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1329 at Wed Oct 18 16:20:02 UTC 2023 kill -USR1 1329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1329 killed at Wed Oct 18 16:20:02 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 16:20:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1371 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1371 found at Wed Oct 18 16:20:02 UTC 2023 selfserv_9355 with PID 1371 started at Wed Oct 18 16:20:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1371 at Wed Oct 18 16:20:02 UTC 2023 kill -USR1 1371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1371 killed at Wed Oct 18 16:20:03 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 16:20:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1413 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1413 found at Wed Oct 18 16:20:03 UTC 2023 selfserv_9355 with PID 1413 started at Wed Oct 18 16:20:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1413 at Wed Oct 18 16:20:03 UTC 2023 kill -USR1 1413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1413 killed at Wed Oct 18 16:20:04 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 16:20:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1455 found at Wed Oct 18 16:20:04 UTC 2023 selfserv_9355 with PID 1455 started at Wed Oct 18 16:20:04 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:20:04 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:20:48 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 1455 at Wed Oct 18 16:20:48 UTC 2023 kill -USR1 1455 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1455 killed at Wed Oct 18 16:20:48 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:20:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1517 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1517 found at Wed Oct 18 16:20:48 UTC 2023 selfserv_9355 with PID 1517 started at Wed Oct 18 16:20:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1517 at Wed Oct 18 16:20:49 UTC 2023 kill -USR1 1517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1517 killed at Wed Oct 18 16:20:49 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1559 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1559 found at Wed Oct 18 16:20:49 UTC 2023 selfserv_9355 with PID 1559 started at Wed Oct 18 16:20:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1559 at Wed Oct 18 16:20:49 UTC 2023 kill -USR1 1559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1559 killed at Wed Oct 18 16:20:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1598 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1598 found at Wed Oct 18 16:20:50 UTC 2023 selfserv_9355 with PID 1598 started at Wed Oct 18 16:20:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 1598 at Wed Oct 18 16:20:50 UTC 2023 kill -USR1 1598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1598 killed at Wed Oct 18 16:20:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1637 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1637 found at Wed Oct 18 16:20:51 UTC 2023 selfserv_9355 with PID 1637 started at Wed Oct 18 16:20:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1637 at Wed Oct 18 16:20:51 UTC 2023 kill -USR1 1637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1637 killed at Wed Oct 18 16:20:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1676 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1676 found at Wed Oct 18 16:20:51 UTC 2023 selfserv_9355 with PID 1676 started at Wed Oct 18 16:20:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 1676 at Wed Oct 18 16:20:52 UTC 2023 kill -USR1 1676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1676 killed at Wed Oct 18 16:20:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1715 found at Wed Oct 18 16:20:52 UTC 2023 selfserv_9355 with PID 1715 started at Wed Oct 18 16:20:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1715 at Wed Oct 18 16:20:52 UTC 2023 kill -USR1 1715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1715 killed at Wed Oct 18 16:20:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1754 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1754 found at Wed Oct 18 16:20:53 UTC 2023 selfserv_9355 with PID 1754 started at Wed Oct 18 16:20:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1754 at Wed Oct 18 16:20:53 UTC 2023 kill -USR1 1754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1754 killed at Wed Oct 18 16:20:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1793 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1793 found at Wed Oct 18 16:20:54 UTC 2023 selfserv_9355 with PID 1793 started at Wed Oct 18 16:20:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1793 at Wed Oct 18 16:20:54 UTC 2023 kill -USR1 1793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1793 killed at Wed Oct 18 16:20:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1832 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1832 found at Wed Oct 18 16:20:55 UTC 2023 selfserv_9355 with PID 1832 started at Wed Oct 18 16:20:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1832 at Wed Oct 18 16:20:55 UTC 2023 kill -USR1 1832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1832 killed at Wed Oct 18 16:20:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1871 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1871 found at Wed Oct 18 16:20:55 UTC 2023 selfserv_9355 with PID 1871 started at Wed Oct 18 16:20:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1871 at Wed Oct 18 16:20:56 UTC 2023 kill -USR1 1871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1871 killed at Wed Oct 18 16:20:56 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1910 found at Wed Oct 18 16:20:56 UTC 2023 selfserv_9355 with PID 1910 started at Wed Oct 18 16:20:56 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1910 at Wed Oct 18 16:20:57 UTC 2023 kill -USR1 1910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1910 killed at Wed Oct 18 16:20:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1950 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1950 found at Wed Oct 18 16:20:57 UTC 2023 selfserv_9355 with PID 1950 started at Wed Oct 18 16:20:57 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1950 at Wed Oct 18 16:20:57 UTC 2023 kill -USR1 1950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1950 killed at Wed Oct 18 16:20:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1990 found at Wed Oct 18 16:20:58 UTC 2023 selfserv_9355 with PID 1990 started at Wed Oct 18 16:20:58 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1990 at Wed Oct 18 16:20:58 UTC 2023 kill -USR1 1990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1990 killed at Wed Oct 18 16:20:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2030 found at Wed Oct 18 16:20:58 UTC 2023 selfserv_9355 with PID 2030 started at Wed Oct 18 16:20:58 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2030 at Wed Oct 18 16:20:59 UTC 2023 kill -USR1 2030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2030 killed at Wed Oct 18 16:20:59 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:20:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:20:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2070 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2070 found at Wed Oct 18 16:20:59 UTC 2023 selfserv_9355 with PID 2070 started at Wed Oct 18 16:20:59 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2070 at Wed Oct 18 16:21:00 UTC 2023 kill -USR1 2070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2070 killed at Wed Oct 18 16:21:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:21:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2110 found at Wed Oct 18 16:21:00 UTC 2023 selfserv_9355 with PID 2110 started at Wed Oct 18 16:21:00 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2110 at Wed Oct 18 16:21:00 UTC 2023 kill -USR1 2110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2110 killed at Wed Oct 18 16:21:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:21:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2150 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2150 found at Wed Oct 18 16:21:01 UTC 2023 selfserv_9355 with PID 2150 started at Wed Oct 18 16:21:01 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2150 at Wed Oct 18 16:21:01 UTC 2023 kill -USR1 2150 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2150 killed at Wed Oct 18 16:21:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:21:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2190 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2190 found at Wed Oct 18 16:21:02 UTC 2023 selfserv_9355 with PID 2190 started at Wed Oct 18 16:21:02 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2190 at Wed Oct 18 16:21:02 UTC 2023 kill -USR1 2190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2190 killed at Wed Oct 18 16:21:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:21:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2230 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2230 found at Wed Oct 18 16:21:02 UTC 2023 selfserv_9355 with PID 2230 started at Wed Oct 18 16:21:02 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2230 at Wed Oct 18 16:21:03 UTC 2023 kill -USR1 2230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2230 killed at Wed Oct 18 16:21:03 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 16:21:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 2270 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2270 found at Wed Oct 18 16:21:03 UTC 2023 selfserv_9355 with PID 2270 started at Wed Oct 18 16:21:03 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 2270 at Wed Oct 18 16:21:22 UTC 2023 kill -USR1 2270 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2270 killed at Wed Oct 18 16:21:22 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 16:21:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 2829 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2829 found at Wed Oct 18 16:21:23 UTC 2023 selfserv_9355 with PID 2829 started at Wed Oct 18 16:21:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2829 at Wed Oct 18 16:21:52 UTC 2023 kill -USR1 2829 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2829 killed at Wed Oct 18 16:21:52 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:21:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3653 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3653 found at Wed Oct 18 16:21:52 UTC 2023 selfserv_9355 with PID 3653 started at Wed Oct 18 16:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3653 at Wed Oct 18 16:21:54 UTC 2023 kill -USR1 3653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3653 killed at Wed Oct 18 16:21:55 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:21:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3705 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3705 found at Wed Oct 18 16:21:55 UTC 2023 selfserv_9355 with PID 3705 started at Wed Oct 18 16:21:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3705 at Wed Oct 18 16:22:21 UTC 2023 kill -USR1 3705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3705 killed at Wed Oct 18 16:22:21 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:22:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3764 found at Wed Oct 18 16:22:21 UTC 2023 selfserv_9355 with PID 3764 started at Wed Oct 18 16:22:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3764 at Wed Oct 18 16:22:23 UTC 2023 kill -USR1 3764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3764 killed at Wed Oct 18 16:22:23 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:22:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3830 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3830 found at Wed Oct 18 16:22:23 UTC 2023 selfserv_9355 with PID 3830 started at Wed Oct 18 16:22:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3830 at Wed Oct 18 16:22:26 UTC 2023 kill -USR1 3830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3830 killed at Wed Oct 18 16:22:26 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:22:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3884 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3884 found at Wed Oct 18 16:22:26 UTC 2023 selfserv_9355 with PID 3884 started at Wed Oct 18 16:22:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3884 at Wed Oct 18 16:22:50 UTC 2023 kill -USR1 3884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3884 killed at Wed Oct 18 16:22:50 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:22:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3936 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3936 found at Wed Oct 18 16:22:51 UTC 2023 selfserv_9355 with PID 3936 started at Wed Oct 18 16:22:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3936 at Wed Oct 18 16:22:52 UTC 2023 kill -USR1 3936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3936 killed at Wed Oct 18 16:22:53 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:22:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4000 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4000 found at Wed Oct 18 16:22:53 UTC 2023 selfserv_9355 with PID 4000 started at Wed Oct 18 16:22:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4000 at Wed Oct 18 16:22:55 UTC 2023 kill -USR1 4000 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4000 killed at Wed Oct 18 16:22:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:22:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4052 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4052 found at Wed Oct 18 16:22:56 UTC 2023 selfserv_9355 with PID 4052 started at Wed Oct 18 16:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4052 at Wed Oct 18 16:23:21 UTC 2023 kill -USR1 4052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4052 killed at Wed Oct 18 16:23:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:23:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4111 found at Wed Oct 18 16:23:22 UTC 2023 selfserv_9355 with PID 4111 started at Wed Oct 18 16:23:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4111 at Wed Oct 18 16:23:23 UTC 2023 kill -USR1 4111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4111 killed at Wed Oct 18 16:23:24 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:23:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4177 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4177 found at Wed Oct 18 16:23:24 UTC 2023 selfserv_9355 with PID 4177 started at Wed Oct 18 16:23:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4177 at Wed Oct 18 16:23:26 UTC 2023 kill -USR1 4177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4177 killed at Wed Oct 18 16:23:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:23:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4231 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4231 found at Wed Oct 18 16:23:27 UTC 2023 selfserv_9355 with PID 4231 started at Wed Oct 18 16:23:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4231 at Wed Oct 18 16:23:52 UTC 2023 kill -USR1 4231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4231 killed at Wed Oct 18 16:23:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:23:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4283 found at Wed Oct 18 16:23:53 UTC 2023 selfserv_9355 with PID 4283 started at Wed Oct 18 16:23:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4283 at Wed Oct 18 16:23:55 UTC 2023 kill -USR1 4283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4283 killed at Wed Oct 18 16:23:55 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:23:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4347 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4347 found at Wed Oct 18 16:23:55 UTC 2023 selfserv_9355 with PID 4347 started at Wed Oct 18 16:23:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4347 at Wed Oct 18 16:23:58 UTC 2023 kill -USR1 4347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4347 killed at Wed Oct 18 16:23:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:23:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:23:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4399 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4399 found at Wed Oct 18 16:23:58 UTC 2023 selfserv_9355 with PID 4399 started at Wed Oct 18 16:23:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4399 at Wed Oct 18 16:24:21 UTC 2023 kill -USR1 4399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4399 killed at Wed Oct 18 16:24:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:24:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4458 found at Wed Oct 18 16:24:22 UTC 2023 selfserv_9355 with PID 4458 started at Wed Oct 18 16:24:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4458 at Wed Oct 18 16:24:24 UTC 2023 kill -USR1 4458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4458 killed at Wed Oct 18 16:24:24 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:24:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4516 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4516 found at Wed Oct 18 16:24:24 UTC 2023 selfserv_9355 with PID 4516 started at Wed Oct 18 16:24:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4516 at Wed Oct 18 16:24:26 UTC 2023 kill -USR1 4516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4516 killed at Wed Oct 18 16:24:26 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:24:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4574 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4574 found at Wed Oct 18 16:24:26 UTC 2023 selfserv_9355 with PID 4574 started at Wed Oct 18 16:24:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4574 at Wed Oct 18 16:24:29 UTC 2023 kill -USR1 4574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4574 killed at Wed Oct 18 16:24:29 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:24:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4630 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4630 found at Wed Oct 18 16:24:29 UTC 2023 selfserv_9355 with PID 4630 started at Wed Oct 18 16:24:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4630 at Wed Oct 18 16:24:32 UTC 2023 kill -USR1 4630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4630 killed at Wed Oct 18 16:24:32 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:24:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4690 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4690 found at Wed Oct 18 16:24:32 UTC 2023 selfserv_9355 with PID 4690 started at Wed Oct 18 16:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4690 at Wed Oct 18 16:24:58 UTC 2023 kill -USR1 4690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4690 killed at Wed Oct 18 16:24:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:24:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:24:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4742 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4742 found at Wed Oct 18 16:24:59 UTC 2023 selfserv_9355 with PID 4742 started at Wed Oct 18 16:24:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4742 at Wed Oct 18 16:25:00 UTC 2023 kill -USR1 4742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4742 killed at Wed Oct 18 16:25:00 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:25:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:25:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4802 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4802 found at Wed Oct 18 16:25:01 UTC 2023 selfserv_9355 with PID 4802 started at Wed Oct 18 16:25:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4802 at Wed Oct 18 16:25:25 UTC 2023 kill -USR1 4802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4802 killed at Wed Oct 18 16:25:25 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:25:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4865 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4865 found at Wed Oct 18 16:25:25 UTC 2023 selfserv_9355 with PID 4865 started at Wed Oct 18 16:25:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4865 at Wed Oct 18 16:25:27 UTC 2023 kill -USR1 4865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4865 killed at Wed Oct 18 16:25:27 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:25:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:25:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4925 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4925 found at Wed Oct 18 16:25:27 UTC 2023 selfserv_9355 with PID 4925 started at Wed Oct 18 16:25:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4925 at Wed Oct 18 16:25:53 UTC 2023 kill -USR1 4925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4925 killed at Wed Oct 18 16:25:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:25:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:25:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4977 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4977 found at Wed Oct 18 16:25:53 UTC 2023 selfserv_9355 with PID 4977 started at Wed Oct 18 16:25:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4977 at Wed Oct 18 16:25:55 UTC 2023 kill -USR1 4977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4977 killed at Wed Oct 18 16:25:55 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:25:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:25:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5037 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5037 found at Wed Oct 18 16:25:55 UTC 2023 selfserv_9355 with PID 5037 started at Wed Oct 18 16:25:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5037 at Wed Oct 18 16:26:20 UTC 2023 kill -USR1 5037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5037 killed at Wed Oct 18 16:26:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:26:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5094 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5094 found at Wed Oct 18 16:26:21 UTC 2023 selfserv_9355 with PID 5094 started at Wed Oct 18 16:26:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5094 at Wed Oct 18 16:26:23 UTC 2023 kill -USR1 5094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5094 killed at Wed Oct 18 16:26:23 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:26:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5158 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5158 found at Wed Oct 18 16:26:23 UTC 2023 selfserv_9355 with PID 5158 started at Wed Oct 18 16:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5158 at Wed Oct 18 16:26:47 UTC 2023 kill -USR1 5158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5158 killed at Wed Oct 18 16:26:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:26:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5212 found at Wed Oct 18 16:26:47 UTC 2023 selfserv_9355 with PID 5212 started at Wed Oct 18 16:26:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5212 at Wed Oct 18 16:26:49 UTC 2023 kill -USR1 5212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5212 killed at Wed Oct 18 16:26:49 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:26:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5264 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5264 found at Wed Oct 18 16:26:49 UTC 2023 selfserv_9355 with PID 5264 started at Wed Oct 18 16:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5264 at Wed Oct 18 16:26:52 UTC 2023 kill -USR1 5264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5264 killed at Wed Oct 18 16:26:52 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 16:26:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5316 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5316 found at Wed Oct 18 16:26:52 UTC 2023 selfserv_9355 with PID 5316 started at Wed Oct 18 16:26:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5316 at Wed Oct 18 16:26:55 UTC 2023 kill -USR1 5316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5316 killed at Wed Oct 18 16:26:55 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 16:26:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5398 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5398 found at Wed Oct 18 16:26:55 UTC 2023 selfserv_9355 with PID 5398 started at Wed Oct 18 16:26:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5398 at Wed Oct 18 16:26:56 UTC 2023 kill -USR1 5398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5398 killed at Wed Oct 18 16:26:56 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:26:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5440 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5440 found at Wed Oct 18 16:26:57 UTC 2023 selfserv_9355 with PID 5440 started at Wed Oct 18 16:26:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5440 at Wed Oct 18 16:26:57 UTC 2023 kill -USR1 5440 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5440 killed at Wed Oct 18 16:26:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:26:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5479 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5479 found at Wed Oct 18 16:26:58 UTC 2023 selfserv_9355 with PID 5479 started at Wed Oct 18 16:26:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 5479 at Wed Oct 18 16:26:58 UTC 2023 kill -USR1 5479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5479 killed at Wed Oct 18 16:26:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:26:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:26:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5518 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5518 found at Wed Oct 18 16:26:59 UTC 2023 selfserv_9355 with PID 5518 started at Wed Oct 18 16:26:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5518 at Wed Oct 18 16:26:59 UTC 2023 kill -USR1 5518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5518 killed at Wed Oct 18 16:27:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5557 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5557 found at Wed Oct 18 16:27:00 UTC 2023 selfserv_9355 with PID 5557 started at Wed Oct 18 16:27:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 5557 at Wed Oct 18 16:27:00 UTC 2023 kill -USR1 5557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5557 killed at Wed Oct 18 16:27:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5596 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5596 found at Wed Oct 18 16:27:01 UTC 2023 selfserv_9355 with PID 5596 started at Wed Oct 18 16:27:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5596 at Wed Oct 18 16:27:01 UTC 2023 kill -USR1 5596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5596 killed at Wed Oct 18 16:27:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5635 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5635 found at Wed Oct 18 16:27:02 UTC 2023 selfserv_9355 with PID 5635 started at Wed Oct 18 16:27:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5635 at Wed Oct 18 16:27:03 UTC 2023 kill -USR1 5635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5635 killed at Wed Oct 18 16:27:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5674 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5674 found at Wed Oct 18 16:27:03 UTC 2023 selfserv_9355 with PID 5674 started at Wed Oct 18 16:27:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5674 at Wed Oct 18 16:27:04 UTC 2023 kill -USR1 5674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5674 killed at Wed Oct 18 16:27:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5713 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5713 found at Wed Oct 18 16:27:04 UTC 2023 selfserv_9355 with PID 5713 started at Wed Oct 18 16:27:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5713 at Wed Oct 18 16:27:05 UTC 2023 kill -USR1 5713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5713 killed at Wed Oct 18 16:27:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5752 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5752 found at Wed Oct 18 16:27:05 UTC 2023 selfserv_9355 with PID 5752 started at Wed Oct 18 16:27:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5752 at Wed Oct 18 16:27:06 UTC 2023 kill -USR1 5752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5752 killed at Wed Oct 18 16:27:06 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5791 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5791 found at Wed Oct 18 16:27:06 UTC 2023 selfserv_9355 with PID 5791 started at Wed Oct 18 16:27:06 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5791 at Wed Oct 18 16:27:07 UTC 2023 kill -USR1 5791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5791 killed at Wed Oct 18 16:27:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5831 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5831 found at Wed Oct 18 16:27:07 UTC 2023 selfserv_9355 with PID 5831 started at Wed Oct 18 16:27:07 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5831 at Wed Oct 18 16:27:08 UTC 2023 kill -USR1 5831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5831 killed at Wed Oct 18 16:27:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5871 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5871 found at Wed Oct 18 16:27:08 UTC 2023 selfserv_9355 with PID 5871 started at Wed Oct 18 16:27:08 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5871 at Wed Oct 18 16:27:09 UTC 2023 kill -USR1 5871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5871 killed at Wed Oct 18 16:27:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5911 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5911 found at Wed Oct 18 16:27:09 UTC 2023 selfserv_9355 with PID 5911 started at Wed Oct 18 16:27:09 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5911 at Wed Oct 18 16:27:10 UTC 2023 kill -USR1 5911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5911 killed at Wed Oct 18 16:27:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5951 found at Wed Oct 18 16:27:10 UTC 2023 selfserv_9355 with PID 5951 started at Wed Oct 18 16:27:10 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5951 at Wed Oct 18 16:27:11 UTC 2023 kill -USR1 5951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5951 killed at Wed Oct 18 16:27:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5991 found at Wed Oct 18 16:27:11 UTC 2023 selfserv_9355 with PID 5991 started at Wed Oct 18 16:27:11 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5991 at Wed Oct 18 16:27:12 UTC 2023 kill -USR1 5991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5991 killed at Wed Oct 18 16:27:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6031 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6031 found at Wed Oct 18 16:27:12 UTC 2023 selfserv_9355 with PID 6031 started at Wed Oct 18 16:27:12 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6031 at Wed Oct 18 16:27:13 UTC 2023 kill -USR1 6031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6031 killed at Wed Oct 18 16:27:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6071 found at Wed Oct 18 16:27:14 UTC 2023 selfserv_9355 with PID 6071 started at Wed Oct 18 16:27:14 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6071 at Wed Oct 18 16:27:14 UTC 2023 kill -USR1 6071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6071 killed at Wed Oct 18 16:27:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 16:27:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:27:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6111 found at Wed Oct 18 16:27:15 UTC 2023 selfserv_9355 with PID 6111 started at Wed Oct 18 16:27:15 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6111 at Wed Oct 18 16:27:15 UTC 2023 kill -USR1 6111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6111 killed at Wed Oct 18 16:27:15 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 16:27:17 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 16:27:17 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:29 2023 Not After : Wed Oct 18 13:43:29 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:b0:43:13:b4:5f:01:fb:4b:83:81:ee:fd:3b:10:48: 5c:27:3b:c7:dd:59:04:7f:29:09:8e:3e:29:07:4c:f7: 3d:e4:c5:5a:b8:6d:90:c5:25:5a:83:cd:32:19:33:2b: 12:1f:13:c6:c2:3c:77:81:ce:f8:76:3a:c8:52:2a:9e: 8b:23:d2:38:bf:ae:b4:7c:6b:a0:96:37:fc:e0:a5:c6: 8b:09:35:b5:77:e0:f5:f3:a5:e2:0b:e4:24:ec:7b:ec: 82:fa:7e:70:20:52:4b:df:da:d1:3d:56:84:9d:be:7d: 5a:8a:75:96:c4:4d:0e:e6:0f:a5:84:f5:5d:b7:99:fc: f9:3a:29:e8:24:1b:f9:53:b5:d6:f3:71:2b:aa:5b:d2: 69:62:6f:27:6b:8d:3d:86:54:89:f9:47:1f:e4:b3:44: af:03:d2:35:0b:b5:02:aa:af:c8:d8:db:09:19:ae:5f: 4f:da:cc:9e:99:88:4d:ec:af:e0:40:0f:13:db:bd:9f: ea:33:b9:12:32:81:4f:97:92:fa:81:1a:78:48:b7:c9: b0:3b:e9:89:3b:73:28:72:8e:d4:bd:26:0b:19:d7:6f: ae:57:be:97:4d:1a:8b:b6:2e:13:f5:34:c6:2d:ec:15: cf:44:13:14:ca:f1:f9:25:c1:7e:7d:02:1d:c7:84:91 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:14:f0:6e:e2:ca:e7:68:9c:be:cf:86:04:c2:56:33: 81:bf:b5:7e:ef:24:3c:0b:33:a1:03:1e:c3:49:29:e4: b2:45:07:25:85:f4:b9:d9:aa:1e:e3:d5:bf:e6:d5:db: cd:8c:96:30:3b:c3:d0:f6:e9:6a:63:af:a0:46:ae:b8: 38:f1:49:e8:db:f1:35:4a:4c:ed:ff:7e:4a:91:d3:aa: 45:fc:d7:e2:c5:c1:65:28:1c:e2:99:1f:b1:57:df:dd: 29:61:c6:2b:a7:9a:f3:28:4c:e5:36:e8:7e:ca:0b:ca: 6a:bc:c4:4c:8a:f0:4b:d0:dd:b1:60:aa:7c:40:66:31: 5f:0f:49:c0:31:64:b2:63:f4:07:9c:94:cc:00:22:82: 45:05:b3:3a:0b:4e:db:a1:17:c2:1b:0f:78:2a:92:82: a1:9a:f5:c8:e0:d4:09:06:d9:8d:07:3d:fa:0c:37:d4: 5b:57:ee:d6:bb:9c:43:37:18:63:bd:8b:b4:43:ae:75: f4:72:9b:43:ab:33:9d:b8:54:28:84:42:11:c0:cf:40: 42:0d:51:35:36:1f:5d:54:db:70:7a:d4:22:54:28:dd: 2d:a1:f5:ab:79:dd:70:66:d2:00:38:19:77:e3:7e:cf: 40:54:5a:88:3e:ae:e5:28:e2:1b:32:b4:da:e5:68:93 Fingerprint (SHA-256): C5:EA:C0:E0:AD:C0:98:43:7C:C1:61:D4:3F:54:E6:E9:A4:B9:AD:3B:AC:BB:38:FA:01:9D:B3:80:09:17:BF:39 Fingerprint (SHA1): C1:5E:A5:7A:60:C5:55:E0:FC:DD:3B:06:7C:25:02:4F:F1:0E:8B:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:32 2023 Not After : Wed Oct 18 13:43:32 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:eb:de:cd:8b:f8:4f:a1:58:50:3e:f6:e6:1a:21:cd: 7b:ee:d5:84:c5:e2:2d:e8:b0:6e:f9:c5:63:8c:ed:ce: 6f:a5:a3:49:87:86:a1:52:71:97:b5:94:a5:97:2e:8d: b5:c3:ad:d1:4e:56:4a:43:b2:5f:50:75:73:57:64:d4: 19:f7:ae:c4:46:5c:ec:ca:b7:67:64:61:9a:cb:54:03: d0:27:5e:3e:7f:b4:75:95:a3:ba:de:2b:69:24:bd:61: 02:87:47:1e:9d:fa:ee:ab:50:03:bb:fd:f5:bf:19:e7: ee:3f:0c:a4:dd:3a:56:64:f5:5d:7c:2d:d5:e2:4a:af: d2:6f:6f:d5:6e:85:5b:9f:1a:d0:6d:c0:03:c1:72:39: 70:fc:8b:58:23:bf:cd:57:59:13:af:e0:eb:e9:49:64: d1:55:f6:3f:99:51:0a:f7:8b:fd:0a:e3:e1:99:36:77: 2b:b0:10:1a:fb:68:3c:f4:61:02:77:ae:cc:ab:76:2e: 99:da:77:c4:06:14:c5:28:c2:d6:80:48:40:ef:c5:d3: 17:42:5f:fd:a0:6d:3c:ea:1f:c1:10:76:9f:35:f8:8a: b7:fc:ec:60:11:d7:05:46:5e:0d:e3:c9:6a:7e:27:18: 36:0a:32:93:0c:91:1f:a0:93:df:c1:a2:66:ec:8e:e7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:38:02:a0:12:f7:39:e4:fa:16:e7:da:9c:2c:d0:02: e3:d3:45:d8:d4:04:41:68:3b:df:21:2b:37:70:55:c4: 0e:e8:8c:69:fc:78:6b:80:29:cb:c2:7e:01:bb:71:5e: ec:ff:e8:5c:34:9d:de:b2:a6:41:d3:90:c2:68:94:9d: 00:aa:e2:c5:f3:5b:90:88:21:59:ac:26:11:4d:f9:88: b3:35:b2:41:16:5c:04:d9:71:74:25:36:d6:bc:7a:f4: f6:19:ab:99:79:55:c1:02:e3:d4:bd:19:8f:84:43:e9: ec:81:61:7f:cd:ca:fe:0d:fd:07:0f:63:ee:a9:95:aa: dc:d4:57:89:31:27:ea:75:9b:5b:c7:1a:ee:c0:79:34: 9c:ed:aa:04:2a:29:b2:86:f5:19:c4:fd:ac:74:dd:e3: c1:f3:a8:a7:ad:c1:d6:4d:ed:b7:6f:66:38:c5:24:7c: e2:fd:94:d2:90:b3:64:66:5f:19:64:59:26:43:97:73: 99:38:1f:f9:b8:84:b2:4a:4a:f8:92:41:ef:93:f6:53: 57:31:e1:25:83:43:f3:ff:3e:6c:ae:45:ac:26:1f:1c: 51:88:07:bc:1a:db:d3:37:4c:a8:9e:21:24:e2:2c:0d: 24:90:16:2b:e0:a7:4a:a6:59:0f:b7:38:e2:5e:dc:0d Fingerprint (SHA-256): D8:8B:DD:18:B8:C8:66:CD:5C:C9:65:8C:68:E9:51:48:7B:54:1D:26:D2:7B:31:75:1F:73:25:78:2E:AB:8C:DB Fingerprint (SHA1): 50:7F:45:C0:1F:4F:F8:41:89:BD:04:A8:8B:26:48:6C:3F:F5:6C:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA-ec T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-ec ,, clientCA T,C,C chain-2-clientCA ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-1-clientCA-ec ,, clientCA-dsa T,C,C chain-1-clientCA ,, chain-2-clientCA-dsa ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v1.27434 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 13:44:03 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 13:41:19 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 13:43:58 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Oct 18 16:27:24 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 16:27:24 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 16:27:24 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 16:27:24 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 16:27:24 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 16:27:26 UTC 2023 TIMESTAMP ec END: Wed Oct 18 16:27:26 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 16:27:26 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 16:27:26 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 16:27:26 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 16:27:26 UTC 2023 %{do_ssl_gtests}.sh: Testing with shared library =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed Oct 18 16:27:26 UTC 2023 TIMESTAMP libpkix END: Wed Oct 18 16:27:26 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 16:27:26 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #81: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #84: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #109: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #114: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 80ccd3d7930a6d5571248b447bd6519348f6b21e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k f804e28930bf4282b519d61b13024184d74ad065 -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:7d:d8:41:5e:54:45:bc:b3:ce:cc:71:1c:f8:6c:a8: 86:50:4d:d2:21:8c:99:d6:7c:b0:ef:08:7e:01:65:b0: ce:42:80:d9:26:de:d2:68:2f:4c:60:8b:4f:2e:7c:d5: d9:7d:e4:78:b7:de:03:29:28:03:e8:ca:bb:75:d3:e1: 5d:6d:b6:38:13:00:af:cc:c3:3b:fa:3c:d4:aa:08:5d: 98:4b:e3:04:6d:9e:64:16:46:44:1b:1a:49:01:2d:3c: 1f:8b:2c:5e:14:8f:d6:46:bc:d0:4e:c3:74:7a:9f:51: 21:e1:8f:cb:a2:3b:40:86:7f:6d:24:ce:ed:8d:58:4f: ae:67:08:9e:f1:12:71:ce:67:51:c8:ec:e3:c5:15:87: 92:64:b2:e2:ac:7c:61:41:b9:30:5d:ed:73:38:65:58: 48:c1:c4:75:d3:da:25:92:a0:c0:a3:36:8d:2d:9a:64: 4a:e4:91:78:e8:cd:23:b2:ca:d0:ec:28:65:72:31:63: 29:be:ec:dd:b6:d0:cd:ea:66:ca:31:d1:12:80:f5:1d: cf:4f:20:6d:a3:31:2c:34:78:76:be:9a:99:fb:8e:fb: bb:b9:41:c5:ed:0f:b8:ce:ec:ee:b6:77:b8:5a:b3:f5: e4:7e:d3:6a:04:f8:7d:5d:40:af:a3:2c:f7:77:3b:c1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:16:b6:ec:04:b6:d4:94:fa:b5:71:a6:f2:0f:85:bc: f0:b8:f0:dc:ef:ea:ea:0b:2d:3b:13:e4:cf:99:80:9c: e5:9a:d3:12:d5:6a:55:3c:0f:31:85:4e:ae:40:3e:ad: f1:ff:ce:80:d4:e3:73:61:21:9c:0f:63:db:3b:99:3f: 55:f6:e8:b1:81:d2:3b:85:9e:9d:c1:90:e1:70:db:28: 10:5e:36:0c:fe:39:46:d4:f7:a3:68:56:21:a8:15:a9: 6f:86:a9:5e:09:9c:05:18:4e:a3:42:9d:62:ae:9c:25: 60:8b:51:19:1a:8e:0f:dc:e9:c7:eb:0c:6a:47:81:ce: ad:90:88:8f:da:33:9f:94:f1:0b:1c:1a:df:4f:43:56: 5a:9b:d8:96:29:52:30:c1:d3:5f:91:c3:ce:0f:8e:d8: 2c:d3:86:aa:e4:1a:76:08:89:90:8b:e6:0f:ad:27:75: d6:32:59:5b:16:a5:1b:15:06:66:df:b9:0d:56:e9:79: 33:68:d2:ad:5d:75:0f:da:c0:5b:61:cd:28:48:fb:31: 4f:82:5a:62:a7:26:98:2d:80:71:c2:55:09:3b:76:7b: 1c:89:d8:ea:68:44:ea:8d:6d:83:f5:60:f6:f1:69:b1: 0f:ce:fa:b7:4c:ad:f1:2d:5c:d4:bd:4b:7a:38:02:0d Fingerprint (SHA-256): 59:E1:CA:63:49:CF:4E:CF:12:C3:61:48:9C:AD:36:5E:43:0E:9D:3F:8B:D5:66:49:B1:04:48:28:99:22:DC:2B Fingerprint (SHA1): BD:31:92:9E:3C:05:D4:CE:C8:B6:AA:4C:F2:56:03:00:60:0C:2B:85 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:dd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:07 2023 Not After : Thu Jan 18 16:30:07 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4e:56:78:ed:f7:d1:c8:90:98:22:ff:f8:86:e8:cf: d6:ba:01:2b:27:f3:af:f9:0f:ce:80:d7:5e:84:be:26: 56:97:68:d7:00:36:92:8e:db:22:00:96:18:14:47:b1: f3:4a:5d:c7:6d:e1:68:67:71:1a:a5:3b:90:03:ce:00: 28:25:2c:b1:5b:ee:e4:b8:42:18:7b:47:88:ba:0a:3e: dc:fc:a0:a4:a6:c4:ec:bf:69:99:9c:e6:21:98:62:19: b7:61:b8:19:cc:dd:b4:93:49:db:eb:48:cf:36:11:40: 75:dc:d0:67:0f:ed:3d:eb:40:9c:78:f8:bb:6d:37:23: 6c:c4:d0:b3:a4:18:98:b2:b3:6b:91:72:88:63:fa:5a: 49:ed:57:74:f0:ae:f6:08:5b:fd:41:b5:8f:82:71:49: 50:93:81:0c:b3:03:75:3c:53:ca:e4:c6:4f:88:47:78: 3c:8a:ff:67:72:8d:69:a1:77:16:30:e2:7c:74:c8:30: c5:41:24:0e:48:f3:0c:5c:90:a5:58:0e:53:f4:ba:28: 1f:bb:2b:d1:1a:de:87:34:36:6d:fe:f1:ef:6f:ea:0e: 1b:cd:dc:f5:ac:c3:e7:f7:9d:89:3b:4d:fc:d4:93:d8: e6:70:e0:ff:e2:f3:0a:f3:52:7c:fb:31:ba:ab:95:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:19:7d:4c:f2:32:6d:ab:82:88:d3:1f:38:10:e9:e7: fe:30:2a:95:83:27:55:ee:24:bb:68:4a:5b:c6:59:e3: 14:dd:27:44:53:48:07:76:d6:dc:ce:f0:ce:26:ac:1d: 01:57:50:57:dc:08:7a:d2:9f:63:02:5e:e2:42:42:0c: 0e:b8:7b:07:55:d8:79:41:15:b6:b4:c3:b9:46:5d:d3: 10:85:af:37:3c:c0:8b:4d:c2:af:31:d8:b9:4f:cb:7f: 8f:f3:9b:7a:37:10:98:a9:d4:17:ec:c2:09:e2:66:71: 3f:37:36:d9:7a:f8:9d:34:92:35:9b:9b:77:53:83:e7: 80:9f:41:76:0a:66:ab:3d:e0:aa:0e:db:1b:5c:d9:b1: 2e:fd:23:a7:61:f2:7d:e9:6f:fb:72:a9:d6:16:c5:cd: 77:a7:eb:2f:b3:93:3f:74:5a:dd:0d:ee:cd:ad:d1:9d: 2d:c8:c9:a4:1e:4b:88:3a:67:89:6f:07:34:85:b2:c3: fd:6c:26:11:91:bc:cb:7f:50:34:0e:0e:e0:2b:6d:42: 42:50:c9:90:db:06:1e:e4:c0:2e:5e:94:e1:b6:fd:17: f8:8e:c7:f6:86:e2:17:44:a7:67:24:74:d9:85:a0:1e: 07:bc:51:23:c4:be:73:32:81:4d:2e:a0:eb:e4:b4:2e Fingerprint (SHA-256): F4:71:91:E1:EF:45:B4:85:08:8F:F0:6B:48:A0:F0:36:E0:49:B4:0E:4A:C8:5F:2A:39:29:09:E9:00:CE:7F:B0 Fingerprint (SHA1): 79:9C:F1:6E:A3:9A:AD:30:4D:09:EE:11:A5:75:4E:04:6D:1F:8E:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:e0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:09 2023 Not After : Thu Jan 18 16:30:09 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f1:e5:7b:24:40:2c:b0:89:35:9e:51:65:07:80:b0: a7:33:57:1b:99:b7:ac:7e:5b:a7:43:dc:bd:d3:1c:60: ae:66:da:c3:02:57:46:9d:6d:ad:4e:46:89:47:23:49: c7:c4:cd:93:98:2a:35:14:6f:e5:46:0d:cd:e2:44:ef: 0d:fe:ca:95:4e:c6:77:ee:cb:10:83:34:aa:cc:a5:8b: 10:f5:34:80:09:40:3d:f0:fc:e8:07:98:11:69:a9:ee: a6:68:60:53:66:d7:63:45:45:b8:80:0a:dc:8f:be:74: 90:67:1f:9e:62:96:92:40:cc:e5:65:40:5f:d0:b8:b3: ce:fb:5c:8c:b9:98:32:09:9e:1d:b0:cc:a8:57:5d:69: 2d:2f:c9:ee:db:6c:f3:b2:16:cc:40:10:17:54:07:af: bd:b3:b3:c3:03:9a:55:8e:06:fa:f4:14:71:a3:42:7e: 36:f5:08:b1:3c:58:54:0a:93:44:11:39:cb:07:b9:b5: cc:5a:00:0d:d6:a3:f9:5b:6e:b0:48:46:74:e7:1c:42: 97:e6:6e:bc:f6:90:e4:f5:73:1c:7f:79:22:36:57:67: f8:01:5c:16:cc:43:d6:c0:b0:5b:a1:65:44:03:75:49: 73:de:79:c0:61:37:38:23:72:79:7f:e1:6c:84:e0:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:56:73:34:27:e2:a7:85:b8:a9:48:93:be:4e:c5:90: b6:7f:9f:cb:c7:1a:74:a2:50:ef:c2:a6:f5:1a:b2:3b: 18:06:e5:f7:4f:44:68:aa:b1:f0:48:8d:8c:6c:e6:c1: dd:cf:95:16:76:bb:c5:44:4f:6c:04:1a:f6:61:6a:a1: da:64:2a:86:bf:6d:88:de:d2:a1:d5:ed:21:04:d0:52: 87:af:61:89:04:1e:57:45:65:c3:94:04:9e:85:27:35: 62:b9:c0:d8:00:3a:66:52:64:09:fc:f5:29:87:cd:ad: ab:81:b5:00:5a:ea:1c:46:08:db:04:08:f8:d0:67:7d: fc:49:85:c7:2a:5f:56:fc:b6:16:0c:b9:a1:60:9f:dc: 6f:ce:ce:0c:91:33:a1:e5:e5:2d:7f:9a:67:fa:e7:de: 9e:ea:ad:1a:aa:41:85:54:6a:0e:3c:78:32:58:ab:e8: 7e:86:dc:0e:f8:17:7f:20:ec:5a:88:76:81:55:8c:04: d7:1a:a3:25:76:8f:04:16:64:b4:7e:6f:48:1d:58:54: f0:bd:d2:eb:df:bc:92:88:cd:f6:a9:ff:6b:1a:96:aa: 70:11:cb:18:dc:8f:22:86:5c:fd:6b:5d:04:ce:84:c0: a0:69:05:c2:59:fe:c9:a6:d6:f2:eb:e2:f7:78:0d:b8 Fingerprint (SHA-256): 33:43:E9:2A:A9:E3:7A:ED:24:F4:B8:20:59:2E:AC:B6:E3:05:18:2D:24:8E:01:0D:E9:DF:C5:D4:BB:54:F2:11 Fingerprint (SHA1): BF:34:AD:E6:82:F5:CF:38:13:22:96:EE:62:1E:C7:62:BD:97:B4:87 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:e3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:10 2023 Not After : Thu Jan 18 16:30:10 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:a2:6f:92:91:66:15:35:b3:e6:e0:fe:fc:1e:aa:e6: 4e:5c:eb:37:5a:73:26:28:e7:d7:cb:8a:4b:eb:17:81: d1:d1:48:66:39:76:65:f3:07:39:b7:be:c8:af:91:3a: f4:d6:de:ad:d9:24:2d:65:88:49:eb:90:1f:4b:7b:6e: 49:8c:a7:6e:58:1e:2f:ee:0d:ad:9d:91:53:ff:a5:7c: 43:ef:8e:b2:b3:03:69:d4:c9:f7:1c:55:1c:59:ee:95: a4:6a:69:97:e4:5b:0f:7c:08:0e:5e:20:3a:ef:15:1b: 53:04:62:03:ab:c3:5c:58:ef:66:8f:98:d8:09:5c:a1: d9:c9:d0:ec:7d:a9:04:e8:1a:27:3f:bf:5d:cf:22:c1: ec:2c:8f:b2:35:56:73:dd:36:cb:1b:dd:10:a9:c2:c8: 23:cb:8e:4a:bd:f9:84:39:cb:58:2c:0f:b6:d9:76:b3: 6f:91:6d:37:05:12:d0:6c:56:dd:cb:75:a6:8e:4f:65: 16:bf:35:0b:c5:18:ec:c3:43:c5:a4:d8:7b:ea:28:6d: e5:52:96:4c:d5:2a:fc:aa:33:23:a6:c4:e9:ec:dc:0b: 08:df:9c:da:25:63:e0:7e:44:9a:9c:16:77:04:e3:6f: 70:bb:bd:f0:f2:f0:86:56:3a:a2:fd:24:5d:64:b6:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:ae:33:58:3b:76:54:bc:2f:e8:62:be:a7:53:2d:49: 97:d7:2e:c0:de:13:4f:97:e6:05:c7:6d:6c:76:6b:39: f8:bb:86:54:88:33:80:1c:c3:89:77:ac:71:19:eb:fb: 9a:15:d3:26:91:2f:7f:ed:d2:92:51:7d:57:3f:1e:c4: df:8a:9f:a6:04:92:d3:0c:77:52:03:41:15:51:77:78: 37:44:af:b8:77:08:59:cd:73:25:5e:04:3b:1c:3d:88: d7:fe:aa:a7:af:75:c8:d5:df:15:07:c5:65:66:f2:6d: 8d:43:74:63:0d:0a:99:8e:4b:70:a9:ee:95:2c:dc:e1: 9d:38:86:82:ff:34:0b:f7:0e:eb:82:22:24:dc:c4:98: 60:61:60:bc:20:ac:47:27:e7:c8:6d:30:44:d3:54:5d: 62:db:a7:fc:5c:5d:12:9e:1a:1f:4c:0d:68:ce:75:c7: 5a:1e:c5:91:a6:4c:5c:9d:c8:c0:53:e7:6f:4a:cf:23: dc:4a:a6:c2:78:73:aa:a7:d6:0d:06:64:86:54:94:07: c1:11:d7:9b:2f:e2:fc:e0:09:e5:e9:ef:ca:39:c0:49: 28:6d:19:6b:bd:60:6c:85:ac:57:6c:be:d8:ef:5e:32: 06:76:e8:5c:ef:ef:2c:82:ac:ed:0c:e0:52:c7:69:f1 Fingerprint (SHA-256): 8F:A9:23:E7:AC:07:18:D2:AC:2D:41:84:82:CC:7C:36:12:87:9A:E7:77:C6:36:DE:4C:83:80:B1:3A:14:55:37 Fingerprint (SHA1): 33:42:A8:39:A9:00:04:70:14:BF:A2:D0:83:26:BF:00:AC:64:7F:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:e6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:12 2023 Not After : Thu Jan 18 16:30:12 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:56:b8:6b:82:b4:3a:10:f6:19:00:0f:f1:91:ac:eb: 52:9e:c8:08:93:3c:29:e9:79:00:53:31:65:f0:25:75: 74:92:1d:30:81:18:d1:67:c1:17:83:82:bd:ac:15:48: 8e:3f:a4:89:61:21:ad:ba:01:ae:b7:ec:87:a9:fc:06: 54:ce:e9:6d:77:09:eb:b2:4f:f1:2b:80:34:01:33:80: 81:a9:c3:49:f7:14:76:00:9f:bc:b1:96:07:b6:86:e6: 61:2e:c5:3a:9e:8e:67:ab:50:26:d3:59:d6:40:dd:0f: 6b:3b:06:91:da:8f:0d:a8:f7:ae:b6:52:f7:7c:32:32: 57:a3:78:2a:be:65:6c:87:dc:6c:92:79:3e:d2:93:ed: 9a:4d:88:9a:8f:5f:57:7e:9c:81:5d:a9:a3:66:89:e3: 67:df:6e:b6:67:93:30:5f:70:2e:f8:b6:b3:47:88:57: a0:f3:7d:53:cc:a6:1d:4b:65:06:d5:c0:05:d1:2a:ff: 61:40:5c:af:19:8c:6e:9c:0d:ef:d3:7b:17:05:f0:00: 71:b5:ec:3d:36:87:6f:59:9c:74:c9:e6:4a:01:de:19: 36:a8:7f:93:bd:a1:c7:9e:6c:86:ae:34:74:6f:03:96: 5a:4f:13:d3:20:6d:4d:d9:be:c0:99:25:d1:a8:17:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:40:d8:8e:65:5e:78:56:87:e0:6a:eb:08:11:6c:42: f0:ca:57:26:38:61:8d:e4:37:67:a8:23:c3:7d:9b:bf: 0a:2f:cb:7a:97:72:a0:f5:da:6d:10:aa:d8:5d:8e:9a: b6:39:29:77:45:9e:99:10:97:37:c8:97:6a:4d:4e:2c: 48:d3:cc:64:eb:2c:45:af:60:da:de:bf:bf:58:d8:31: 56:b0:7d:9a:e2:ec:20:40:74:c5:1a:70:aa:a3:55:b4: 82:f9:84:7b:3b:c0:ec:cf:da:2d:7b:45:f9:3b:68:33: 62:2a:9e:ed:5f:22:d4:3c:72:09:fa:7b:36:66:5c:fd: 43:d8:03:ca:83:5b:05:dc:dc:44:91:a8:57:01:1a:c9: f6:05:d9:63:f4:eb:36:07:8c:e9:61:15:89:61:40:eb: a1:97:d2:12:2b:87:e7:08:db:f5:11:a2:35:b7:73:7e: 27:bf:50:d8:64:8d:65:d3:22:39:54:e4:62:0a:27:97: 64:34:87:e3:53:06:ec:2c:d0:99:97:6e:26:96:e9:76: ef:c5:62:57:cb:1a:6d:f1:9c:1b:e5:61:6f:89:e9:7c: 81:20:b9:fb:25:84:a5:e8:dc:3e:09:7a:6e:f0:7c:c3: b3:f3:23:cf:e6:1f:e2:a0:a2:fe:5d:6f:ae:d5:df:d0 Fingerprint (SHA-256): A8:0F:9F:18:56:D2:1B:DC:CE:EC:02:71:C7:ED:5C:BE:D4:69:9A:F0:82:EC:96:20:6C:92:77:A1:9A:75:21:5F Fingerprint (SHA1): C9:4C:E6:44:C1:40:01:DE:33:A6:11:B5:CA:41:B9:5A:B1:29:3B:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:ea Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:13 2023 Not After : Thu Jan 18 16:30:13 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:4c:33:8c:df:21:e1:6f:3e:b0:8b:c6:0f:93:33:00: 0b:92:d0:ea:44:f0:4d:fa:26:56:64:74:8e:52:69:06: af:92:6f:42:14:1d:d7:b9:b5:1c:d0:d4:d1:1c:f9:da: a1:72:12:28:79:d2:d4:2e:94:05:67:76:4f:78:02:0a: 60:1a:f6:a7:9c:e1:b3:59:eb:17:dc:8a:35:11:cf:f4: 43:0f:9d:2a:47:3c:c1:11:33:e9:36:03:df:ab:14:4c: b3:fb:1f:e2:74:53:b6:cd:c8:49:44:0c:11:9c:a7:2c: 11:74:58:f4:ed:31:65:bd:e4:4f:6e:a0:62:80:2a:25: d5:f7:4b:ea:6a:63:23:63:83:d4:b9:ef:e1:73:46:b3: 5f:56:e6:dd:45:35:49:3d:11:e2:fb:fa:1d:9f:0d:4f: 93:df:42:7c:78:2c:26:29:6a:5f:20:cd:5a:2f:d2:b7: fe:99:82:f9:ba:42:8c:db:f8:66:50:d4:e8:8d:5b:98: b2:07:d2:8d:a3:a8:f1:8f:85:b5:ac:3d:7c:c7:38:d0: ef:e4:c8:7c:53:b1:12:a8:bb:dc:41:cd:37:37:44:14: 90:84:8a:5c:e6:97:12:b4:4c:39:ff:24:a4:89:1d:43: 9e:41:0e:38:88:66:6c:f7:01:b5:8c:97:ab:54:a7:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:5e:36:0c:d8:4f:8d:05:f7:4a:53:b6:51:da:c9:6d: d5:8c:61:8d:db:0d:4d:99:48:73:5b:8c:5a:e3:57:c9: 3e:c2:1e:1c:10:26:2e:2b:5c:1d:f6:f5:e1:f6:b3:7b: 75:a0:05:62:96:d5:ea:b1:c3:bf:5f:92:fd:0a:9f:74: d1:90:46:a0:bf:8d:40:a8:d2:54:92:13:44:ce:ab:7a: f6:47:21:89:82:7a:04:25:66:95:78:da:06:31:c2:05: 5e:18:62:7c:dd:95:e1:c5:bf:58:fd:89:67:0b:37:2a: 34:37:3b:ad:c7:b1:63:ba:6d:a7:8f:73:3b:2a:c8:66: c1:28:f9:9d:be:5c:45:85:0a:f7:da:f2:d3:46:36:9f: 64:67:e5:b4:70:21:dd:3c:9b:de:54:fd:ad:ab:26:54: 52:aa:66:b3:8d:4f:17:52:60:b5:aa:64:31:93:c6:03: 1a:ed:a3:9b:cb:bf:37:94:78:f8:7a:d3:ed:77:1f:7d: e6:f5:a2:a6:56:a6:e0:97:ff:c0:33:4c:29:0c:05:23: b2:3a:74:2f:c9:b5:86:b4:c2:79:be:e8:7f:de:e1:1a: 37:70:15:4b:45:de:29:8a:1c:a9:e9:96:b4:fa:69:e1: 16:1b:b4:7d:68:d6:64:10:41:86:93:41:66:c4:da:60 Fingerprint (SHA-256): 0A:62:FF:C5:F8:C0:E8:DB:C5:C0:81:81:84:E1:BB:A8:CF:F1:58:00:7A:56:08:CE:FA:65:B9:88:18:BC:C9:13 Fingerprint (SHA1): 71:8E:0A:BC:E5:53:66:68:60:95:31:74:63:72:EB:A9:E6:08:D1:20 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:ec Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:15 2023 Not After : Thu Jan 18 16:30:15 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:f0:f5:64:e5:6d:50:73:fb:36:d9:ce:ef:e5:3a:c9: 5b:d2:b1:05:16:11:6f:ff:cd:59:f9:2c:e8:05:42:6b: 3a:19:48:2c:42:7f:12:89:1f:6f:8b:f9:b6:a4:cb:3c: c9:b9:ca:c7:a7:0a:e7:23:8b:d8:89:b7:83:cf:64:11: 06:c5:6c:34:59:15:09:79:7e:4b:f0:22:56:e4:d9:5c: 3c:2e:13:11:74:70:ec:fc:c9:d5:1a:00:aa:aa:47:e6: 5d:65:40:5e:44:98:38:08:08:90:b6:4e:04:55:9a:05: 73:23:9e:47:e4:d0:2d:03:f8:97:ba:96:d8:c0:cd:95: 5a:e7:39:9f:ce:9e:a4:cb:68:8d:48:89:fe:21:45:aa: b2:d8:c8:e1:6f:7a:84:b1:d1:18:cb:5a:c8:85:21:a8: 65:19:c3:d7:a7:2a:ff:b6:e9:67:80:83:11:85:f2:2c: 3b:7b:43:45:8e:d9:49:fc:90:7a:8a:79:ef:0a:fe:15: d0:64:84:1c:71:67:de:99:ad:e3:fb:58:59:6d:6d:58: 96:ea:de:5c:9a:d2:05:8f:c4:3e:86:7f:42:f6:d8:9d: 00:e4:69:23:f8:03:0c:77:16:ad:9c:79:48:17:1d:20: dc:b2:1e:d0:1f:9b:1f:a0:02:46:3f:0e:4a:bc:b8:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:df:3c:b1:d1:48:44:9d:ac:af:ed:07:bd:23:76:58: 04:15:14:aa:78:ae:c7:94:c6:09:10:1a:d1:08:ee:51: 00:49:16:7b:b5:8e:70:b0:89:71:35:e3:af:97:bb:00: 51:93:3e:fd:fc:2b:25:f1:fb:f7:54:71:c9:0c:bd:a9: 31:ba:81:97:f4:ce:0f:91:df:2c:b2:14:bc:f9:82:87: 39:21:a6:16:a3:57:99:29:0f:85:f2:20:56:48:b6:3e: f5:54:e9:cc:2c:ca:e2:f2:dd:cc:7c:99:f9:70:e1:ce: 07:9b:5e:1f:64:c1:73:83:3b:ad:6e:1b:bf:bb:2e:ee: b9:33:13:a5:38:84:04:35:2a:d7:fa:0a:84:ad:08:f1: 70:4b:7a:a9:ea:ec:64:10:1c:46:a9:32:03:5a:75:61: 2e:37:d0:24:dc:de:9f:11:80:12:d9:46:3d:fe:52:dd: 95:f5:b3:4f:50:85:a7:e9:5e:54:4d:c0:de:ce:13:88: 8f:9a:f8:eb:e1:96:74:9c:ff:14:55:a3:31:c4:d6:73: 4d:df:ed:01:d7:d7:e2:c2:6b:01:b2:f0:32:fa:d6:b6: af:47:6d:3f:f2:38:b4:5e:97:16:ea:3e:b1:5b:58:52: 51:64:29:b1:d9:2f:93:81:ab:32:6c:8f:8f:af:88:8e Fingerprint (SHA-256): F0:12:3E:F7:F1:E1:54:89:D1:2A:F1:A7:94:4B:45:F3:BF:0D:5D:A0:64:9F:AE:EC:F6:90:01:AF:97:14:D9:77 Fingerprint (SHA1): E2:36:93:8D:0C:D2:F9:25:26:C6:29:53:8C:6B:9F:D2:65:DE:74:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:ef Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:16 2023 Not After : Thu Jan 18 16:30:16 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:e4:89:7d:bf:ff:f8:e0:43:9f:32:75:52:f7:0e:0f: aa:1e:a4:6d:1f:b8:95:43:3a:0e:e4:85:b0:f4:32:7f: 46:01:71:9d:8f:97:01:67:21:0a:54:c6:b5:4d:a4:02: 8f:bf:da:79:a1:34:eb:81:20:55:df:01:2f:1f:ff:24: fa:d0:d7:5e:2d:da:59:ce:5b:8e:c1:fe:39:07:f5:ea: 41:ec:0e:88:d9:14:86:20:b1:13:de:88:09:ec:3d:f2: be:30:89:1d:f1:6d:4b:46:07:30:34:af:15:6e:0b:76: b9:64:60:be:8a:69:95:12:6d:73:9c:af:97:6a:e6:18: 71:0d:87:09:5f:0a:10:e9:d2:2a:4f:0d:b4:df:64:a2: f6:ef:69:63:2c:32:72:e6:45:3e:6d:b3:50:f7:bc:89: 41:cb:cd:c3:48:00:44:14:13:7e:fc:53:33:43:7a:83: fe:de:b6:6e:79:d1:9b:e2:aa:78:e8:b1:c4:49:21:d0: ef:16:66:b4:fc:f0:5e:ee:8a:5b:00:d0:be:f4:af:1d: 64:18:16:98:8e:8b:8d:4b:fe:35:1d:54:98:c7:bc:36: a9:a5:d6:45:e1:8c:1a:bf:94:b1:33:7b:22:1b:d2:59: 86:48:20:5d:bc:d4:7f:13:a5:52:40:ff:75:5f:8a:13 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:87:b0:25:65:67:0e:29:ec:07:a7:4c:5f:96:01:4c: ca:5b:6a:65:78:9f:61:1a:ac:84:7c:8c:b1:45:aa:00: 52:e3:49:58:cd:66:01:35:fd:4e:b3:28:b5:00:ba:d2: 5d:f8:63:01:da:74:e8:bf:91:d0:71:f5:22:50:19:86: aa:f6:dc:a6:99:d5:06:a9:c7:b1:fe:0e:8e:2f:59:f5: 3e:04:d2:52:2a:64:87:fe:ef:e6:a3:2e:07:5f:d5:b8: 30:83:b0:44:f9:93:33:77:4a:26:0a:cf:d9:70:a2:f5: 24:96:36:a0:e3:87:0e:21:94:02:c1:b5:36:98:34:a9: 7b:0e:07:50:fa:51:a0:9b:54:f3:c0:51:20:91:7e:7f: 1c:14:78:8a:f4:28:d6:91:48:cc:8e:38:f3:9d:fd:5b: 51:16:54:a7:58:10:09:bf:48:bc:7b:7e:e0:02:8d:b1: c0:a6:07:44:79:7a:cb:c1:87:f9:00:8b:9a:ae:0e:c3: 33:8f:01:ce:58:39:ed:bc:01:96:d6:3a:bf:53:c8:e8: 66:a3:a3:78:44:f2:ed:76:8f:8d:24:4c:f4:e4:84:18: 4b:04:aa:36:23:8e:47:14:a5:95:25:03:2e:27:a8:84: 93:90:1e:f0:b2:ef:30:cf:25:05:56:7b:51:71:9e:8b Fingerprint (SHA-256): 7A:D1:6C:FE:6F:B7:C3:20:BB:75:33:06:EF:A2:5D:31:F5:DF:23:E9:D2:E3:E1:12:18:EF:83:9A:76:DF:28:38 Fingerprint (SHA1): B6:5E:7D:FC:C6:D7:3A:D5:2A:CF:2A:D0:F1:32:66:81:CE:44:77:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:f2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:18 2023 Not After : Thu Jan 18 16:30:18 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:46:43:fb:b3:f6:ed:e9:7a:8f:15:21:3b:e6:f1:eb: 59:6f:1b:4a:40:ef:d9:23:b3:ec:8c:1f:91:59:9a:77: 10:b1:98:02:3e:fc:35:20:cc:e9:ea:02:e4:86:1d:8e: 84:0d:56:ca:39:9c:4e:e4:e1:73:70:2b:16:c9:8b:f7: 0d:48:a8:76:47:3b:bf:6c:7b:a8:9d:78:b9:88:25:1c: 61:7b:94:0e:e5:f2:70:9b:e4:79:36:04:67:38:03:c3: c2:a0:71:93:2d:59:b2:73:89:3e:ca:a1:26:9a:cb:19: 1d:3b:7d:2f:c9:3b:8a:bb:89:4b:d8:29:24:cb:f0:a4: fd:a1:ce:49:bc:0e:e6:14:6e:81:cd:a4:44:c5:37:f7: d0:23:61:4c:f0:10:2a:41:7a:98:37:d3:62:11:cb:f1: 15:b9:c0:45:a6:e3:b6:b0:a2:d5:8d:05:47:40:d1:45: 12:b8:c0:13:79:2f:b5:07:2c:ff:7b:d1:9a:20:f7:44: 36:bd:fe:cb:be:02:ed:e5:01:80:32:e1:99:6f:fb:64: 7f:8a:c5:49:28:29:47:d1:ee:1f:f1:db:61:8f:ed:fa: 34:16:59:02:ee:3d:81:a9:4f:57:4e:dd:2c:86:49:ac: 42:82:77:71:d7:04:7a:d6:73:55:b8:23:5c:36:d5:5b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:f1:0a:99:e4:1a:78:94:7c:11:b1:b9:51:1c:80:db: 1d:2f:f6:4d:20:d1:76:58:ae:1f:db:1c:36:78:3b:b4: 85:72:cb:4d:49:67:f2:6d:ac:60:c9:cb:85:e4:be:0f: 13:01:5a:98:ba:ea:50:19:17:df:63:9c:4d:9f:3c:3f: b3:2d:ff:b2:b9:ea:2e:7b:f7:67:a9:06:a9:68:85:8f: aa:cd:4a:15:af:0f:b1:49:97:b7:18:9f:b5:ce:e0:45: f1:87:a8:21:3a:3c:07:cb:3e:01:14:1b:35:17:04:aa: 83:f1:da:c7:6c:68:0b:a7:fd:db:24:eb:50:a1:47:7f: 99:aa:60:e8:0c:d1:bf:50:d8:b0:68:10:1b:38:f6:8c: 76:08:84:8a:c3:16:14:79:7f:9e:15:e5:6c:2e:8c:df: d0:ca:0d:61:2b:5f:98:97:7e:23:6c:1f:4e:79:1d:11: dc:4c:93:b8:ec:76:7b:d4:2a:2c:47:a8:a3:81:ed:cc: c1:38:46:23:fc:be:03:a5:19:8c:08:85:fa:cb:a9:ca: e1:71:6d:5d:21:d2:cf:03:63:7a:f9:0c:56:ec:42:fb: 9d:14:c0:1b:38:75:a4:cb:95:a9:68:39:55:e2:dd:9f: d3:da:62:6b:68:6c:9a:7f:d6:75:50:64:cc:84:e1:81 Fingerprint (SHA-256): 06:9D:B6:83:D3:3B:AA:E9:ED:C9:0A:72:B3:1C:EB:CE:30:EF:E0:48:FE:17:AC:CF:CA:8C:2B:8E:0B:E0:C1:19 Fingerprint (SHA1): 9C:42:19:C0:2C:84:C9:80:11:5B:8B:06:BE:5E:EF:7D:03:CD:61:82 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:f5 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:19 2023 Not After : Thu Jan 18 16:30:19 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:22:9a:46:37:56:bc:40:ee:93:72:a0:ac:75:d6:01: 6b:69:f7:de:19:ca:40:3a:79:b2:95:09:cc:c5:74:fb: b7:2b:2a:36:8e:ac:d2:a8:d5:88:9d:27:a4:d1:18:66: f1:de:55:23:a7:25:fe:38:b9:30:3c:47:3e:7c:5f:21: 9c:8b:86:46:88:a3:39:df:be:69:ae:6e:11:de:95:3f: 0b:38:b7:fd:38:de:4c:c7:1e:c1:03:36:d0:a1:dc:e1: fa:3a:3f:86:cd:24:ef:c3:16:a9:37:e5:7f:37:e5:4a: 4a:57:ed:c3:be:7b:1c:f2:bb:d5:2a:ee:6f:f5:ad:64: f0:ad:12:d0:88:da:c3:c0:00:42:7a:a6:69:dc:35:4d: 0b:4e:46:07:0d:30:95:be:70:d8:fd:cc:83:fc:b9:81: 94:cf:99:f2:62:37:cf:f8:c8:8a:f1:43:ae:7c:76:ae: b5:c0:0f:1a:3a:e8:25:8c:ce:34:bb:dd:df:e0:ae:9a: ae:da:26:74:d6:2b:e9:9e:b8:16:94:f5:a7:83:01:9a: 87:fa:58:bf:b9:97:3a:e4:c3:be:c2:cb:8b:9a:2c:f9: 23:96:30:09:d9:60:ef:8d:d2:5b:3d:9a:dd:4d:58:d9: bf:54:c2:09:b9:28:e1:9f:c3:b2:ae:bf:28:69:07:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:0b:c9:2b:55:fb:49:ef:af:8a:19:3e:8b:22:f5:19: 3d:a6:ea:dd:e7:d9:5b:3c:52:6e:3e:90:9a:a6:fb:44: 65:bf:93:ce:7f:30:9b:92:6a:3a:88:b9:1d:1a:2e:84: 46:5e:2d:bd:7b:e8:d9:6e:4b:3f:fc:1b:95:16:b3:44: 58:f4:27:36:89:be:34:28:77:14:df:0c:98:4a:95:89: 8a:c1:e5:e4:4d:11:58:3d:fb:57:41:a6:87:b0:db:8d: 2a:50:15:e2:f5:7b:68:7a:07:31:ce:37:f2:80:6b:7a: c0:d8:17:e6:8b:a3:92:f4:70:ef:bd:5e:57:9d:63:c9: 64:69:fd:67:0e:27:5d:e6:a5:e6:cd:77:99:05:18:cb: bd:11:3d:9d:61:52:74:0c:a1:46:8f:1b:30:44:6c:c8: 2a:02:f8:a6:a0:5e:69:3c:f6:07:e4:d4:5b:2e:ea:07: aa:93:35:63:fb:2e:13:8e:83:fe:9e:42:88:c4:ed:5d: 26:c3:d1:cb:a0:3e:0c:17:48:0a:1b:2a:54:50:15:91: 2b:bb:ba:3d:98:a8:45:44:a2:6a:ad:0f:e7:c9:16:8a: 71:03:b2:38:d1:a5:53:b6:3d:9c:23:3e:b0:7a:7b:b6: 31:b3:b0:19:10:0b:bf:ba:1e:6c:25:4b:9e:5a:78:44 Fingerprint (SHA-256): 3E:A9:D1:AC:16:87:6B:B4:FE:BF:73:57:3D:DA:00:AF:B5:E2:96:AD:AF:A6:BA:DB:4E:DB:87:FA:B7:3F:DE:DF Fingerprint (SHA1): 29:20:FC:01:BE:30:2A:A9:33:FB:B8:2B:D7:B3:69:B0:39:0A:E8:AE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:f8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:21 2023 Not After : Thu Jan 18 16:30:21 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:0a:11:c2:01:b5:09:5d:6d:b9:35:97:ba:60:75:90: 89:23:1a:88:40:50:cd:b2:ed:eb:70:f7:d0:5e:80:41: 0f:5e:e4:d9:54:6a:d1:c3:6b:61:26:0f:16:50:fd:f9: 78:fd:b1:79:69:b5:35:f4:a2:3c:01:87:73:13:62:d9: ac:a3:62:4f:30:f2:98:6e:c4:de:ea:cc:48:ea:d3:a3: 94:fe:97:5e:9d:66:5e:a2:45:2a:bd:82:a6:e4:18:7d: 1d:be:a2:66:aa:23:59:91:2a:da:7c:71:ba:2b:06:22: cb:1c:fe:2f:30:00:20:b2:b1:4f:03:56:aa:51:23:8d: 54:02:b7:bf:ce:4f:44:a3:5f:94:6c:f4:d4:64:26:9f: a0:90:4b:b7:b2:09:90:e3:d6:72:d9:0e:02:02:44:9d: 3f:d8:c1:36:76:fb:c5:1b:aa:72:09:83:db:4f:ff:bd: 5a:f5:82:e7:11:71:07:bc:2c:86:91:23:52:c4:da:57: ac:b8:d6:23:fe:de:c5:5a:76:71:b9:5b:2a:37:4b:c8: 80:8c:38:c0:3d:91:59:0b:64:bf:d1:1c:ed:34:01:e9: e9:b4:1a:09:a8:4b:f7:f1:4c:bb:6e:b0:56:45:b8:84: 76:bc:7d:5e:6e:27:15:6a:fb:32:0f:f1:b7:74:d6:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:e9:81:9c:cc:35:31:f7:56:e5:7a:36:fe:dd:5b:9a: 59:5b:d0:66:f8:c9:0a:b6:aa:e8:99:e6:11:7f:1e:24: bb:ff:88:d7:27:a9:51:e4:ec:90:57:27:56:69:25:c5: 3d:73:93:67:35:cc:df:f8:b6:8a:43:b6:76:db:48:a3: 95:25:fd:86:d2:b0:b0:b3:46:37:04:d5:0e:35:6c:9c: 3d:e6:1f:aa:82:e7:2f:0b:58:18:88:c6:a2:5a:fb:77: 23:46:fd:fe:11:11:41:fb:f8:41:5b:80:75:92:a4:8b: fe:36:b9:ff:a0:76:ff:39:b0:6e:bb:c3:1e:c3:52:38: e6:0f:c1:5a:b7:1f:47:02:89:09:c5:6b:62:27:ce:fb: ed:c3:0b:d3:c9:54:df:1c:81:ce:d4:5b:c7:91:f1:06: ba:7f:bb:11:cf:25:1e:da:7d:a4:f1:4f:de:ad:32:1c: 10:08:f6:8e:55:af:6b:90:db:82:8b:3f:d0:7f:e9:6d: a4:58:7f:8a:32:c3:e5:51:6b:40:5a:c9:d0:03:27:ab: bb:ac:3e:41:78:0a:0d:d0:3d:1b:59:9b:bc:14:01:ac: cb:3b:59:c0:00:54:a9:44:76:06:16:2e:02:d3:f2:9f: cd:1f:cc:02:cd:21:18:91:5a:b6:d8:ad:43:6d:0a:8f Fingerprint (SHA-256): 1D:06:8C:7B:D3:4A:B3:29:4A:A1:42:C6:F2:F6:80:89:32:EA:31:E5:B0:79:15:6A:70:19:51:27:9A:0F:35:0A Fingerprint (SHA1): 61:86:F5:23:B3:6D:E0:7D:86:B1:DA:7F:78:D5:70:88:2F:8D:02:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:04:fc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 16:30:23 2023 Not After : Thu Jan 18 16:30:23 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ae:b0:2f:87:d2:ed:ae:c7:6e:b0:14:60:da:48:91: bd:d7:79:f2:60:33:4e:f8:3b:f7:d6:ec:cf:ea:a9:5d: 2b:56:1a:08:3c:b7:29:0d:b1:0d:de:92:a5:51:89:03: 3b:87:f8:35:70:e2:91:8e:a1:ff:b3:24:1c:3f:bc:78: 7d:ac:0b:0e:7d:97:be:47:0f:11:8c:51:e3:f6:39:83: 78:cd:e0:78:f1:58:3f:ff:5b:53:99:91:50:e9:2e:cd: a4:f1:58:15:4d:e0:6f:4c:d8:78:3a:07:3d:bf:35:5b: 60:e1:e7:47:21:8f:be:b8:3b:6b:8d:c9:10:dc:f3:ed: a8:ed:8d:a6:43:e7:79:4b:35:0a:a2:1c:77:de:7e:e7: a3:ac:c4:d9:f7:13:2d:71:cc:3f:87:57:e8:1e:f3:53: af:76:d2:4b:05:7e:17:88:44:55:ce:2a:e2:09:8d:94: 0a:6f:32:17:92:c5:e3:85:7c:2f:51:8b:4d:2e:6c:af: 05:57:4c:4e:15:c9:12:4c:8e:1b:41:e8:49:57:65:82: 22:72:bf:d9:83:a8:1d:54:5c:f6:e6:99:6c:9e:9a:af: 49:58:ec:ec:e0:69:33:b2:ad:90:d5:7b:79:92:13:52: 44:92:e1:2b:22:9e:cb:24:88:71:ff:78:2f:ac:b1:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:e8:0a:76:db:75:4c:24:1f:11:da:1f:68:6c:c7:2d: 92:3f:6a:e0:61:40:8e:db:ab:f8:b1:6a:06:1f:60:a3: 30:af:82:29:24:f1:d6:d2:1d:fd:07:0c:23:9c:4e:30: a6:9a:ca:e4:8f:61:9c:a8:4b:6e:75:fb:15:2a:fb:4b: 3f:cc:66:ae:cf:8a:d6:07:d5:bc:5d:1e:63:df:eb:b9: 4f:36:64:31:71:fc:c4:73:f3:86:cc:ee:04:a3:ac:4b: a0:b3:e3:5d:6a:db:e7:ad:6b:6f:71:01:d0:7a:34:6b: c9:3d:72:b3:1d:24:95:b2:82:fb:d9:d7:72:ee:c6:da: d5:5a:6b:37:fe:79:72:30:61:15:85:2b:4c:37:f7:82: d3:47:a3:bd:f7:9d:61:48:66:58:d7:42:a0:d5:e7:1d: 62:14:17:28:fe:83:63:a6:e3:60:89:5f:ea:15:62:38: e7:28:61:05:17:13:d3:00:aa:5b:be:d7:27:9d:b1:5c: d7:6a:f7:c3:90:6f:15:d3:bb:ff:0f:ea:0b:55:c6:fe: 5c:ba:2d:2b:17:e7:ac:3e:c6:01:09:0d:fd:1f:8e:83: 89:7c:b1:54:bd:20:a8:78:f1:16:c2:4c:df:70:53:5c: 1d:52:c9:ce:3a:15:af:2e:32:e0:9f:05:c9:e4:ac:47 Fingerprint (SHA-256): 34:7E:C5:DF:D2:E9:54:A6:16:E4:BA:95:3C:A1:CE:4D:75:AD:7A:AB:0F:FB:DB:99:51:BD:7E:36:C1:34:C6:67 Fingerprint (SHA1): 6D:75:75:30:9B:E7:52:B7:22:33:ED:DC:A0:90:02:3D:E5:A8:C0:FE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:05:04 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 16:30:27 2023 Not After : Thu Jan 18 16:30:27 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:90:4a:cf:a7:7d:d5:dc:0c:79:9d:61:06:94:9a:31: 05:11:1b:d5:9b:1f:51:f1:f0:4a:18:99:3a:85:f0:c9: 1f:99:18:32:c9:dc:a2:54:4f:2c:75:a0:12:39:ee:65: 6b:e5:54:20:19:a9:e7:dd:9f:80:21:d3:ec:f0:a9:5e: b3:14:b7:2b:ac:e6:04:ba:0e:93:ac:e3:8b:08:5b:4e: 0f:7e:76:cf:e2:bc:a3:2d:c6:88:9d:8c:fd:9c:61:7f: 9e:33:ab:29:ef:e9:0c:50:eb:2e:d3:cc:b9:4f:0c:9c: 96:79:f1:e3:3c:e1:f2:c8:83:2b:ad:58:77:4d:f4:c4: 83:2d:e7:cb:ec:0d:22:fe:27:6b:fa:59:ff:74:af:91: 0b:93:5b:37:d4:25:e5:83:06:49:af:d0:0b:46:31:a7: e7:d7:35:59:ec:3a:4c:12:48:fd:f9:d8:7b:80:3c:3b: f4:78:7c:9e:7d:9b:1f:e9:2f:35:e7:57:ee:6a:5e:d8: 25:3f:7b:8a:9b:d7:44:ea:7f:b2:b3:e8:dd:16:7e:82: 25:90:37:c0:f9:c4:8b:0c:69:55:49:e2:dc:7f:fc:f9: 14:0a:d2:e2:e9:2f:0c:75:76:15:d7:61:30:6d:8d:a1: 96:8b:1d:cb:dd:49:64:f6:4f:8b:1e:62:56:fe:67:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:aa:aa:56:eb:65:e5:85:69:46:42:56:3c:75:c2:ae: ee:72:11:ab:35:91:34:c1:8f:e0:e0:b7:77:91:ef:f9: 59:66:e5:5b:c1:8e:7b:1e:9b:19:05:7f:85:8b:f7:cb: e2:98:0e:36:00:c5:f8:1a:ff:d5:19:a7:d4:fe:b1:48: 43:7e:af:2a:e4:72:7d:6d:d7:03:32:0f:00:87:5c:77: 19:fa:dc:dc:88:aa:05:58:51:b2:51:55:57:f9:6d:9b: af:73:df:67:d8:54:a7:de:20:c6:dc:37:99:f0:9c:56: b1:1e:ff:93:e5:2e:fc:e2:79:f5:dc:fc:02:2c:41:6a: 39:52:8f:82:85:24:71:57:59:c9:3f:8b:cb:72:69:8b: ac:62:97:ac:f2:f2:e1:e1:b5:6f:53:48:f8:52:87:57: ba:ec:cc:1d:6a:75:eb:13:70:08:d6:7f:4e:67:6b:09: d2:80:f0:79:85:3d:00:45:b7:ee:6b:b4:27:15:66:42: 80:da:8d:d0:5f:2b:2e:d9:45:a0:f4:7d:8f:9d:f3:e4: 96:ba:fd:f4:43:4b:67:e4:e0:2d:5b:0f:c2:79:dd:a6: 0f:f8:3f:b4:35:b4:a9:80:63:8e:4a:fe:b6:1c:48:c0: 87:82:64:03:3f:7c:ca:27:7a:39:05:42:8e:07:0d:0e Fingerprint (SHA-256): 5D:A1:CA:AA:26:4D:03:C7:B3:D0:84:8C:B3:4B:ED:75:0A:51:2F:8F:30:5C:44:E2:F3:6B:15:0C:F3:59:D0:1F Fingerprint (SHA1): D9:FD:27:B1:A1:CD:42:A9:91:3D:4D:03:71:71:D5:68:AF:5A:82:1F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:05:11 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 16:30:34 2023 Not After : Thu Jan 18 16:30:34 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:d6:f9:b9:60:09:dc:d9:06:6c:47:c9:5a:cc:1e:94: f0:f4:34:f2:e1:a5:67:ed:c6:f2:cb:e0:ae:94:6f:fd: 25:41:3a:b2:99:bb:af:01:65:80:93:8d:3c:33:dc:4b: b6:84:d9:34:24:2a:3d:ea:75:0a:1b:8e:8d:47:86:b2: 3c:bf:3e:2c:52:76:37:8e:7e:da:b3:f8:f3:12:62:56: 81:ef:4d:e3:fd:29:95:ed:0f:c1:88:2f:94:40:58:89: 98:ef:39:b1:62:b3:74:9c:0e:f1:ae:15:7f:9c:62:57: 39:05:98:53:e8:89:f0:f8:fe:27:1c:8f:f7:da:87:5a: 87:2a:e8:1a:96:b2:fb:9c:b7:63:c1:5d:70:08:a1:e8: 25:e9:c8:40:6f:5d:28:f2:ed:28:67:fb:34:67:9f:24: 33:be:3a:aa:55:88:41:e4:b5:ce:38:19:89:6f:90:41: fd:97:72:4c:42:24:57:61:6e:ae:92:d7:89:e9:c2:a0: 2c:77:27:af:b7:7c:17:62:c6:03:1f:17:98:30:bc:9e: ac:9e:3d:65:b8:a6:c1:96:98:f8:4c:7c:e9:34:0f:6a: 41:34:dd:22:3b:66:ee:9a:f5:cf:0d:50:ef:28:89:f2: 9a:e7:f1:4c:1b:00:be:cf:a1:51:34:ae:60:ee:f8:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:c0:e7:db:0f:4a:59:29:c1:c6:ea:a1:db:18:0d:4c: e6:9d:2f:64:8e:93:6f:9b:c5:75:cf:ae:f3:79:eb:13: 33:a7:00:30:32:18:d5:8e:d5:a3:a4:88:f1:ab:0a:9b: 79:c1:d8:6a:3d:b3:f5:b8:dd:f1:0e:c1:6b:f7:b8:cf: 71:bc:fb:6e:01:c4:50:96:03:75:1b:f8:52:45:96:87: 00:54:7b:4e:be:af:92:14:af:4d:5c:40:e2:ce:04:a2: ec:15:26:52:d9:97:a2:72:32:df:31:8f:40:55:8f:f2: 20:bc:24:a5:b4:df:62:b0:f4:e4:65:c5:f6:39:87:d1: 55:2b:d9:c7:41:d3:e3:d2:4a:df:ad:6a:9b:71:1e:a4: 30:c1:c8:90:cb:13:c0:2c:42:8f:38:9f:8e:b8:a1:18: 7f:e9:69:c9:b6:03:53:2f:73:05:0d:cb:8b:42:55:28: 7c:6a:63:44:55:e7:eb:6f:40:14:f7:fa:45:3f:3d:df: 2c:01:fb:a6:f3:02:47:71:76:d5:10:56:72:9c:ef:ca: ef:d1:3e:87:4d:0a:a7:d7:ee:89:a8:e6:dd:0e:49:37: 2b:4c:5c:4f:68:05:e7:d8:46:ba:10:f8:46:6c:12:d4: eb:e1:48:e3:97:01:9b:bb:d0:a1:38:d1:87:0b:ae:1f Fingerprint (SHA-256): 46:01:EC:47:A1:27:44:E1:C3:AA:80:D0:43:81:A8:DF:20:10:9F:1C:F0:74:F5:F5:58:DE:46:D6:35:DA:40:86 Fingerprint (SHA1): 56:91:13:16:6C:0C:AF:76:81:33:6E:9C:3B:1F:07:21:46:DF:0F:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 0f849e8b68304ca95f9a2bbfdd24d305998d6b34 NSS Certificate DB:localhost.localdomain < 1> dsa e062a35e6ad1a00776b91d5effb142f0f6a32098 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa 0d0e1b5427a5c987378bad2e013f5ed5e4a841dd NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 968d311ce9dc2a60a69209cca8e17fa71538f7d0 NSS Certificate DB:localhost.localdomain-ec < 4> ec 08c8365fef5c90a07879dc01c865052d84f4c880 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa 6c5156598c73b212333167a119a505d8f9ec652e NSS Certificate DB:localhost-sni.localdomain < 7> dsa 9de8ad1234c31908181012aa45fbdad78d5b7f20 NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 31ef309e5bc04e4f0ca0104f00eabbe62522d0c2 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec 94dd18750981920a40fc119f061f45bfada79807 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 2c9023fd997f6333e5424d1e94267a3ac2640aae NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa f804e28930bf4282b519d61b13024184d74ad065 (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #722: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #723: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 16:33:44 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed Oct 18 16:33:44 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1227 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1426 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 583 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 244736 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 152576 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 623 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 728 Oct 18 16:33 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:19 2023 Not After : Wed Oct 18 16:29:19 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:3b:87:78:d9:dd:28:6a:9c:8d:b3:53:f7:c6:9b:a2: 2e:ae:84:e7:a7:ab:27:2d:cb:74:e5:f4:24:b6:00:a2: b9:d2:c0:3b:58:6e:7c:d6:56:28:72:fa:3b:15:4e:fb: f3:46:ab:55:c4:3d:68:61:c4:0e:c2:2b:d5:f6:6b:80: d7:2f:4e:4c:29:d2:31:8d:be:f1:78:4a:9a:7e:3d:e3: ca:56:ac:ee:05:19:6c:5a:a0:95:62:52:4f:ac:84:95: 37:3a:ea:b1:76:50:78:2b:60:db:63:43:30:0b:d6:cf: c7:04:85:a1:73:14:7d:1e:f8:d4:e8:6e:bf:12:b9:2b: a3:c9:d1:33:0e:36:11:0e:ef:cb:53:39:15:7e:a6:00: 35:ee:de:21:15:8e:63:2b:e9:42:25:5c:fd:c9:3b:f5: d5:b7:5c:97:94:c1:a8:fe:b0:5c:1f:fc:f0:d7:45:b7: 5b:d5:ab:46:59:25:38:9d:51:9d:e3:7e:7e:2c:ab:dc: c2:42:79:31:58:e0:cf:08:4a:77:ad:90:4e:7e:65:ab: aa:54:53:c7:62:9a:37:5d:7a:32:64:b4:c4:cf:3b:e8: 11:2e:01:8d:f9:d5:53:4b:8c:d8:34:e8:72:fc:76:6d: 75:76:c5:15:d2:7b:e1:1f:56:ef:82:d1:06:da:bb:b9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:47:88:a8:ac:e1:80:6f:ab:83:00:66:18:a6:5e:5c: 1e:7f:7d:57:02:4c:c2:75:14:3e:74:c5:f2:2f:f3:bf: 08:de:1e:65:4f:0a:06:50:7a:b6:3b:35:df:b6:a2:6f: 56:70:f4:e0:59:f7:a8:06:5f:b2:47:00:08:ee:67:5a: 9c:0c:6e:4f:fb:85:ae:42:ca:db:74:4d:46:8f:30:e8: 2f:fc:86:6c:ee:c0:5f:16:6c:aa:9d:b9:72:d4:9b:35: de:a3:c2:0c:6b:14:71:cf:48:fa:7e:63:e2:9e:66:fa: ec:a9:e4:1d:68:8c:c0:e3:7c:71:d9:41:9b:05:a2:cd: 54:d1:6e:d4:95:dc:f6:6a:f6:d9:4b:fb:7f:85:25:ee: 5d:33:7d:67:31:14:5a:f0:5e:e7:fc:bc:3c:11:59:e0: 8c:4e:1d:ea:7c:fa:12:1f:4e:67:f4:c3:b7:6b:7d:15: 84:90:51:ce:59:59:f8:c6:4c:f6:92:45:04:dd:e5:b8: d1:c0:f7:60:2b:78:3f:d1:46:58:cd:8e:a6:fd:d6:7a: 22:3d:db:c9:27:92:f9:7e:1c:d9:06:53:fb:85:ee:b1: 4c:c0:b2:b0:2c:31:29:fd:1e:da:a2:11:e9:9c:54:86: c5:28:70:1c:9d:72:b2:2d:ed:31:7e:38:df:19:f1:dd Fingerprint (SHA-256): 7A:21:26:55:1D:6B:C7:4A:82:48:AE:A2:A0:DE:8C:40:E6:6F:AA:7D:0B:55:E5:24:1C:B6:40:AB:70:26:94:44 Fingerprint (SHA1): 16:2D:A1:78:E4:48:57:CE:06:10:DA:90:B9:F0:DE:D5:CF:D9:63:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { d0, f3, a1, 49, 97, d4, c2, 5e, e3, 7b, 0f, 3c, 65, c4, 56, 97 82, 8f, 9f, cf, 16, ab, ab, 0d, e2, 75, 55, 96, 65, 49, ee, 02 7f, 3b, 6a, f7, e7, 72, c9, 4d, 6b, ae, be, 89, df, 26, fa, 30 58, e4, 7f, 72, 9d, bd, 9c, 37, fc, 1b, 80, fd, 1d, de, 29, 6f 50, 17, 2b, e8, 1c, 6c, 86, 8e, cc, b5, 53, 72, d7, 4f, e4, e7 c8, 38, 20, a0, ed, a4, eb, b9, 87, c5, 41, bb, b0, 24, c1, 46 ec, e6, 65, 3a, af, ae, 75, 0c, 57, ed, a9, 5a, 0e, 7a, e2, 78 81, c5, da, 78, c3, e1, 6d, e9, 7a, 61, a2, 50, 24, 1f, a4, 45}; privKey CKA_ID = [20 bytes] { fc, 85, 40, 62, 67, 38, 84, be, 21, 3d, 7f, 42, 42, 2e, d6, 7c ec, e4, be, f8}; pubKey CKA_ID = [20 bytes] { fc, 85, 40, 62, 67, 38, 84, be, 21, 3d, 7f, 42, 42, 2e, d6, 7c ec, e4, be, f8}; matching public key found pubValue = [128 bytes] { 03, 7f, 2d, e1, 95, 4a, 7c, ea, a9, 06, d5, ee, 00, f7, 18, fb 1c, 2d, ca, 21, 16, 3a, e9, d2, fa, c3, 03, 69, c3, b1, 74, 69 0e, 33, 62, 20, 5c, ad, 14, 88, 55, db, 9c, 67, 70, fa, 66, 72 5b, 45, 1a, c1, 13, 82, 01, 52, 87, 74, 5c, 4f, d6, c5, de, 1e d8, 55, 2a, d2, 84, da, d6, 78, d0, 28, d3, 77, e6, 57, c2, 80 5e, 6a, a3, c7, 86, 15, 1b, 78, a2, f0, 7d, c1, 91, b0, 71, 10 11, 13, ae, d3, 4a, ec, 7d, e8, a9, 0d, b3, 90, 74, 46, ba, af bf, d1, ab, 7e, cd, 7c, e1, 00, c0, ea, e8, 71, 90, bb, fe, e6}; privKey CKA_ID = [20 bytes] { ef, 08, f0, 1d, 50, ef, e1, 6b, e8, 0f, 67, 92, 18, e5, 38, d5 6c, 84, 1b, 5c}; pubKey CKA_ID = [20 bytes] { fc, 85, 40, 62, 67, 38, 84, be, 21, 3d, 7f, 42, 42, 2e, d6, 7c ec, e4, be, f8}; pubKey CKA_ID = [20 bytes] { ef, 08, f0, 1d, 50, ef, e1, 6b, e8, 0f, 67, 92, 18, e5, 38, d5 6c, 84, 1b, 5c}; matching public key found pubValue = [65 bytes] { 04, f4, 09, 6e, 3a, 0c, 21, 8b, 1d, 14, 55, 5a, a4, fd, 96, ac 88, a7, 69, f7, 15, 28, a1, a5, 7f, 30, b5, da, 45, e3, a1, 2e d1, 61, c7, 96, 92, b8, 5e, 28, 18, 28, 81, a1, c9, 22, 38, 91 0c, 96, fd, c1, 4e, 2e, 03, ee, 2a, c1, 39, aa, ea, 80, 03, 88 df}; privKey CKA_ID = [20 bytes] { cd, bb, 8a, 20, 7e, c8, 09, f2, 5a, d6, 9f, 4b, 05, 34, 8b, fa 55, 1c, 9a, 44}; pubKey CKA_ID = [20 bytes] { fc, 85, 40, 62, 67, 38, 84, be, 21, 3d, 7f, 42, 42, 2e, d6, 7c ec, e4, be, f8}; pubKey CKA_ID = [20 bytes] { ef, 08, f0, 1d, 50, ef, e1, 6b, e8, 0f, 67, 92, 18, e5, 38, d5 6c, 84, 1b, 5c}; pubKey CKA_ID = [20 bytes] { cd, bb, 8a, 20, 7e, c8, 09, f2, 5a, d6, 9f, 4b, 05, 34, 8b, fa 55, 1c, 9a, 44}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa fc854062673884be213d7f42422ed67cece4bef8 testKey < 1> dsa ef08f01d50efe16be80f679218e538d56c841b5c testKey < 2> ec cdbb8a207ec809f25ad69f4b05348bfa551c9a44 testKey --------------------------------------------------------------- | testing if key corruption is detected in attribute 120 --------------------------------------------------------------- amending sig_key_3462ee50_00000120 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205EFC1A5F178FB2CC217C9C90BB909953C93C30B336AFCC717A3D889D81B1F9C902022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C43E8B506F227287D0D4944245D326C8E112081F4D210F05B3EA2CF1BA9CEFC3 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205EFC1A5F178FB2CC217C9C90BB909953C93C30B336AFCC717A3D889D81B1F9C902022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C43E8B506F227287D0D4944245D326C8E112081F4D210F05B3EA2CF1BA9CEFC4 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert fc854062673884be213d7f42422ed67cece4bef8: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #17: Corrupted key attribute 120 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 122 --------------------------------------------------------------- amending sig_key_3462ee50_00000122 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205DE57B9DD5E9431923CAB0D5A096AA56D10282295A34D98832DEB18CD716220002022710020120300A06082A864886F70D0209300A06082A864886F70D0209042002D9D6E9FAA5567468F355014AF93F857AC3F166E0A0EEA058463C7FCB26FCD1 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504205DE57B9DD5E9431923CAB0D5A096AA56D10282295A34D98832DEB18CD716220002022710020120300A06082A864886F70D0209300A06082A864886F70D0209042002D9D6E9FAA5567468F355014AF93F857AC3F166E0A0EEA058463C7FCB26FCD2 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert fc854062673884be213d7f42422ed67cece4bef8: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #18: Corrupted key attribute 122 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 123 --------------------------------------------------------------- amending sig_key_3462ee50_00000123 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420CD96FA7E0F6EF6A605BB594B0DAA8FBAA1EA4B4F7CC7DEC1F71483E9477A412D02022710020120300A06082A864886F70D0209300A06082A864886F70D0209042040F2A9D2599745F21026A50CE163C8E5B47E0969C5CAC313FA408C7A68F2B049 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420CD96FA7E0F6EF6A605BB594B0DAA8FBAA1EA4B4F7CC7DEC1F71483E9477A412D02022710020120300A06082A864886F70D0209300A06082A864886F70D0209042040F2A9D2599745F21026A50CE163C8E5B47E0969C5CAC313FA408C7A68F2B04a /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #19: Corrupted key attribute 123 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 124 --------------------------------------------------------------- amending sig_key_3462ee50_00000124 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504209CA7E999B896B42519113BD480E748261498E83185B6F94B7D5D29FE085F311602022710020120300A06082A864886F70D0209300A06082A864886F70D020904209DED3B90E70837ECCF66C1917646B844A57327CD5A422F50B30A592058BA5C78 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504209CA7E999B896B42519113BD480E748261498E83185B6F94B7D5D29FE085F311602022710020120300A06082A864886F70D0209300A06082A864886F70D020904209DED3B90E70837ECCF66C1917646B844A57327CD5A422F50B30A592058BA5C79 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #20: Corrupted key attribute 124 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 125 --------------------------------------------------------------- amending sig_key_3462ee50_00000125 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420352574E6FAEF01A53176253D2ABFA1177C1BEB1B79C7404FF57C1BD2B56E064702022710020120300A06082A864886F70D0209300A06082A864886F70D0209042039BC356A95B307CD62A64B968894A08EC710B66C25A781D01F0785DD3C9D8117 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420352574E6FAEF01A53176253D2ABFA1177C1BEB1B79C7404FF57C1BD2B56E064702022710020120300A06082A864886F70D0209300A06082A864886F70D0209042039BC356A95B307CD62A64B968894A08EC710B66C25A781D01F0785DD3C9D8118 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #21: Corrupted key attribute 125 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 126 --------------------------------------------------------------- amending sig_key_3462ee50_00000126 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420C1C29E7F79504967DB36BB0D19036A1993360D409F43F8EB571276FDCB9B31F102022710020120300A06082A864886F70D0209300A06082A864886F70D020904205CE737F623F51F62D7DD6588B3056B63D18AA99BB068CD6AFB79BAFF8057878B to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420C1C29E7F79504967DB36BB0D19036A1993360D409F43F8EB571276FDCB9B31F102022710020120300A06082A864886F70D0209300A06082A864886F70D020904205CE737F623F51F62D7DD6588B3056B63D18AA99BB068CD6AFB79BAFF8057878C /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #22: Corrupted key attribute 126 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 127 --------------------------------------------------------------- amending sig_key_3462ee50_00000127 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420AE1E950CCA22976E358B36E3382212E1153BFB7FF559D94BBD95042BCA2913BB02022710020120300A06082A864886F70D0209300A06082A864886F70D020904204A61C340A45C397F41DED092EEA5D39058FA88CCB21EC39EED91A918B67D2E0A to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420AE1E950CCA22976E358B36E3382212E1153BFB7FF559D94BBD95042BCA2913BB02022710020120300A06082A864886F70D0209300A06082A864886F70D020904204A61C340A45C397F41DED092EEA5D39058FA88CCB21EC39EED91A918B67D2E0B /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #23: Corrupted key attribute 127 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 128 --------------------------------------------------------------- amending sig_key_3462ee50_00000128 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042071BF7A99474918524DB986DEC8DFFF47B1D62DADA126D932C890E24C4CDA9A4402022710020120300A06082A864886F70D0209300A06082A864886F70D020904201B98DD6A1A167F5921C9EBADC3AE912B443DF58EF766879FD76B1D586002E912 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042071BF7A99474918524DB986DEC8DFFF47B1D62DADA126D932C890E24C4CDA9A4402022710020120300A06082A864886F70D0209300A06082A864886F70D020904201B98DD6A1A167F5921C9EBADC3AE912B443DF58EF766879FD76B1D586002E913 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k fc854062673884be213d7f42422ed67cece4bef8 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #24: Corrupted key attribute 128 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 011 --------------------------------------------------------------- amending sig_key_3462ee52_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A6EF11179D55680C464F38811D962D0AF12BC9BC9D447FC6699269729B2EEC6102022710020120300A06082A864886F70D0209300A06082A864886F70D02090420732DD85962A8131A463964E7C6050EE9093DAB49A09C064DF9CBA4F8C61D7822 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420A6EF11179D55680C464F38811D962D0AF12BC9BC9D447FC6699269729B2EEC6102022710020120300A06082A864886F70D0209300A06082A864886F70D02090420732DD85962A8131A463964E7C6050EE9093DAB49A09C064DF9CBA4F8C61D7823 amending sig_key_3462ee54_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420599001EA84119EE4B21ED2B6ABDA099128048E2687DD4E65043B0C119140FE3802022710020120300A06082A864886F70D0209300A06082A864886F70D020904209B5DC3FEE1B5068B3FAB5C22BA5983844839336D48CC7AC637968DD8A4DFFB58 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420599001EA84119EE4B21ED2B6ABDA099128048E2687DD4E65043B0C119140FE3802022710020120300A06082A864886F70D0209300A06082A864886F70D020904209B5DC3FEE1B5068B3FAB5C22BA5983844839336D48CC7AC637968DD8A4DFFB59 /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k cdbb8a207ec809f25ad69f4b05348bfa551c9a44 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_NO_MEMORY: security library: memory allocation failure. dbtests.sh: #25: Corrupted key attribute 011 correctly disabled key - PASSED --------------------------------------------------------------- | testing for thread starvation while creating keys --------------------------------------------------------------- creating 30 threads - thread 0 starting - thread 1 starting - thread 2 starting - thread 3 starting - thread 4 starting - thread 5 starting - thread 6 starting - thread 7 starting waiting on 30 threads - thread 8 starting - thread 11 starting - thread 9 starting - thread 10 starting - thread 14 starting - thread 15 starting - thread 13 starting - thread 21 starting - thread 12 starting - thread 17 starting - thread 25 starting - thread 18 starting - thread 26 starting - thread 19 starting - thread 27 starting - thread 20 starting - thread 28 starting - thread 29 starting - thread 22 starting - thread 16 starting - thread 23 starting - thread 24 starting * thread 21 ending with 0 failures * thread 19 ending with 0 failures * thread 23 ending with 0 failures * thread 4 ending with 0 failures * thread 3 ending with 0 failures * thread 20 ending with 0 failures * thread 12 ending with 0 failures * thread 6 ending with 0 failures * thread 2 ending with 0 failures * thread 16 ending with 0 failures * thread 22 ending with 0 failures * thread 9 ending with 0 failures * thread 10 ending with 0 failures * thread 1 ending with 0 failures * thread 24 ending with 0 failures * thread 13 ending with 0 failures * thread 17 ending with 0 failures * thread 5 ending with 0 failures * thread 15 ending with 0 failures * thread 14 ending with 0 failures * thread 0 ending with 0 failures * thread 29 ending with 0 failures * thread 28 ending with 0 failures * thread 11 ending with 0 failures * thread 25 ending with 0 failures * thread 26 ending with 0 failures * thread 8 ending with 0 failures * thread 27 ending with 0 failures * thread 18 ending with 0 failures * thread 7 ending with 0 failures 0 failures and 0 errors found dbtests.sh: #26: Successfully completed 7 loops in 30 threads without failure. - PASSED time certutil -K -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bigdir -f ../tests.pw ------------- time ---------------------- real 3.22 user 2.88 sys 0.30 3 seconds dbtests.sh: #27: certutil dump keys with explicit default trust flags - PASSED TIMESTAMP dbtests END: Wed Oct 18 16:36:32 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 16:36:32 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:80:d7:a4:13:2c:f0:05:3e:ec:5b:a7:1a:3e:5b:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:74:77:11:56:b8:5a:22:23:30:9e:73:5d:8a:1e:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 16:27:52 2023 Not After : Wed Oct 18 16:27:52 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:db:3c:1e:a4:63:e5:be:fa:38:59:98:a4:30:46: 95:04:3f:f5:bb:0a:66:3b:9f:81:75:f9:2b:d3:96:55: bb:04:67:22:ac:ab:5c:fd:32:e3:43:b1:ab:9c:f2:83: dc:b6:e3:fe:30:9b:5d:cf:b1:09:61:20:c5:b2:35:9d: e4:9f:e5:00:8d:a8:c8:ec:37:79:96:d2:74:e1:c4:db: da:d7:cb:fe:4a:a7:c4:d1:4b:6a:e8:7c:9a:16:14:d3: 31:95:c2:66:fb:79:46:de:d0:93:2d:04:09:a6:a4:8a: c2:c8:65:ec:cd:ab:13:69:a3:d9:f9:9b:fe:1b:b2:65: 16:74:6e:8f:78 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:a6:e6:a0:92:60:fe:32:1d:cd:9b: 6f:58:7c:5b:a8:5d:e2:20:d0:2d:36:66:40:8e:0a:5d: 5e:a6:77:d9:0a:d3:e6:d5:73:68:30:d7:8b:df:12:10: 37:51:01:7f:57:74:ab:7c:3d:f2:fd:50:7e:96:d3:6f: 09:38:df:73:a1:29:b3:02:42:01:d8:e0:6a:1a:37:05: fa:ae:dc:19:92:5f:f1:82:28:90:68:a7:c1:5d:ac:fd: ee:5e:b8:f0:af:82:5a:35:fd:53:27:b1:b0:eb:23:3e: 14:85:8c:ad:9b:ea:af:35:7d:a5:fa:dd:cd:56:81:44: ab:07:f8:1e:92:8d:e2:99:e2:0e:4d Fingerprint (SHA-256): BB:66:8C:2E:6F:57:BB:BA:69:18:BE:BF:36:32:94:73:E8:22:E6:7D:54:5E:DE:B9:D6:70:FA:A4:EF:4C:E0:34 Fingerprint (SHA1): 99:AF:59:3D:6D:3D:F9:AD:FA:AF:4B:0D:9C:CF:44:42:A5:45:B9:89 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 16:29:12 2023 Not After : Wed Oct 18 16:29:12 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:c2:4e:1c:79:5c:df:cd:92:7b:74:67:6e:0c:bf:54: a2:5f:27:be:f6:cc:eb:b1:fd:7c:ea:45:04:98:0c:49: 9c:67:97:e7:c6:52:9f:05:b2:e2:75:4e:8d:05:f9:03: 4c:0f:28:bb:41:4b:cd:27:95:f1:eb:22:d5:b0:a5:09: 34:28:5d:97:10:2c:ae:59:10:ba:05:83:29:fa:d3:35: ce:7c:19:64:b9:51:9c:51:ec:05:84:02:78:f0:b7:94: 58 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:df:07:80:f9:40:20:bf:1c:2d:5e: a5:61:a6:ff:e3:07:56:1a:3f:cf:51:66:66:c5:ca:e8: 9a:5d:0f:fd:1e:87:0c:ac:1b:7d:e6:0f:37:2f:4d:71: 8c:37:e9:43:23:2d:96:70:92:f2:03:7f:e8:9c:59:f5: 62:b2:d1:cd:a9:f3:af:02:42:00:e1:1c:2f:8c:d2:17: c0:e6:fc:e5:54:d8:96:fc:67:2c:13:ba:ff:fd:e3:4a: d9:8e:46:5a:ce:24:77:b2:96:6f:82:fa:00:89:57:c7: 7e:99:ee:88:8a:21:73:a5:4d:89:37:4d:90:61:4b:35: e4:9a:e7:04:96:fb:47:a0:09:b7:42 Fingerprint (SHA-256): 0A:E2:0E:4C:D1:9E:7C:13:CD:D4:CE:FC:52:90:E3:A0:0C:79:61:82:B0:5E:44:9B:60:EB:16:CD:4A:44:2C:90 Fingerprint (SHA1): 7C:EB:C7:34:F2:70:8B:BF:C9:8C:E4:88:6E:A0:6E:EE:EF:08:54:F7 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:26:06:f8:e5:36:36:f4:b2:6d:22:6a:f0:4b:54:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 16:27:52 2023 Not After : Wed Oct 18 16:27:52 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:db:3c:1e:a4:63:e5:be:fa:38:59:98:a4:30:46: 95:04:3f:f5:bb:0a:66:3b:9f:81:75:f9:2b:d3:96:55: bb:04:67:22:ac:ab:5c:fd:32:e3:43:b1:ab:9c:f2:83: dc:b6:e3:fe:30:9b:5d:cf:b1:09:61:20:c5:b2:35:9d: e4:9f:e5:00:8d:a8:c8:ec:37:79:96:d2:74:e1:c4:db: da:d7:cb:fe:4a:a7:c4:d1:4b:6a:e8:7c:9a:16:14:d3: 31:95:c2:66:fb:79:46:de:d0:93:2d:04:09:a6:a4:8a: c2:c8:65:ec:cd:ab:13:69:a3:d9:f9:9b:fe:1b:b2:65: 16:74:6e:8f:78 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:a6:e6:a0:92:60:fe:32:1d:cd:9b: 6f:58:7c:5b:a8:5d:e2:20:d0:2d:36:66:40:8e:0a:5d: 5e:a6:77:d9:0a:d3:e6:d5:73:68:30:d7:8b:df:12:10: 37:51:01:7f:57:74:ab:7c:3d:f2:fd:50:7e:96:d3:6f: 09:38:df:73:a1:29:b3:02:42:01:d8:e0:6a:1a:37:05: fa:ae:dc:19:92:5f:f1:82:28:90:68:a7:c1:5d:ac:fd: ee:5e:b8:f0:af:82:5a:35:fd:53:27:b1:b0:eb:23:3e: 14:85:8c:ad:9b:ea:af:35:7d:a5:fa:dd:cd:56:81:44: ab:07:f8:1e:92:8d:e2:99:e2:0e:4d Fingerprint (SHA-256): BB:66:8C:2E:6F:57:BB:BA:69:18:BE:BF:36:32:94:73:E8:22:E6:7D:54:5E:DE:B9:D6:70:FA:A4:EF:4C:E0:34 Fingerprint (SHA1): 99:AF:59:3D:6D:3D:F9:AD:FA:AF:4B:0D:9C:CF:44:42:A5:45:B9:89 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 16:29:12 2023 Not After : Wed Oct 18 16:29:12 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:c2:4e:1c:79:5c:df:cd:92:7b:74:67:6e:0c:bf:54: a2:5f:27:be:f6:cc:eb:b1:fd:7c:ea:45:04:98:0c:49: 9c:67:97:e7:c6:52:9f:05:b2:e2:75:4e:8d:05:f9:03: 4c:0f:28:bb:41:4b:cd:27:95:f1:eb:22:d5:b0:a5:09: 34:28:5d:97:10:2c:ae:59:10:ba:05:83:29:fa:d3:35: ce:7c:19:64:b9:51:9c:51:ec:05:84:02:78:f0:b7:94: 58 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:df:07:80:f9:40:20:bf:1c:2d:5e: a5:61:a6:ff:e3:07:56:1a:3f:cf:51:66:66:c5:ca:e8: 9a:5d:0f:fd:1e:87:0c:ac:1b:7d:e6:0f:37:2f:4d:71: 8c:37:e9:43:23:2d:96:70:92:f2:03:7f:e8:9c:59:f5: 62:b2:d1:cd:a9:f3:af:02:42:00:e1:1c:2f:8c:d2:17: c0:e6:fc:e5:54:d8:96:fc:67:2c:13:ba:ff:fd:e3:4a: d9:8e:46:5a:ce:24:77:b2:96:6f:82:fa:00:89:57:c7: 7e:99:ee:88:8a:21:73:a5:4d:89:37:4d:90:61:4b:35: e4:9a:e7:04:96:fb:47:a0:09:b7:42 Fingerprint (SHA-256): 0A:E2:0E:4C:D1:9E:7C:13:CD:D4:CE:FC:52:90:E3:A0:0C:79:61:82:B0:5E:44:9B:60:EB:16:CD:4A:44:2C:90 Fingerprint (SHA1): 7C:EB:C7:34:F2:70:8B:BF:C9:8C:E4:88:6E:A0:6E:EE:EF:08:54:F7 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 24:65:d9:25:12:ab:bb:4d:16:b2:36:5c:b3:69:72:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2a:46:4b:0a:1a:80:9e:68:9b:6a:07:ce:7c:9c:73:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f4:85:e0:9d:a5:87:83:c6:b4:c2:12:d9:58:ef:46:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: db:47:92:aa:eb:14:5c:a2:0c:5c:f1:7a:2d:0d:4d:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5e:bd:5e:95:5e:0d:1f:8a:5e:23:d2:b6:64:11:01:52 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9f:1e:16:17:f4:39:fa:bd:33:4c:ec:cb:1d:34: a9:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ec:1b:ac:de:54:fb:1d:f2:34:a8:49:88:ba:a8:5c:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:69:ee:53:15:97:29:e6:49:fd:31:8c:49:87:10:a4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b5:1c:ad:7f:81:6b:6c:35:64:ba:f2:d2:8a:91:dc:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: dd:76:47:cb:14:e5:77:03:0d:e8:f8:4e:15:21:0c:f3 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8c:4b:38:95:27:3b:e1:ac:b6:54:29:28:c2:11:e1:bc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 90:cd:d3:e5:d2:77:be:77:07:64:ff:0a:d9:38:76:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 95:d0:62:6f:77:fd:c3:69:21:ea:49:84:b6:72:b0:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 81:8d:a1:fd:e3:f7:cb:40:a8:dd:36:9b:96:6a:74:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 94:04:57:16:fb:1c:02:e9:cc:4b:66:3f:5c:80:0b:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:e5:a9:a1:07:ff:56:9b:67:4a:b9:2c:41:73:29:9c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e4:8d:a3:19:fc:c5:ab:fa:36:39:fa:c9:4f:0c: df:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 48:44:ab:9d:5e:fa:bc:bc:b6:87:cb:d8:33:12:61:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:3c:0b:1a:34:17:dc:b0:82:90:6e:5b:23:d3:0b:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 63:9b:6a:1a:ff:3b:34:64:23:9c:aa:5b:6f:7a:12:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: b0:1d:50:c5:e1:5c:b7:e1:de:0f:f5:4a:1d:3c:d9:e1 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 3e:e6:87:88:bc:7b:e4:03:ab:dc:51:59:0a:d9:87:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:64:4f:c1:a9:b7:e5:19:db:c4:ff:0c:50:0d:d9:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ee:e3:33:db:3a:76:85:b9:61:f1:d3:d3:bc:91:3b:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c6:65:6c:67:6b:69:97:12:a4:99:99:01:ba:c0:2f:23 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:34:93:72:e2:04:73:fd:5b:d6:cf:25:6c:0f:85: 24:98 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ad:d3:ba:44:a0:8c:e7:75:1c:5e:e1:24:38:f4:72:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:ce:d2:3a:48:3a:3f:20:cf:62:dd:cd:44:28:ac:74 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a2:80:23:55:b0:42:74:5c:a5:7e:de:c8:70:0c:a9:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5f:ba:04:9f:b0:ff:f7:1d:01:a5:ff:1d:78:e1:42:25 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c8:1d:8f:69:78:99:04:94:12:7e:bf:98:6e:aa:88:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 2e:76:ff:44:7b:d8:78:44:4e:26:39:3b:0f:6c:11:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 32:fe:9d:15:be:a7:c6:f6:10:c4:26:b9:58:f3:a6:a6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c7:8d:05:e4:35:b5:17:b6:ed:f4:a2:b5:40:92:60:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: d5:dc:83:10:17:69:36:0d:47:dc:5e:22:12:fa:bb:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: da:00:5a:f5:a6:3b:4d:f8:b0:84:1c:08:b8:99:11:f1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5b:d5:c5:ed:a4:fa:39:f3:1c:40:2e:60:0f:8b: ff:57 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 77:df:29:d4:b1:fd:aa:e9:d1:a7:37:a2:9a:3a:fa:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:56:7e:b2:9c:0b:fb:73:3b:f8:fb:68:e3:d3:a8:8c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 69:73:69:bb:d5:91:21:91:66:f9:e5:14:5a:25:0b:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 39:5e:bd:29:fe:b9:23:25:35:78:b0:6b:38:cb:5b:13 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: bf:63:59:5a:58:bb:6f:eb:1f:b2:d7:f2:28:c0:34:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 10:1b:fe:8d:6e:6e:52:d3:a1:e7:13:8f:fe:1d:7f:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 7c:01:bc:9e:ec:bb:50:10:3c:cc:ef:07:c7:3d:23:b4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: de:7e:13:b7:47:12:78:75:47:2e:56:24:5a:b4:f5:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: e6:a1:3a:7f:52:ea:b4:a4:d1:d8:42:7a:82:7b:02:10 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:13:66:d9:0d:3b:ab:95:0c:04:7f:95:d9:35:10:b6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c7:ed:80:17:74:51:89:c6:ba:5c:eb:8e:54:5f: c4:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 1d:ee:f5:36:f3:86:54:32:99:ce:ab:66:38:71:51:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 36:c2:08:f8:4c:6c:48:2e:ad:60:ad:a7:04:69:25:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 68:3d:c2:78:e9:b3:ba:3f:8a:18:6b:58:3a:6d:cd:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: eb:86:c0:ad:44:95:4e:53:10:fd:4a:59:91:72:12:7d Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 14:a0:16:4f:0f:8d:fa:9f:94:49:48:ba:75:44:ac:da Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 35:9f:a6:b6:90:70:e8:99:4f:e3:6d:3f:54:37:db:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:99:dc:17:d0:f0:cd:b4:22:e5:9a:28:a3:64:e7:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:a3:83:b8:9f:bc:be:0c:9a:2f:28:26:b1:d2:33:cb Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:30:35:45:4e:d1:da:15:44:30:6e:1c:27:2c:e8: bb:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:65:f1:f8:f0:07:99:c5:16:7b:b2:5c:61:f6:28:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 18:ad:68:94:2e:ee:f0:83:5c:09:ee:fd:b4:5b:56:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9b:1a:a7:54:d7:47:87:86:5f:90:26:75:66:90:26:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:b4:8d:a5:55:7b:d9:10:46:ec:4b:c8:69:f7:2c:05 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 76:73:de:96:56:11:b5:53:8e:d5:8d:6d:d4:86:11:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 99:f6:f6:d4:aa:0d:45:01:b6:b7:8f:64:2d:34:43:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c7:5b:35:e0:f1:12:ff:8c:37:cc:5a:c9:25:8a:09:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 96:03:43:cf:54:9c:c7:1e:d1:8b:5b:ea:33:69:dd:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8d:f6:99:c8:33:dd:94:42:41:16:30:a9:91:66:ec:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:48:85:65:39:45:07:3b:6b:24:b9:b2:83:c4:00:ba Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:74:b2:29:15:94:22:a6:97:ba:52:59:48:f2:a2: 5d:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 16:61:52:67:eb:f4:07:77:d5:95:94:58:de:0a:6d:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 43:c8:91:fd:59:6c:ba:30:73:96:fe:ba:88:23:92:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 36:3a:e2:31:27:84:fa:5f:48:d5:c0:b4:3e:10:6d:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a1:2b:2f:52:9a:dc:96:2f:b8:81:f4:83:57:93:dd:80 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: db:d5:a4:c3:42:6d:bf:5b:70:e9:06:be:87:bc:9c:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 76:cc:6a:3d:e9:31:59:eb:ae:3d:c6:21:64:f9:aa:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 84:a1:7f:3c:a9:e2:6a:33:1c:91:ef:7d:c4:43:30:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:1c:36:b6:cf:7a:1b:2e:a8:7b:70:ef:da:4f:74:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: b0:95:69:6f:80:cf:bc:12:cf:72:ad:5a:8b:28:a3:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:7e:95:de:f9:5f:ab:c0:d5:a7:02:c6:64:38:0a:3f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7a:b7:a3:df:95:23:7e:32:be:e8:93:23:e2:d9: b6:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 65:62:b7:09:9c:d9:d9:65:b4:dd:a7:6c:9b:ca:50:0e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 36:75:1f:38:8a:64:5c:fc:5a:9c:1d:45:56:a6:5f:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 87:7d:74:49:6e:e0:e0:b3:22:32:f6:93:f6:6c:98:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 07:56:b1:c0:4d:57:78:e8:d0:5e:4a:19:84:11:fb:45 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 95:24:5a:c4:71:75:ab:3e:9e:f4:fa:7e:65:f0:6b:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6e:51:ef:b5:58:a2:15:34:b4:b9:d4:76:da:71:d3:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 78:39:3f:dc:b8:84:37:eb:3f:2f:19:f8:64:96:f9:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4a:22:c2:cc:ee:5d:db:29:a1:27:5b:e4:09:1f:8e:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: da:79:83:63:92:80:44:5e:e6:42:64:9e:3a:3a:f3:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:8b:05:36:1f:0b:80:e9:20:74:97:86:59:f8:66:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:31:9c:03:ce:d3:2b:06:e0:29:d6:fe:69:c1:57: a7:be Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8b:52:ba:de:6f:21:57:ca:a9:5c:c3:17:05:48:27:b2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:f4:bc:12:78:b2:ed:29:cd:d4:3a:b1:de:17:7b:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e1:18:bd:9c:49:9e:40:e7:cb:33:50:9b:cc:00:48:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f7:9b:ca:9b:cf:b6:48:a1:46:d3:f3:d4:4b:2c:2a:7c Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 31:28:aa:06:96:4d:cf:65:b9:28:73:7b:bc:c8:ec:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 23:cb:42:53:50:08:67:28:64:fe:18:8a:fb:e2:9b:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:76:5d:01:dd:15:b7:42:dd:f0:25:22:e2:f0:0a:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:57:ec:f7:4f:dc:df:b1:d7:e6:9b:9a:4d:38:47:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:12:b8:47:91:48:7b:a3:fc:b2:57:07:f4:a1:59:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:a5:9e:d8:b7:f0:d2:17:db:42:41:fc:02:31:19:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e1:07:29:83:ae:21:6e:7c:d2:8f:0f:23:23:2b: f7:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:2a:ad:96:c2:67:79:b2:d1:a2:b4:cc:58:f0:08:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:68:a0:ef:d4:50:d9:eb:87:ea:7d:24:d9:3e:be:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 19:87:89:82:d6:a0:49:b7:e2:08:a1:b4:f7:42:db:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 28:4c:11:6b:52:1d:2e:1f:18:44:36:8c:b8:8b:fa:33 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:46:42:a2:73:a6:0d:b7:1f:5a:d7:2b:1e:7a:12:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9b:3c:50:8c:42:4f:cf:05:9f:a3:93:46:07:3e:4f:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:ff:d1:b8:b8:08:bc:85:06:6c:18:2f:7f:49:e2:15 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:fa:33:2f:b9:fb:08:c6:13:d1:13:89:97:f8:88: 2a:41 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:b8:01:c9:b7:5e:e3:31:f5:72:d2:ce:0f:73:41:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:1c:5a:c8:38:04:d7:ff:28:36:0a:97:8f:85:5f:10 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:da:8f:3f:57:e5:07:a6:41:65:df:03:6b:57:68: 25:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 01:0b:70:0f:63:a2:fd:24:1f:22:25:ad:5f:21:63:d4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:74:8d:64:56:26:10:78:79:07:20:a1:3c:b9:6a: 2d:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:21:2d:b4:8a:d1:10:2e:ce:bd:26:b6:59:2f:89:8a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:2a:d4:8f:37:ae:11:a6:be:ca:84:93:4c:96:6e: da:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:96:e0:b1:fa:91:1e:a1:07:7a:ae:c4:2c:01:44:30 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ef:3b:b3:0b:95:13:d5:5d:f1:0c:e2:4c:49:b5:a6:a5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:8c:7d:40:da:15:4f:16:27:79:f6:60:d8:ad:ec: 76:df Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:f5:9f:92:75:6f:90:b1:df:09:87:b5:80:b1:fe:5a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:12:55:20:a6:6b:b1:4d:1c:53:e3:09:b9:da:78: 4e:07 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:32:ae:45:06:8b:68:2f:d9:4e:95:19:71:09:6a:03 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:ac:01:14:5e:1a:08:67:aa:15:6c:2f:a7:93:d0: 45:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e9:84:a6:ee:70:bf:47:d2:7b:8e:d1:c1:ea:99:1f:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:fa:66:5b:bb:d2:ec:43:33:d9:38:7b:ee:c9:65:28 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:27:9a:1c:be:7d:64:bf:c2:2b:14:0e:4a:d0:72: 81:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:42:64:05:30:67:67:29:69:dd:73:2b:26:05:f0:3e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:9c:84:db:9b:04:80:1e:c1:60:ad:a9:0e:49:74:2d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6d:c8:8f:b0:07:5b:e6:82:21:86:32:ae:c8:76: fb:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ae:32:f7:8f:0a:d7:67:82:d8:27:6d:f7:ba:16:49:9f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f3:88:66:46:6a:e8:fc:8d:73:fc:1a:ac:2c:f3: 1d:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: dc:bd:9c:39:49:f4:99:dc:e5:e1:19:af:a3:a9:53:b2 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:4b:34:2e:ce:0c:6a:a2:96:19:39:ce:ea:67:a7: 80:61 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:37:db:cf:9a:a0:20:b3:4e:08:df:29:34:9a:53:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:01:a7:5a:3d:77:2e:7e:51:1b:88:f4:92:9d:c8:21 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:1a:c8:12:77:1b:ae:cb:0f:ca:01:e8:d0:02:9e: 54:1b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bc:9a:3c:2d:d8:f6:cf:86:7f:2f:05:b6:21:08:c5:75 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:ff:91:c0:a2:53:79:a1:53:15:c0:f8:9d:d5:a8: e1:5e tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6d:9d:11:d3:96:80:37:63:88:fb:c6:26:9c:2d:6e:8a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:db:c2:3d:e1:f2:6a:2c:d7:43:2b:09:4e:c1:65: b6:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9e:8f:82:b0:b0:a9:53:47:ee:d6:66:1f:9a:f3:78:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:b1:ce:d2:37:8e:be:69:62:1f:e8:ec:1a:24:f1:38 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:76:8e:fd:dc:2e:b1:aa:c1:1a:fa:7a:ed:b6:69: 44:29 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3f:a9:4f:2c:dd:f6:3e:77:af:37:33:71:68:23:e8:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d2:ce:ce:3f:d1:35:01:e8:9f:7a:9d:fd:76:97:7f:16 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:bf:7a:68:55:07:d0:4c:70:4a:f5:45:d1:6b:66: 0f:a6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:0e:d9:cf:fd:d5:c6:9e:23:f2:de:02:1e:f9:69:62 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:8f:8b:24:60:4e:79:d0:0a:ba:1b:4a:97:ea:e0:a2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:2d:45:ee:18:fa:77:d6:27:75:d2:ca:f3:28:ca: b3:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:5a:cd:44:34:1e:b4:d2:d0:a3:6a:2c:fc:43:83:e7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:ee:7c:9e:0c:5f:60:03:33:41:93:c8:2b:af:13: ae:20 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d5:31:65:66:02:4d:16:20:2e:bc:01:a6:41:84:52:ce Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:73:17:84:ca:8a:5a:db:74:8e:0a:ef:0a:9d:38: ce:0a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3b:63:5d:69:c7:3c:88:a7:ea:74:a6:30:50:01:00:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 23:89:8e:7c:4e:a4:d4:f4:f3:9d:87:6d:5b:06:9f:bc Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:47:96:27:ad:e0:6a:45:bd:c3:96:11:0b:5b:38: 21:f9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 87:b6:c1:79:65:34:8d:d2:3c:83:c4:ea:3f:47:56:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:28:e3:88:83:9e:0c:24:80:dd:38:59:1b:a2:7b:ec Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:6d:80:54:66:d8:18:c2:4a:83:1f:bb:97:4c:a7: f7:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:20:97:9d:03:d7:bd:84:dd:01:43:f7:8b:55:9b:c3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f4:9b:ac:72:84:2e:2a:fb:76:21:9b:64:18:95: b0:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:51:41:56:84:c2:0c:a0:09:5a:e2:a2:28:2b:ab:68 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:9b:6c:6c:1d:50:5c:46:40:c9:00:04:94:54:9c: dc:ab Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 34:38:1b:4c:3f:0c:e9:78:a3:1d:d9:29:cb:61:f9:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:7a:b1:05:44:dc:bf:db:ba:d1:9b:40:99:be:0e:50 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a2:23:b9:f9:4f:cf:c1:06:46:30:aa:f4:d8:0a: f1:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e8:86:9c:93:99:96:d7:49:e5:5c:f1:be:73:d1:e6:d1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:04:5e:30:97:27:fb:cd:fb:cc:28:68:da:b1:88: 2e:42 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f1:17:eb:df:35:7b:66:2a:05:be:32:34:57:58:51:a0 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:ac:89:75:df:60:3d:f4:b6:56:f7:8e:52:9f:da: 0a:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c2:b5:a6:2e:2b:ce:58:5d:00:cb:6f:1c:91:ea:06:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:a6:d3:06:06:96:5d:ed:d1:51:6b:00:49:e6:53:20 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:90:35:37:d9:ba:26:8f:c9:37:e8:47:29:24:00: 7b:a2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:e2:89:b1:46:64:b4:09:33:fd:4a:2c:2e:54:13:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:7c:f5:8e:f1:ff:ec:8e:86:62:e3:3a:1e:35:e9:4c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:9c:d8:ff:eb:9e:14:ea:ba:a1:11:2b:c6:a6:2f: eb:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e0:86:fa:dd:ce:e5:2c:73:45:0f:34:26:99:ad:10:33 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:85:27:55:f7:bd:55:a3:f5:aa:91:f0:57:d7:fd: 00:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:0b:ff:98:ce:61:71:53:f5:cd:c0:03:88:7e:98:a5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:43:9e:97:7f:50:0f:df:ac:e0:4d:86:71:d7:5c: 07:54 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:db:87:be:20:9a:79:0d:80:4e:af:52:0d:95:43:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 26:15:80:0a:a8:ca:60:27:94:6b:d6:94:d2:6d:2d:93 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:62:ea:f0:66:3a:5c:bf:04:77:9b:0c:99:43:dc: 4a:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 79:21:0f:86:27:09:c7:c4:2a:b7:b8:f5:6c:0f:ff:c1 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:8d:56:08:fe:cd:87:37:8e:70:94:32:9e:b5:c4: 1d:e1 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 58:ad:29:1e:10:e7:3a:55:9d:b8:32:c9:4c:99:1d:f3 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:2c:8a:83:c1:7a:dd:57:68:c3:51:87:55:1c:c6: 20:43 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b6:68:0e:8b:ba:ca:d5:1f:91:50:6f:92:7c:3e:12:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e9:7f:ad:07:81:4c:1c:30:65:35:80:13:32:ff:d7:7f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:93:e4:f3:26:2c:ab:cb:fd:81:ce:4d:9b:75:5b: 5b:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:89:7d:97:ea:5e:97:c0:31:22:cb:69:50:c7:7e:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 53:1f:98:09:e8:b4:7e:c4:63:7b:16:5c:ed:30:81:3b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:50:2c:f9:4f:73:bc:a6:4c:ce:48:c9:23:aa:28: 59:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:5f:57:da:17:67:02:0c:2e:74:4c:3d:d9:73:c6:d0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:68:60:cb:22:1a:f5:a1:eb:7c:65:4c:8b:fe:ab: 93:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ae:64:8e:a4:69:28:a1:2a:cc:21:69:49:7d:40:e6:42 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:db:8b:8a:c7:87:0e:42:10:a6:18:52:2b:aa:0e: 90:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 56:74:35:5a:96:e7:8a:81:af:a9:f8:94:a7:23:84:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b0:14:64:ce:08:ab:5e:07:a7:aa:b4:1c:c0:b5:93:ae Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:43:b6:05:9d:69:07:46:d5:f3:e7:e1:9e:67:d8: 43:3e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 52:28:b7:64:af:ed:92:61:ba:35:19:57:a1:2e:4d:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:e2:b9:af:55:f9:22:5d:b1:02:17:ea:5d:12:ba: bc:30 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 97:73:9d:7a:3a:e0:ac:66:2c:17:ae:a7:bc:01:91:08 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:a1:e4:e2:f6:85:1f:5b:39:c0:f4:94:4b:99:20: a9:2a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 43:d0:bc:37:b2:b1:e0:53:3b:4a:9d:79:de:fa:b9:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cc:ed:9d:b4:ca:49:2e:0b:d2:41:d7:c7:e1:70:61:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a2:a4:e8:89:40:5b:41:0d:98:7e:0a:54:39:42:2a:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 23:e0:3a:c4:ae:08:02:1f:d2:62:16:aa:32:eb:84:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 42:38:e3:bf:9c:85:85:82:09:78:f8:9c:cb:5d:e1:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7d:27:9f:ef:af:6e:e2:35:30:d5:52:3c:24:8f:03:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:2f:86:b2:fb:5c:12:08:17:8c:92:c6:a5:49:34:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e7:35:36:ea:e8:27:6c:a6:5c:70:7c:0a:18:68:f4:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a1:1f:e2:21:7f:16:5a:cb:54:0d:29:b2:8a:01:f6:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6a:7c:05:e1:d1:7c:b1:7d:02:c3:68:17:bc:67:80:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:e2:34:48:ea:d3:4d:db:a7:e1:7e:2c:df:99:d1:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:9b:e4:6f:a6:d7:18:3e:01:4e:f7:df:fb:b7:fe:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:09:27:b8:c7:27:81:8b:b7:31:11:92:05:00:d5:6f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:37:eb:a2:ae:30:38:44:10:d8:0a:10:09:54:f7: aa:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:9d:f5:fa:cc:c9:b7:b6:bd:ba:20:86:73:09:68:e9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:6a:b7:5a:a1:71:de:ae:3f:b2:0f:a2:24:e1:6e: c0:af Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3c:70:80:30:8a:a6:91:8d:1a:7a:11:73:bf:5d:00:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:2e:ba:e1:68:b2:28:b5:1a:ef:b8:d7:47:e3:ad: c1:91 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:0f:9f:ac:4b:61:de:f3:ea:9b:c7:28:3d:78:06:ee Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:ef:ce:68:30:12:54:ef:97:56:68:6f:7f:ec:bd: ad:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 20:f1:ef:2d:7f:80:3b:61:5f:eb:ae:5d:71:b0:49:a3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:0b:44:b3:05:24:2f:7f:61:0d:53:5f:6d:d6:58: ca:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 15:6c:4b:df:da:65:22:3b:cd:77:57:e8:f2:42:c3:84 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:02:dd:3e:39:2b:2d:c2:80:44:0c:39:3e:cc:08: db:d6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 59:ac:93:eb:d3:e1:86:ec:5c:99:d8:44:3c:f5:18:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d1:20:b9:13:ca:fa:9e:15:2a:02:71:89:90:23:35:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 06:8d:6a:14:a5:91:d3:44:5b:79:78:6c:c3:25:a0:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:3d:24:97:45:4a:64:46:f1:34:b7:62:d7:90:b9:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:b8:a3:95:bb:60:ae:0f:82:0f:72:f7:90:f8:73:01 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 26:c1:aa:78:1f:6e:10:15:05:bd:f8:7e:4d:4a:17:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:27:28 2023 Not After : Wed Oct 18 16:27:28 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:28:0d:c0:1d:99:22:17:30:7a:9a:b8:3c:be:ac:5b: f7:fb:c3:79:f3:e6:0f:2c:0e:c5:fb:76:83:40:e9:96: be:b7:50:fb:af:9e:78:1b:2b:53:59:9c:af:1a:26:00: 36:10:34:8a:09:8b:62:0d:73:c9:1d:42:64:e7:7c:e8: ab:c1:90:87:4d:5e:c9:62:77:25:7b:e7:3f:90:46:a7: 1a:82:78:07:a5:98:a6:64:c3:f0:24:5d:4d:38:49:ff: 05:df:3e:93:7f:a8:34:2e:15:12:c1:71:d5:8c:80:18: 93:32:16:1f:d4:13:51:ff:99:b7:ba:16:c4:ec:f8:f7: 28:57:a5:83:eb:2f:8d:64:59:8f:a9:97:fc:c3:cd:37: cc:8f:51:d3:3c:16:40:25:74:fb:b1:39:1d:80:53:03: 0d:49:58:aa:ea:c5:8a:9c:db:39:59:33:59:80:32:83: 19:c8:9e:43:d2:f1:a6:be:c1:a8:ab:ac:48:eb:99:07: d4:24:9d:5d:9c:8c:bc:bc:b9:b7:88:d0:1f:2f:f2:1b: be:fb:67:54:60:68:18:d4:b1:d6:74:20:57:f1:ff:16: 24:23:6e:ae:0b:c8:71:46:b0:9b:d6:5d:9b:6d:6c:dc: ed:67:5d:0d:53:0c:e9:e4:f8:10:64:38:22:64:77:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:4a:fd:e9:29:64:10:20:3f:11:35:c9:bd:0c:ce:4c: 92:c7:0b:b7:16:85:42:b8:15:b5:4a:67:48:fb:e7:ba: 2f:95:cb:eb:e8:7d:40:7d:8f:92:d7:d1:aa:e7:59:78: a7:b0:f0:09:a7:84:32:cd:0f:fb:05:55:f8:e8:3d:45: a1:75:7a:3c:20:df:11:5d:2d:a9:e0:20:8c:ce:b8:6a: 1d:e8:64:3c:6d:33:71:86:b1:fa:4a:f9:30:81:a1:9a: a7:63:f6:40:02:0e:ef:f9:c1:9b:cc:74:47:55:da:bf: 62:b8:eb:7f:9e:52:da:af:d7:bf:cb:89:35:e9:fc:23: b9:8a:eb:4f:aa:db:bf:4b:98:e6:8f:34:74:71:d9:e0: f4:84:9d:e5:79:ea:bd:4f:91:8c:02:ce:f6:33:fd:25: e7:8e:89:d5:39:19:2d:ef:af:49:66:df:60:43:6b:da: 31:32:44:6a:06:8c:e9:63:b4:d2:6a:31:33:43:9c:6e: 24:ee:15:36:05:08:a7:c4:35:9d:a6:f6:5a:8d:fa:52: 3d:13:f5:08:d0:22:c0:7c:3b:de:58:d3:04:23:ae:4d: d2:a0:9b:66:3a:6f:d5:6b:d4:91:34:95:9e:b0:e3:0f: f3:82:75:c1:84:15:79:c4:16:9f:5d:9e:0e:bf:7b:52 Fingerprint (SHA-256): 4C:43:D4:74:9F:61:4C:97:D5:D6:49:42:3E:C0:70:06:8B:95:6B:81:61:1A:73:7F:75:A1:AE:36:D8:DD:4A:1D Fingerprint (SHA1): 7B:0E:14:97:98:94:59:86:22:23:96:08:14:4A:8A:30:C8:C2:1C:31 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:29:08 2023 Not After : Wed Oct 18 16:29:08 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ca:44:41:54:8c:37:81:3a:bc:90:57:53:79:8c:0d: 62:48:af:59:8b:1c:ab:8e:6b:74:1f:4d:40:45:37:2a: 52:83:a3:53:11:cd:9b:39:b4:14:eb:60:9b:0b:31:dd: 83:4e:80:93:e6:bb:d3:88:85:d8:8e:b0:37:0f:06:d3: 81:fb:8d:f3:66:88:08:2c:45:61:88:6e:d7:fe:b6:f0: 6d:c7:5a:46:fb:02:e6:3b:1f:41:5c:3b:39:4c:dd:52: 69:86:bd:24:09:34:b6:46:21:4a:83:12:ea:18:ad:a7: 6d:07:bc:4b:bf:58:58:21:f1:6f:1e:7c:d9:20:1e:b9: 32:11:3d:c2:dd:25:64:7a:47:7c:19:fc:f1:e5:84:8a: 56:8b:3e:b2:89:ce:d0:ba:2d:2e:f7:40:af:bc:cc:1c: 76:f8:80:db:f4:b9:25:e9:ca:e2:99:59:c5:af:5d:e5: fe:6e:9c:2c:a7:14:9a:e6:26:3d:dc:64:d8:96:39:93: 22:31:0e:5c:59:c9:07:7d:e8:04:94:dd:c9:f7:56:07: 1e:ea:ad:98:90:d1:ce:f8:a5:f2:7d:ca:db:74:05:29: 9f:94:a1:db:c2:b0:fb:f3:e1:8e:5d:a3:33:68:a1:4d: 67:4c:3b:45:e5:ad:4e:fe:7f:df:9e:08:4b:53:1f:f1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:ee:b7:42:12:0a:b4:bc:e6:e0:10:21:65:ee:b3:95: 45:7d:fd:24:24:eb:90:e4:50:bb:4a:a2:da:5f:d8:b1: 03:d5:1f:ed:bd:81:00:37:e7:1e:b8:44:c6:86:c9:4a: e0:62:ca:18:1f:15:df:87:75:f5:7e:cd:59:7a:11:9b: b6:23:5c:24:0f:7a:14:df:8c:9e:4b:1a:97:95:8d:0b: 7c:3a:80:c7:6b:fd:77:0d:62:2b:6e:5e:a3:10:d2:3a: a0:b8:42:3b:df:c6:41:2e:87:5e:56:b2:a5:ee:32:ce: 7a:78:58:c4:97:b6:b1:4f:e3:9a:2b:d1:55:f1:cb:4b: 85:72:1b:f7:15:59:41:1d:06:1e:12:a2:06:2b:a1:cf: 5a:20:9d:ff:6f:cd:aa:7d:b8:5f:b8:3e:1c:e6:38:67: e3:f4:2d:60:30:29:56:ad:32:19:b8:dc:a4:94:35:9b: 12:1a:31:91:3d:22:0b:2b:da:69:6e:b2:83:a6:dd:3d: a1:88:e4:d2:16:85:cd:19:ad:1c:fb:00:28:bb:43:63: 80:96:f0:de:07:56:7d:b1:32:30:14:07:df:05:35:fd: ec:b3:06:15:a9:ad:7c:af:b1:c0:22:9c:00:c9:dd:dc: ae:ea:c2:f5:54:1e:f1:0f:c2:30:dd:f7:c2:59:31:60 Fingerprint (SHA-256): 70:A1:DD:A2:C0:C6:DC:BD:58:0A:DB:EA:90:F7:44:80:6D:DB:6F:58:52:2A:01:89:8A:CD:37:82:87:CE:61:25 Fingerprint (SHA1): 5E:CE:E9:AA:25:04:EE:5A:9A:4F:82:8D:A3:A8:B4:54:DB:2C:EE:84 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing RSA-PSS private key from PKCS#12 file - PASSED < 4> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #733: Listing RSA-PSS private key imported from PKCS#12 file - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #734: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #735: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #736: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #737: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #738: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #739: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #740: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #741: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 16:58:07 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 16:58:07 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 417cb61e16b475b445d859996b11827667028014 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 417cb61e16b475b445d859996b11827667028014 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 417cb61e16b475b445d859996b11827667028014 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00042d80 (273792): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 16:58:42 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Wed Oct 18 16:58:42 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.27434 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v2.27434 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.27434 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.27434 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v2.27434 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.27434 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/combined.27434 -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/decoded.27434 -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/log.27434 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/decoded.27434 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/log.27434 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.56 user 0.32 sys 0.22 0 seconds sdr.sh: #9: pwdecrypt no time regression - PASSED TIMESTAMP sdr END: Wed Oct 18 16:58:45 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 16:58:45 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 16:58:47 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 16:58:47 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 16:59:52 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 16:59:52 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:59:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:59:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18899 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18899 found at Wed Oct 18 16:59:52 UTC 2023 selfserv_9355 with PID 18899 started at Wed Oct 18 16:59:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18899 at Wed Oct 18 16:59:53 UTC 2023 kill -USR1 18899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18899 killed at Wed Oct 18 16:59:54 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:59:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:59:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18951 found at Wed Oct 18 16:59:54 UTC 2023 selfserv_9355 with PID 18951 started at Wed Oct 18 16:59:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18951 at Wed Oct 18 16:59:55 UTC 2023 kill -USR1 18951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18951 killed at Wed Oct 18 16:59:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 16:59:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:59:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19003 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19003 found at Wed Oct 18 16:59:56 UTC 2023 selfserv_9355 with PID 19003 started at Wed Oct 18 16:59:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19003 at Wed Oct 18 16:59:57 UTC 2023 kill -USR1 19003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19003 killed at Wed Oct 18 16:59:57 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:59:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:59:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19069 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19069 found at Wed Oct 18 16:59:57 UTC 2023 selfserv_9355 with PID 19069 started at Wed Oct 18 16:59:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19069 at Wed Oct 18 16:59:59 UTC 2023 kill -USR1 19069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19069 killed at Wed Oct 18 16:59:59 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 16:59:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 16:59:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19121 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19121 found at Wed Oct 18 16:59:59 UTC 2023 selfserv_9355 with PID 19121 started at Wed Oct 18 16:59:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19121 at Wed Oct 18 17:00:00 UTC 2023 kill -USR1 19121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19121 killed at Wed Oct 18 17:00:00 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19173 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19173 found at Wed Oct 18 17:00:00 UTC 2023 selfserv_9355 with PID 19173 started at Wed Oct 18 17:00:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19173 at Wed Oct 18 17:00:02 UTC 2023 kill -USR1 19173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19173 killed at Wed Oct 18 17:00:02 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19300 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19300 found at Wed Oct 18 17:00:02 UTC 2023 selfserv_9355 with PID 19300 started at Wed Oct 18 17:00:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19300 at Wed Oct 18 17:00:03 UTC 2023 kill -USR1 19300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19300 killed at Wed Oct 18 17:00:04 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19354 found at Wed Oct 18 17:00:04 UTC 2023 selfserv_9355 with PID 19354 started at Wed Oct 18 17:00:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19354 at Wed Oct 18 17:00:05 UTC 2023 kill -USR1 19354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19354 killed at Wed Oct 18 17:00:05 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19406 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19406 found at Wed Oct 18 17:00:06 UTC 2023 selfserv_9355 with PID 19406 started at Wed Oct 18 17:00:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19406 at Wed Oct 18 17:00:07 UTC 2023 kill -USR1 19406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19406 killed at Wed Oct 18 17:00:07 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19472 found at Wed Oct 18 17:00:08 UTC 2023 selfserv_9355 with PID 19472 started at Wed Oct 18 17:00:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19472 at Wed Oct 18 17:00:09 UTC 2023 kill -USR1 19472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19472 killed at Wed Oct 18 17:00:09 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19524 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19524 found at Wed Oct 18 17:00:09 UTC 2023 selfserv_9355 with PID 19524 started at Wed Oct 18 17:00:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19524 at Wed Oct 18 17:00:11 UTC 2023 kill -USR1 19524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19524 killed at Wed Oct 18 17:00:11 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19576 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19576 found at Wed Oct 18 17:00:11 UTC 2023 selfserv_9355 with PID 19576 started at Wed Oct 18 17:00:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19576 at Wed Oct 18 17:00:12 UTC 2023 kill -USR1 19576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19576 killed at Wed Oct 18 17:00:12 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19642 found at Wed Oct 18 17:00:13 UTC 2023 selfserv_9355 with PID 19642 started at Wed Oct 18 17:00:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19642 at Wed Oct 18 17:00:14 UTC 2023 kill -USR1 19642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19642 killed at Wed Oct 18 17:00:14 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19694 found at Wed Oct 18 17:00:14 UTC 2023 selfserv_9355 with PID 19694 started at Wed Oct 18 17:00:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19694 at Wed Oct 18 17:00:15 UTC 2023 kill -USR1 19694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19694 killed at Wed Oct 18 17:00:15 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19746 found at Wed Oct 18 17:00:16 UTC 2023 selfserv_9355 with PID 19746 started at Wed Oct 18 17:00:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19746 at Wed Oct 18 17:00:17 UTC 2023 kill -USR1 19746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19746 killed at Wed Oct 18 17:00:17 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19812 found at Wed Oct 18 17:00:17 UTC 2023 selfserv_9355 with PID 19812 started at Wed Oct 18 17:00:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19812 at Wed Oct 18 17:00:18 UTC 2023 kill -USR1 19812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19812 killed at Wed Oct 18 17:00:19 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19864 found at Wed Oct 18 17:00:19 UTC 2023 selfserv_9355 with PID 19864 started at Wed Oct 18 17:00:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19864 at Wed Oct 18 17:00:20 UTC 2023 kill -USR1 19864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19864 killed at Wed Oct 18 17:00:21 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19921 found at Wed Oct 18 17:00:21 UTC 2023 selfserv_9355 with PID 19921 started at Wed Oct 18 17:00:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19921 at Wed Oct 18 17:00:22 UTC 2023 kill -USR1 19921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19921 killed at Wed Oct 18 17:00:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19991 found at Wed Oct 18 17:00:23 UTC 2023 selfserv_9355 with PID 19991 started at Wed Oct 18 17:00:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19991 at Wed Oct 18 17:00:24 UTC 2023 kill -USR1 19991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19991 killed at Wed Oct 18 17:00:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20043 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20043 found at Wed Oct 18 17:00:24 UTC 2023 selfserv_9355 with PID 20043 started at Wed Oct 18 17:00:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20043 at Wed Oct 18 17:00:26 UTC 2023 kill -USR1 20043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20043 killed at Wed Oct 18 17:00:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20097 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20097 found at Wed Oct 18 17:00:26 UTC 2023 selfserv_9355 with PID 20097 started at Wed Oct 18 17:00:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20097 at Wed Oct 18 17:00:27 UTC 2023 kill -USR1 20097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20097 killed at Wed Oct 18 17:00:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20163 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20163 found at Wed Oct 18 17:00:28 UTC 2023 selfserv_9355 with PID 20163 started at Wed Oct 18 17:00:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20163 at Wed Oct 18 17:00:29 UTC 2023 kill -USR1 20163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20163 killed at Wed Oct 18 17:00:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20215 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20215 found at Wed Oct 18 17:00:29 UTC 2023 selfserv_9355 with PID 20215 started at Wed Oct 18 17:00:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20215 at Wed Oct 18 17:00:30 UTC 2023 kill -USR1 20215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20215 killed at Wed Oct 18 17:00:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20267 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20267 found at Wed Oct 18 17:00:31 UTC 2023 selfserv_9355 with PID 20267 started at Wed Oct 18 17:00:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20267 at Wed Oct 18 17:00:32 UTC 2023 kill -USR1 20267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20267 killed at Wed Oct 18 17:00:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20333 found at Wed Oct 18 17:00:32 UTC 2023 selfserv_9355 with PID 20333 started at Wed Oct 18 17:00:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20333 at Wed Oct 18 17:00:33 UTC 2023 kill -USR1 20333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20333 killed at Wed Oct 18 17:00:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20385 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20385 found at Wed Oct 18 17:00:34 UTC 2023 selfserv_9355 with PID 20385 started at Wed Oct 18 17:00:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20385 at Wed Oct 18 17:00:35 UTC 2023 kill -USR1 20385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20385 killed at Wed Oct 18 17:00:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20437 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20437 found at Wed Oct 18 17:00:36 UTC 2023 selfserv_9355 with PID 20437 started at Wed Oct 18 17:00:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20437 at Wed Oct 18 17:00:37 UTC 2023 kill -USR1 20437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20437 killed at Wed Oct 18 17:00:37 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20503 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20503 found at Wed Oct 18 17:00:37 UTC 2023 selfserv_9355 with PID 20503 started at Wed Oct 18 17:00:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20503 at Wed Oct 18 17:00:38 UTC 2023 kill -USR1 20503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20503 killed at Wed Oct 18 17:00:39 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20555 found at Wed Oct 18 17:00:39 UTC 2023 selfserv_9355 with PID 20555 started at Wed Oct 18 17:00:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20555 at Wed Oct 18 17:00:40 UTC 2023 kill -USR1 20555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20555 killed at Wed Oct 18 17:00:40 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20607 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20607 found at Wed Oct 18 17:00:41 UTC 2023 selfserv_9355 with PID 20607 started at Wed Oct 18 17:00:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20607 at Wed Oct 18 17:00:42 UTC 2023 kill -USR1 20607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20607 killed at Wed Oct 18 17:00:42 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20673 found at Wed Oct 18 17:00:42 UTC 2023 selfserv_9355 with PID 20673 started at Wed Oct 18 17:00:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20673 at Wed Oct 18 17:00:43 UTC 2023 kill -USR1 20673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20673 killed at Wed Oct 18 17:00:43 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20725 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20725 found at Wed Oct 18 17:00:44 UTC 2023 selfserv_9355 with PID 20725 started at Wed Oct 18 17:00:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20725 at Wed Oct 18 17:00:44 UTC 2023 kill -USR1 20725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20725 killed at Wed Oct 18 17:00:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20777 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20777 found at Wed Oct 18 17:00:45 UTC 2023 selfserv_9355 with PID 20777 started at Wed Oct 18 17:00:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20777 at Wed Oct 18 17:00:46 UTC 2023 kill -USR1 20777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20777 killed at Wed Oct 18 17:00:46 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20843 found at Wed Oct 18 17:00:46 UTC 2023 selfserv_9355 with PID 20843 started at Wed Oct 18 17:00:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20843 at Wed Oct 18 17:00:48 UTC 2023 kill -USR1 20843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20843 killed at Wed Oct 18 17:00:48 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20895 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20895 found at Wed Oct 18 17:00:48 UTC 2023 selfserv_9355 with PID 20895 started at Wed Oct 18 17:00:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20895 at Wed Oct 18 17:00:49 UTC 2023 kill -USR1 20895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20895 killed at Wed Oct 18 17:00:49 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20947 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20947 found at Wed Oct 18 17:00:50 UTC 2023 selfserv_9355 with PID 20947 started at Wed Oct 18 17:00:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 20947 at Wed Oct 18 17:00:51 UTC 2023 kill -USR1 20947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20947 killed at Wed Oct 18 17:00:51 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21013 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21013 found at Wed Oct 18 17:00:51 UTC 2023 selfserv_9355 with PID 21013 started at Wed Oct 18 17:00:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21013 at Wed Oct 18 17:00:53 UTC 2023 kill -USR1 21013 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21013 killed at Wed Oct 18 17:00:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21065 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21065 found at Wed Oct 18 17:00:53 UTC 2023 selfserv_9355 with PID 21065 started at Wed Oct 18 17:00:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21065 at Wed Oct 18 17:00:55 UTC 2023 kill -USR1 21065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21065 killed at Wed Oct 18 17:00:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:00:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21117 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21117 found at Wed Oct 18 17:00:55 UTC 2023 selfserv_9355 with PID 21117 started at Wed Oct 18 17:00:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21117 at Wed Oct 18 17:00:57 UTC 2023 kill -USR1 21117 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21117 killed at Wed Oct 18 17:00:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21183 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21183 found at Wed Oct 18 17:00:57 UTC 2023 selfserv_9355 with PID 21183 started at Wed Oct 18 17:00:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21183 at Wed Oct 18 17:00:58 UTC 2023 kill -USR1 21183 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21183 killed at Wed Oct 18 17:00:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:00:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:00:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21235 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21235 found at Wed Oct 18 17:00:59 UTC 2023 selfserv_9355 with PID 21235 started at Wed Oct 18 17:00:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21235 at Wed Oct 18 17:01:00 UTC 2023 kill -USR1 21235 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21235 killed at Wed Oct 18 17:01:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21287 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21287 found at Wed Oct 18 17:01:00 UTC 2023 selfserv_9355 with PID 21287 started at Wed Oct 18 17:01:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21287 at Wed Oct 18 17:01:02 UTC 2023 kill -USR1 21287 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21287 killed at Wed Oct 18 17:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21368 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21368 found at Wed Oct 18 17:01:02 UTC 2023 selfserv_9355 with PID 21368 started at Wed Oct 18 17:01:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21368 at Wed Oct 18 17:01:04 UTC 2023 kill -USR1 21368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21368 killed at Wed Oct 18 17:01:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21420 found at Wed Oct 18 17:01:04 UTC 2023 selfserv_9355 with PID 21420 started at Wed Oct 18 17:01:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21420 at Wed Oct 18 17:01:06 UTC 2023 kill -USR1 21420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21420 killed at Wed Oct 18 17:01:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21472 found at Wed Oct 18 17:01:06 UTC 2023 selfserv_9355 with PID 21472 started at Wed Oct 18 17:01:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21472 at Wed Oct 18 17:01:08 UTC 2023 kill -USR1 21472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21472 killed at Wed Oct 18 17:01:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21538 found at Wed Oct 18 17:01:08 UTC 2023 selfserv_9355 with PID 21538 started at Wed Oct 18 17:01:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21538 at Wed Oct 18 17:01:10 UTC 2023 kill -USR1 21538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21538 killed at Wed Oct 18 17:01:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21590 found at Wed Oct 18 17:01:10 UTC 2023 selfserv_9355 with PID 21590 started at Wed Oct 18 17:01:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21590 at Wed Oct 18 17:01:11 UTC 2023 kill -USR1 21590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21590 killed at Wed Oct 18 17:01:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21642 found at Wed Oct 18 17:01:12 UTC 2023 selfserv_9355 with PID 21642 started at Wed Oct 18 17:01:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21642 at Wed Oct 18 17:01:13 UTC 2023 kill -USR1 21642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21642 killed at Wed Oct 18 17:01:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21708 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21708 found at Wed Oct 18 17:01:14 UTC 2023 selfserv_9355 with PID 21708 started at Wed Oct 18 17:01:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21708 at Wed Oct 18 17:01:15 UTC 2023 kill -USR1 21708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21708 killed at Wed Oct 18 17:01:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21760 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21760 found at Wed Oct 18 17:01:15 UTC 2023 selfserv_9355 with PID 21760 started at Wed Oct 18 17:01:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21760 at Wed Oct 18 17:01:17 UTC 2023 kill -USR1 21760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21760 killed at Wed Oct 18 17:01:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21812 found at Wed Oct 18 17:01:17 UTC 2023 selfserv_9355 with PID 21812 started at Wed Oct 18 17:01:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21812 at Wed Oct 18 17:01:18 UTC 2023 kill -USR1 21812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21812 killed at Wed Oct 18 17:01:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21878 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21878 found at Wed Oct 18 17:01:19 UTC 2023 selfserv_9355 with PID 21878 started at Wed Oct 18 17:01:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21878 at Wed Oct 18 17:01:20 UTC 2023 kill -USR1 21878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21878 killed at Wed Oct 18 17:01:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21935 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21935 found at Wed Oct 18 17:01:21 UTC 2023 selfserv_9355 with PID 21935 started at Wed Oct 18 17:01:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21935 at Wed Oct 18 17:01:22 UTC 2023 kill -USR1 21935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21935 killed at Wed Oct 18 17:01:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21991 found at Wed Oct 18 17:01:23 UTC 2023 selfserv_9355 with PID 21991 started at Wed Oct 18 17:01:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21991 at Wed Oct 18 17:01:24 UTC 2023 kill -USR1 21991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21991 killed at Wed Oct 18 17:01:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22059 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22059 found at Wed Oct 18 17:01:25 UTC 2023 selfserv_9355 with PID 22059 started at Wed Oct 18 17:01:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22059 at Wed Oct 18 17:01:26 UTC 2023 kill -USR1 22059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22059 killed at Wed Oct 18 17:01:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22111 found at Wed Oct 18 17:01:27 UTC 2023 selfserv_9355 with PID 22111 started at Wed Oct 18 17:01:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22111 at Wed Oct 18 17:01:28 UTC 2023 kill -USR1 22111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22111 killed at Wed Oct 18 17:01:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22163 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22163 found at Wed Oct 18 17:01:29 UTC 2023 selfserv_9355 with PID 22163 started at Wed Oct 18 17:01:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22163 at Wed Oct 18 17:01:30 UTC 2023 kill -USR1 22163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22163 killed at Wed Oct 18 17:01:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22229 found at Wed Oct 18 17:01:30 UTC 2023 selfserv_9355 with PID 22229 started at Wed Oct 18 17:01:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22229 at Wed Oct 18 17:01:32 UTC 2023 kill -USR1 22229 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22229 killed at Wed Oct 18 17:01:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22281 found at Wed Oct 18 17:01:32 UTC 2023 selfserv_9355 with PID 22281 started at Wed Oct 18 17:01:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22281 at Wed Oct 18 17:01:33 UTC 2023 kill -USR1 22281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22281 killed at Wed Oct 18 17:01:33 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22333 found at Wed Oct 18 17:01:34 UTC 2023 selfserv_9355 with PID 22333 started at Wed Oct 18 17:01:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22333 at Wed Oct 18 17:01:35 UTC 2023 kill -USR1 22333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22333 killed at Wed Oct 18 17:01:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22399 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22399 found at Wed Oct 18 17:01:35 UTC 2023 selfserv_9355 with PID 22399 started at Wed Oct 18 17:01:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22399 at Wed Oct 18 17:01:37 UTC 2023 kill -USR1 22399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22399 killed at Wed Oct 18 17:01:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22451 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22451 found at Wed Oct 18 17:01:37 UTC 2023 selfserv_9355 with PID 22451 started at Wed Oct 18 17:01:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22451 at Wed Oct 18 17:01:39 UTC 2023 kill -USR1 22451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22451 killed at Wed Oct 18 17:01:39 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22503 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22503 found at Wed Oct 18 17:01:39 UTC 2023 selfserv_9355 with PID 22503 started at Wed Oct 18 17:01:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22503 at Wed Oct 18 17:01:41 UTC 2023 kill -USR1 22503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22503 killed at Wed Oct 18 17:01:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22569 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22569 found at Wed Oct 18 17:01:41 UTC 2023 selfserv_9355 with PID 22569 started at Wed Oct 18 17:01:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22569 at Wed Oct 18 17:01:43 UTC 2023 kill -USR1 22569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22569 killed at Wed Oct 18 17:01:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22621 found at Wed Oct 18 17:01:43 UTC 2023 selfserv_9355 with PID 22621 started at Wed Oct 18 17:01:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22621 at Wed Oct 18 17:01:45 UTC 2023 kill -USR1 22621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22621 killed at Wed Oct 18 17:01:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22673 found at Wed Oct 18 17:01:45 UTC 2023 selfserv_9355 with PID 22673 started at Wed Oct 18 17:01:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22673 at Wed Oct 18 17:01:47 UTC 2023 kill -USR1 22673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22673 killed at Wed Oct 18 17:01:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22739 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22739 found at Wed Oct 18 17:01:47 UTC 2023 selfserv_9355 with PID 22739 started at Wed Oct 18 17:01:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22739 at Wed Oct 18 17:01:48 UTC 2023 kill -USR1 22739 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22739 killed at Wed Oct 18 17:01:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22792 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22792 found at Wed Oct 18 17:01:49 UTC 2023 selfserv_9355 with PID 22792 started at Wed Oct 18 17:01:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22792 at Wed Oct 18 17:01:50 UTC 2023 kill -USR1 22792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22792 killed at Wed Oct 18 17:01:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:01:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22844 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22844 found at Wed Oct 18 17:01:50 UTC 2023 selfserv_9355 with PID 22844 started at Wed Oct 18 17:01:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22844 at Wed Oct 18 17:01:51 UTC 2023 kill -USR1 22844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22844 killed at Wed Oct 18 17:01:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22910 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22910 found at Wed Oct 18 17:01:52 UTC 2023 selfserv_9355 with PID 22910 started at Wed Oct 18 17:01:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22910 at Wed Oct 18 17:01:53 UTC 2023 kill -USR1 22910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22910 killed at Wed Oct 18 17:01:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22962 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22962 found at Wed Oct 18 17:01:54 UTC 2023 selfserv_9355 with PID 22962 started at Wed Oct 18 17:01:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22962 at Wed Oct 18 17:01:55 UTC 2023 kill -USR1 22962 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22962 killed at Wed Oct 18 17:01:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23014 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23014 found at Wed Oct 18 17:01:56 UTC 2023 selfserv_9355 with PID 23014 started at Wed Oct 18 17:01:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23014 at Wed Oct 18 17:01:57 UTC 2023 kill -USR1 23014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23014 killed at Wed Oct 18 17:01:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23080 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23080 found at Wed Oct 18 17:01:58 UTC 2023 selfserv_9355 with PID 23080 started at Wed Oct 18 17:01:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23080 at Wed Oct 18 17:01:59 UTC 2023 kill -USR1 23080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23080 killed at Wed Oct 18 17:01:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:01:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:01:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23132 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23132 found at Wed Oct 18 17:02:00 UTC 2023 selfserv_9355 with PID 23132 started at Wed Oct 18 17:02:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23132 at Wed Oct 18 17:02:01 UTC 2023 kill -USR1 23132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23132 killed at Wed Oct 18 17:02:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23184 found at Wed Oct 18 17:02:01 UTC 2023 selfserv_9355 with PID 23184 started at Wed Oct 18 17:02:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23184 at Wed Oct 18 17:02:03 UTC 2023 kill -USR1 23184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23184 killed at Wed Oct 18 17:02:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23250 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23250 found at Wed Oct 18 17:02:03 UTC 2023 selfserv_9355 with PID 23250 started at Wed Oct 18 17:02:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23250 at Wed Oct 18 17:02:04 UTC 2023 kill -USR1 23250 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23250 killed at Wed Oct 18 17:02:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23302 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23302 found at Wed Oct 18 17:02:05 UTC 2023 selfserv_9355 with PID 23302 started at Wed Oct 18 17:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23302 at Wed Oct 18 17:02:06 UTC 2023 kill -USR1 23302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23302 killed at Wed Oct 18 17:02:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23354 found at Wed Oct 18 17:02:06 UTC 2023 selfserv_9355 with PID 23354 started at Wed Oct 18 17:02:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23354 at Wed Oct 18 17:02:07 UTC 2023 kill -USR1 23354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23354 killed at Wed Oct 18 17:02:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23420 found at Wed Oct 18 17:02:08 UTC 2023 selfserv_9355 with PID 23420 started at Wed Oct 18 17:02:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23420 at Wed Oct 18 17:02:09 UTC 2023 kill -USR1 23420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23420 killed at Wed Oct 18 17:02:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23472 found at Wed Oct 18 17:02:09 UTC 2023 selfserv_9355 with PID 23472 started at Wed Oct 18 17:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23472 at Wed Oct 18 17:02:11 UTC 2023 kill -USR1 23472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23472 killed at Wed Oct 18 17:02:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23524 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23524 found at Wed Oct 18 17:02:11 UTC 2023 selfserv_9355 with PID 23524 started at Wed Oct 18 17:02:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23524 at Wed Oct 18 17:02:13 UTC 2023 kill -USR1 23524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23524 killed at Wed Oct 18 17:02:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23590 found at Wed Oct 18 17:02:13 UTC 2023 selfserv_9355 with PID 23590 started at Wed Oct 18 17:02:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23590 at Wed Oct 18 17:02:14 UTC 2023 kill -USR1 23590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23590 killed at Wed Oct 18 17:02:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23642 found at Wed Oct 18 17:02:15 UTC 2023 selfserv_9355 with PID 23642 started at Wed Oct 18 17:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23642 at Wed Oct 18 17:02:16 UTC 2023 kill -USR1 23642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23642 killed at Wed Oct 18 17:02:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23694 found at Wed Oct 18 17:02:17 UTC 2023 selfserv_9355 with PID 23694 started at Wed Oct 18 17:02:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23694 at Wed Oct 18 17:02:18 UTC 2023 kill -USR1 23694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23694 killed at Wed Oct 18 17:02:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23760 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23760 found at Wed Oct 18 17:02:18 UTC 2023 selfserv_9355 with PID 23760 started at Wed Oct 18 17:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23760 at Wed Oct 18 17:02:19 UTC 2023 kill -USR1 23760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23760 killed at Wed Oct 18 17:02:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23817 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23817 found at Wed Oct 18 17:02:20 UTC 2023 selfserv_9355 with PID 23817 started at Wed Oct 18 17:02:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23817 at Wed Oct 18 17:02:21 UTC 2023 kill -USR1 23817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23817 killed at Wed Oct 18 17:02:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23869 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23869 found at Wed Oct 18 17:02:21 UTC 2023 selfserv_9355 with PID 23869 started at Wed Oct 18 17:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23869 at Wed Oct 18 17:02:22 UTC 2023 kill -USR1 23869 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23869 killed at Wed Oct 18 17:02:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23937 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23937 found at Wed Oct 18 17:02:23 UTC 2023 selfserv_9355 with PID 23937 started at Wed Oct 18 17:02:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23937 at Wed Oct 18 17:02:24 UTC 2023 kill -USR1 23937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23937 killed at Wed Oct 18 17:02:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23991 found at Wed Oct 18 17:02:24 UTC 2023 selfserv_9355 with PID 23991 started at Wed Oct 18 17:02:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23991 at Wed Oct 18 17:02:26 UTC 2023 kill -USR1 23991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23991 killed at Wed Oct 18 17:02:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24045 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24045 found at Wed Oct 18 17:02:26 UTC 2023 selfserv_9355 with PID 24045 started at Wed Oct 18 17:02:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24045 at Wed Oct 18 17:02:28 UTC 2023 kill -USR1 24045 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24045 killed at Wed Oct 18 17:02:28 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24111 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24111 found at Wed Oct 18 17:02:28 UTC 2023 selfserv_9355 with PID 24111 started at Wed Oct 18 17:02:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24111 at Wed Oct 18 17:02:29 UTC 2023 kill -USR1 24111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24111 killed at Wed Oct 18 17:02:29 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24163 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24163 found at Wed Oct 18 17:02:30 UTC 2023 selfserv_9355 with PID 24163 started at Wed Oct 18 17:02:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24163 at Wed Oct 18 17:02:31 UTC 2023 kill -USR1 24163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24163 killed at Wed Oct 18 17:02:31 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24215 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24215 found at Wed Oct 18 17:02:31 UTC 2023 selfserv_9355 with PID 24215 started at Wed Oct 18 17:02:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24215 at Wed Oct 18 17:02:33 UTC 2023 kill -USR1 24215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24215 killed at Wed Oct 18 17:02:33 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24281 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24281 found at Wed Oct 18 17:02:33 UTC 2023 selfserv_9355 with PID 24281 started at Wed Oct 18 17:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24281 at Wed Oct 18 17:02:34 UTC 2023 kill -USR1 24281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24281 killed at Wed Oct 18 17:02:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24333 found at Wed Oct 18 17:02:35 UTC 2023 selfserv_9355 with PID 24333 started at Wed Oct 18 17:02:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24333 at Wed Oct 18 17:02:36 UTC 2023 kill -USR1 24333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24333 killed at Wed Oct 18 17:02:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24385 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24385 found at Wed Oct 18 17:02:36 UTC 2023 selfserv_9355 with PID 24385 started at Wed Oct 18 17:02:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24385 at Wed Oct 18 17:02:38 UTC 2023 kill -USR1 24385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24385 killed at Wed Oct 18 17:02:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24451 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24451 found at Wed Oct 18 17:02:38 UTC 2023 selfserv_9355 with PID 24451 started at Wed Oct 18 17:02:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24451 at Wed Oct 18 17:02:39 UTC 2023 kill -USR1 24451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24451 killed at Wed Oct 18 17:02:39 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24503 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24503 found at Wed Oct 18 17:02:40 UTC 2023 selfserv_9355 with PID 24503 started at Wed Oct 18 17:02:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24503 at Wed Oct 18 17:02:41 UTC 2023 kill -USR1 24503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24503 killed at Wed Oct 18 17:02:41 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24555 found at Wed Oct 18 17:02:41 UTC 2023 selfserv_9355 with PID 24555 started at Wed Oct 18 17:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24555 at Wed Oct 18 17:02:43 UTC 2023 kill -USR1 24555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24555 killed at Wed Oct 18 17:02:43 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24621 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24621 found at Wed Oct 18 17:02:43 UTC 2023 selfserv_9355 with PID 24621 started at Wed Oct 18 17:02:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24621 at Wed Oct 18 17:02:44 UTC 2023 kill -USR1 24621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24621 killed at Wed Oct 18 17:02:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24673 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24673 found at Wed Oct 18 17:02:45 UTC 2023 selfserv_9355 with PID 24673 started at Wed Oct 18 17:02:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24673 at Wed Oct 18 17:02:46 UTC 2023 kill -USR1 24673 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24673 killed at Wed Oct 18 17:02:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24725 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24725 found at Wed Oct 18 17:02:46 UTC 2023 selfserv_9355 with PID 24725 started at Wed Oct 18 17:02:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24725 at Wed Oct 18 17:02:47 UTC 2023 kill -USR1 24725 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24725 killed at Wed Oct 18 17:02:48 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24791 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24791 found at Wed Oct 18 17:02:48 UTC 2023 selfserv_9355 with PID 24791 started at Wed Oct 18 17:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24791 at Wed Oct 18 17:02:49 UTC 2023 kill -USR1 24791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24791 killed at Wed Oct 18 17:02:49 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24843 found at Wed Oct 18 17:02:50 UTC 2023 selfserv_9355 with PID 24843 started at Wed Oct 18 17:02:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24843 at Wed Oct 18 17:02:51 UTC 2023 kill -USR1 24843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24843 killed at Wed Oct 18 17:02:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24895 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24895 found at Wed Oct 18 17:02:51 UTC 2023 selfserv_9355 with PID 24895 started at Wed Oct 18 17:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24895 at Wed Oct 18 17:02:52 UTC 2023 kill -USR1 24895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24895 killed at Wed Oct 18 17:02:53 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24961 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24961 found at Wed Oct 18 17:02:53 UTC 2023 selfserv_9355 with PID 24961 started at Wed Oct 18 17:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24961 at Wed Oct 18 17:02:55 UTC 2023 kill -USR1 24961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24961 killed at Wed Oct 18 17:02:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25013 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25013 found at Wed Oct 18 17:02:55 UTC 2023 selfserv_9355 with PID 25013 started at Wed Oct 18 17:02:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25013 at Wed Oct 18 17:02:57 UTC 2023 kill -USR1 25013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25013 killed at Wed Oct 18 17:02:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:02:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25065 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25065 found at Wed Oct 18 17:02:57 UTC 2023 selfserv_9355 with PID 25065 started at Wed Oct 18 17:02:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25065 at Wed Oct 18 17:02:59 UTC 2023 kill -USR1 25065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25065 killed at Wed Oct 18 17:02:59 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:02:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25131 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25131 found at Wed Oct 18 17:02:59 UTC 2023 selfserv_9355 with PID 25131 started at Wed Oct 18 17:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25131 at Wed Oct 18 17:03:00 UTC 2023 kill -USR1 25131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25131 killed at Wed Oct 18 17:03:00 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25183 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25183 found at Wed Oct 18 17:03:01 UTC 2023 selfserv_9355 with PID 25183 started at Wed Oct 18 17:03:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25183 at Wed Oct 18 17:03:02 UTC 2023 kill -USR1 25183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25183 killed at Wed Oct 18 17:03:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25235 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25235 found at Wed Oct 18 17:03:02 UTC 2023 selfserv_9355 with PID 25235 started at Wed Oct 18 17:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25235 at Wed Oct 18 17:03:03 UTC 2023 kill -USR1 25235 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25235 killed at Wed Oct 18 17:03:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25301 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25301 found at Wed Oct 18 17:03:04 UTC 2023 selfserv_9355 with PID 25301 started at Wed Oct 18 17:03:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25301 at Wed Oct 18 17:03:05 UTC 2023 kill -USR1 25301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25301 killed at Wed Oct 18 17:03:05 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25353 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25353 found at Wed Oct 18 17:03:05 UTC 2023 selfserv_9355 with PID 25353 started at Wed Oct 18 17:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25353 at Wed Oct 18 17:03:06 UTC 2023 kill -USR1 25353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25353 killed at Wed Oct 18 17:03:06 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25405 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25405 found at Wed Oct 18 17:03:07 UTC 2023 selfserv_9355 with PID 25405 started at Wed Oct 18 17:03:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25405 at Wed Oct 18 17:03:08 UTC 2023 kill -USR1 25405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25405 killed at Wed Oct 18 17:03:08 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25471 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25471 found at Wed Oct 18 17:03:08 UTC 2023 selfserv_9355 with PID 25471 started at Wed Oct 18 17:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25471 at Wed Oct 18 17:03:09 UTC 2023 kill -USR1 25471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25471 killed at Wed Oct 18 17:03:09 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25523 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25523 found at Wed Oct 18 17:03:10 UTC 2023 selfserv_9355 with PID 25523 started at Wed Oct 18 17:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25523 at Wed Oct 18 17:03:11 UTC 2023 kill -USR1 25523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25523 killed at Wed Oct 18 17:03:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25575 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25575 found at Wed Oct 18 17:03:11 UTC 2023 selfserv_9355 with PID 25575 started at Wed Oct 18 17:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25575 at Wed Oct 18 17:03:12 UTC 2023 kill -USR1 25575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25575 killed at Wed Oct 18 17:03:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25641 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25641 found at Wed Oct 18 17:03:12 UTC 2023 selfserv_9355 with PID 25641 started at Wed Oct 18 17:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25641 at Wed Oct 18 17:03:13 UTC 2023 kill -USR1 25641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25641 killed at Wed Oct 18 17:03:14 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25693 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25693 found at Wed Oct 18 17:03:14 UTC 2023 selfserv_9355 with PID 25693 started at Wed Oct 18 17:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25693 at Wed Oct 18 17:03:15 UTC 2023 kill -USR1 25693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25693 killed at Wed Oct 18 17:03:15 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25745 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25745 found at Wed Oct 18 17:03:15 UTC 2023 selfserv_9355 with PID 25745 started at Wed Oct 18 17:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25745 at Wed Oct 18 17:03:17 UTC 2023 kill -USR1 25745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25745 killed at Wed Oct 18 17:03:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25812 found at Wed Oct 18 17:03:17 UTC 2023 selfserv_9355 with PID 25812 started at Wed Oct 18 17:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25812 at Wed Oct 18 17:03:18 UTC 2023 kill -USR1 25812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25812 killed at Wed Oct 18 17:03:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25864 found at Wed Oct 18 17:03:18 UTC 2023 selfserv_9355 with PID 25864 started at Wed Oct 18 17:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25864 at Wed Oct 18 17:03:19 UTC 2023 kill -USR1 25864 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25864 killed at Wed Oct 18 17:03:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25917 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25917 found at Wed Oct 18 17:03:20 UTC 2023 selfserv_9355 with PID 25917 started at Wed Oct 18 17:03:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25917 at Wed Oct 18 17:03:21 UTC 2023 kill -USR1 25917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25917 killed at Wed Oct 18 17:03:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25987 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25987 found at Wed Oct 18 17:03:21 UTC 2023 selfserv_9355 with PID 25987 started at Wed Oct 18 17:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25987 at Wed Oct 18 17:03:22 UTC 2023 kill -USR1 25987 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25987 killed at Wed Oct 18 17:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26043 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26043 found at Wed Oct 18 17:03:23 UTC 2023 selfserv_9355 with PID 26043 started at Wed Oct 18 17:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26043 at Wed Oct 18 17:03:24 UTC 2023 kill -USR1 26043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26043 killed at Wed Oct 18 17:03:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26097 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26097 found at Wed Oct 18 17:03:24 UTC 2023 selfserv_9355 with PID 26097 started at Wed Oct 18 17:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26097 at Wed Oct 18 17:03:25 UTC 2023 kill -USR1 26097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26097 killed at Wed Oct 18 17:03:26 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26163 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26163 found at Wed Oct 18 17:03:26 UTC 2023 selfserv_9355 with PID 26163 started at Wed Oct 18 17:03:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26163 at Wed Oct 18 17:03:27 UTC 2023 kill -USR1 26163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26163 killed at Wed Oct 18 17:03:27 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26215 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26215 found at Wed Oct 18 17:03:27 UTC 2023 selfserv_9355 with PID 26215 started at Wed Oct 18 17:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26215 at Wed Oct 18 17:03:28 UTC 2023 kill -USR1 26215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26215 killed at Wed Oct 18 17:03:28 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26268 found at Wed Oct 18 17:03:29 UTC 2023 selfserv_9355 with PID 26268 started at Wed Oct 18 17:03:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26268 at Wed Oct 18 17:03:30 UTC 2023 kill -USR1 26268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26268 killed at Wed Oct 18 17:03:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26334 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26334 found at Wed Oct 18 17:03:30 UTC 2023 selfserv_9355 with PID 26334 started at Wed Oct 18 17:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26334 at Wed Oct 18 17:03:31 UTC 2023 kill -USR1 26334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26334 killed at Wed Oct 18 17:03:31 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26386 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26386 found at Wed Oct 18 17:03:32 UTC 2023 selfserv_9355 with PID 26386 started at Wed Oct 18 17:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26386 at Wed Oct 18 17:03:33 UTC 2023 kill -USR1 26386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26386 killed at Wed Oct 18 17:03:33 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26438 found at Wed Oct 18 17:03:33 UTC 2023 selfserv_9355 with PID 26438 started at Wed Oct 18 17:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26438 at Wed Oct 18 17:03:34 UTC 2023 kill -USR1 26438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26438 killed at Wed Oct 18 17:03:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26504 found at Wed Oct 18 17:03:35 UTC 2023 selfserv_9355 with PID 26504 started at Wed Oct 18 17:03:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26504 at Wed Oct 18 17:03:36 UTC 2023 kill -USR1 26504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26504 killed at Wed Oct 18 17:03:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26556 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26556 found at Wed Oct 18 17:03:36 UTC 2023 selfserv_9355 with PID 26556 started at Wed Oct 18 17:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26556 at Wed Oct 18 17:03:37 UTC 2023 kill -USR1 26556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26556 killed at Wed Oct 18 17:03:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26608 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26608 found at Wed Oct 18 17:03:38 UTC 2023 selfserv_9355 with PID 26608 started at Wed Oct 18 17:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26608 at Wed Oct 18 17:03:39 UTC 2023 kill -USR1 26608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26608 killed at Wed Oct 18 17:03:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26674 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26674 found at Wed Oct 18 17:03:40 UTC 2023 selfserv_9355 with PID 26674 started at Wed Oct 18 17:03:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26674 at Wed Oct 18 17:03:41 UTC 2023 kill -USR1 26674 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26674 killed at Wed Oct 18 17:03:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26726 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26726 found at Wed Oct 18 17:03:41 UTC 2023 selfserv_9355 with PID 26726 started at Wed Oct 18 17:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26726 at Wed Oct 18 17:03:42 UTC 2023 kill -USR1 26726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26726 killed at Wed Oct 18 17:03:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26778 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26778 found at Wed Oct 18 17:03:43 UTC 2023 selfserv_9355 with PID 26778 started at Wed Oct 18 17:03:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26778 at Wed Oct 18 17:03:44 UTC 2023 kill -USR1 26778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26778 killed at Wed Oct 18 17:03:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26844 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26844 found at Wed Oct 18 17:03:45 UTC 2023 selfserv_9355 with PID 26844 started at Wed Oct 18 17:03:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26844 at Wed Oct 18 17:03:46 UTC 2023 kill -USR1 26844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26844 killed at Wed Oct 18 17:03:46 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26896 found at Wed Oct 18 17:03:46 UTC 2023 selfserv_9355 with PID 26896 started at Wed Oct 18 17:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26896 at Wed Oct 18 17:03:47 UTC 2023 kill -USR1 26896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26896 killed at Wed Oct 18 17:03:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26948 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26948 found at Wed Oct 18 17:03:48 UTC 2023 selfserv_9355 with PID 26948 started at Wed Oct 18 17:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26948 at Wed Oct 18 17:03:49 UTC 2023 kill -USR1 26948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26948 killed at Wed Oct 18 17:03:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27014 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27014 found at Wed Oct 18 17:03:49 UTC 2023 selfserv_9355 with PID 27014 started at Wed Oct 18 17:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27014 at Wed Oct 18 17:03:51 UTC 2023 kill -USR1 27014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27014 killed at Wed Oct 18 17:03:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27066 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27066 found at Wed Oct 18 17:03:51 UTC 2023 selfserv_9355 with PID 27066 started at Wed Oct 18 17:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27066 at Wed Oct 18 17:03:52 UTC 2023 kill -USR1 27066 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27066 killed at Wed Oct 18 17:03:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27118 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27118 found at Wed Oct 18 17:03:53 UTC 2023 selfserv_9355 with PID 27118 started at Wed Oct 18 17:03:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27118 at Wed Oct 18 17:03:54 UTC 2023 kill -USR1 27118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27118 killed at Wed Oct 18 17:03:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27184 found at Wed Oct 18 17:03:54 UTC 2023 selfserv_9355 with PID 27184 started at Wed Oct 18 17:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27184 at Wed Oct 18 17:03:56 UTC 2023 kill -USR1 27184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27184 killed at Wed Oct 18 17:03:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27236 found at Wed Oct 18 17:03:56 UTC 2023 selfserv_9355 with PID 27236 started at Wed Oct 18 17:03:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27236 at Wed Oct 18 17:03:57 UTC 2023 kill -USR1 27236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27236 killed at Wed Oct 18 17:03:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:03:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27288 found at Wed Oct 18 17:03:58 UTC 2023 selfserv_9355 with PID 27288 started at Wed Oct 18 17:03:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27288 at Wed Oct 18 17:03:59 UTC 2023 kill -USR1 27288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27288 killed at Wed Oct 18 17:03:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:03:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:03:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27354 found at Wed Oct 18 17:03:59 UTC 2023 selfserv_9355 with PID 27354 started at Wed Oct 18 17:03:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27354 at Wed Oct 18 17:04:00 UTC 2023 kill -USR1 27354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27354 killed at Wed Oct 18 17:04:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27407 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27407 found at Wed Oct 18 17:04:01 UTC 2023 selfserv_9355 with PID 27407 started at Wed Oct 18 17:04:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27407 at Wed Oct 18 17:04:02 UTC 2023 kill -USR1 27407 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27407 killed at Wed Oct 18 17:04:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27460 found at Wed Oct 18 17:04:03 UTC 2023 selfserv_9355 with PID 27460 started at Wed Oct 18 17:04:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27460 at Wed Oct 18 17:04:04 UTC 2023 kill -USR1 27460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27460 killed at Wed Oct 18 17:04:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27526 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27526 found at Wed Oct 18 17:04:04 UTC 2023 selfserv_9355 with PID 27526 started at Wed Oct 18 17:04:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27526 at Wed Oct 18 17:04:05 UTC 2023 kill -USR1 27526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27526 killed at Wed Oct 18 17:04:05 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27580 found at Wed Oct 18 17:04:06 UTC 2023 selfserv_9355 with PID 27580 started at Wed Oct 18 17:04:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27580 at Wed Oct 18 17:04:07 UTC 2023 kill -USR1 27580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27580 killed at Wed Oct 18 17:04:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27632 found at Wed Oct 18 17:04:07 UTC 2023 selfserv_9355 with PID 27632 started at Wed Oct 18 17:04:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27632 at Wed Oct 18 17:04:09 UTC 2023 kill -USR1 27632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27632 killed at Wed Oct 18 17:04:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27698 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27698 found at Wed Oct 18 17:04:09 UTC 2023 selfserv_9355 with PID 27698 started at Wed Oct 18 17:04:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27698 at Wed Oct 18 17:04:10 UTC 2023 kill -USR1 27698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27698 killed at Wed Oct 18 17:04:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27750 found at Wed Oct 18 17:04:11 UTC 2023 selfserv_9355 with PID 27750 started at Wed Oct 18 17:04:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27750 at Wed Oct 18 17:04:12 UTC 2023 kill -USR1 27750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27750 killed at Wed Oct 18 17:04:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27802 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27802 found at Wed Oct 18 17:04:12 UTC 2023 selfserv_9355 with PID 27802 started at Wed Oct 18 17:04:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27802 at Wed Oct 18 17:04:14 UTC 2023 kill -USR1 27802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27802 killed at Wed Oct 18 17:04:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27868 found at Wed Oct 18 17:04:14 UTC 2023 selfserv_9355 with PID 27868 started at Wed Oct 18 17:04:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27868 at Wed Oct 18 17:04:15 UTC 2023 kill -USR1 27868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27868 killed at Wed Oct 18 17:04:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27920 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27920 found at Wed Oct 18 17:04:15 UTC 2023 selfserv_9355 with PID 27920 started at Wed Oct 18 17:04:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27920 at Wed Oct 18 17:04:16 UTC 2023 kill -USR1 27920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27920 killed at Wed Oct 18 17:04:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27972 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27972 found at Wed Oct 18 17:04:17 UTC 2023 selfserv_9355 with PID 27972 started at Wed Oct 18 17:04:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27972 at Wed Oct 18 17:04:18 UTC 2023 kill -USR1 27972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27972 killed at Wed Oct 18 17:04:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28038 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28038 found at Wed Oct 18 17:04:18 UTC 2023 selfserv_9355 with PID 28038 started at Wed Oct 18 17:04:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28038 at Wed Oct 18 17:04:20 UTC 2023 kill -USR1 28038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28038 killed at Wed Oct 18 17:04:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28095 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28095 found at Wed Oct 18 17:04:20 UTC 2023 selfserv_9355 with PID 28095 started at Wed Oct 18 17:04:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28095 at Wed Oct 18 17:04:21 UTC 2023 kill -USR1 28095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28095 killed at Wed Oct 18 17:04:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28147 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28147 found at Wed Oct 18 17:04:22 UTC 2023 selfserv_9355 with PID 28147 started at Wed Oct 18 17:04:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28147 at Wed Oct 18 17:04:23 UTC 2023 kill -USR1 28147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28147 killed at Wed Oct 18 17:04:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28217 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28217 found at Wed Oct 18 17:04:23 UTC 2023 selfserv_9355 with PID 28217 started at Wed Oct 18 17:04:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28217 at Wed Oct 18 17:04:24 UTC 2023 kill -USR1 28217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28217 killed at Wed Oct 18 17:04:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28271 found at Wed Oct 18 17:04:25 UTC 2023 selfserv_9355 with PID 28271 started at Wed Oct 18 17:04:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28271 at Wed Oct 18 17:04:26 UTC 2023 kill -USR1 28271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28271 killed at Wed Oct 18 17:04:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:04:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28323 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28323 found at Wed Oct 18 17:04:26 UTC 2023 selfserv_9355 with PID 28323 started at Wed Oct 18 17:04:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28323 at Wed Oct 18 17:04:27 UTC 2023 kill -USR1 28323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28323 killed at Wed Oct 18 17:04:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28389 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28389 found at Wed Oct 18 17:04:28 UTC 2023 selfserv_9355 with PID 28389 started at Wed Oct 18 17:04:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28389 at Wed Oct 18 17:04:29 UTC 2023 kill -USR1 28389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28389 killed at Wed Oct 18 17:04:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28441 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28441 found at Wed Oct 18 17:04:29 UTC 2023 selfserv_9355 with PID 28441 started at Wed Oct 18 17:04:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28441 at Wed Oct 18 17:04:31 UTC 2023 kill -USR1 28441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28441 killed at Wed Oct 18 17:04:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28494 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28494 found at Wed Oct 18 17:04:31 UTC 2023 selfserv_9355 with PID 28494 started at Wed Oct 18 17:04:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28494 at Wed Oct 18 17:04:32 UTC 2023 kill -USR1 28494 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28494 killed at Wed Oct 18 17:04:32 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28560 found at Wed Oct 18 17:04:33 UTC 2023 selfserv_9355 with PID 28560 started at Wed Oct 18 17:04:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28560 at Wed Oct 18 17:04:34 UTC 2023 kill -USR1 28560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28560 killed at Wed Oct 18 17:04:34 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28612 found at Wed Oct 18 17:04:35 UTC 2023 selfserv_9355 with PID 28612 started at Wed Oct 18 17:04:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28612 at Wed Oct 18 17:04:36 UTC 2023 kill -USR1 28612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28612 killed at Wed Oct 18 17:04:36 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28664 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28664 found at Wed Oct 18 17:04:37 UTC 2023 selfserv_9355 with PID 28664 started at Wed Oct 18 17:04:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28664 at Wed Oct 18 17:04:38 UTC 2023 kill -USR1 28664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28664 killed at Wed Oct 18 17:04:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28730 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28730 found at Wed Oct 18 17:04:39 UTC 2023 selfserv_9355 with PID 28730 started at Wed Oct 18 17:04:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28730 at Wed Oct 18 17:04:40 UTC 2023 kill -USR1 28730 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28730 killed at Wed Oct 18 17:04:40 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28782 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28782 found at Wed Oct 18 17:04:41 UTC 2023 selfserv_9355 with PID 28782 started at Wed Oct 18 17:04:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28782 at Wed Oct 18 17:04:42 UTC 2023 kill -USR1 28782 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28782 killed at Wed Oct 18 17:04:42 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:04:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28834 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28834 found at Wed Oct 18 17:04:42 UTC 2023 selfserv_9355 with PID 28834 started at Wed Oct 18 17:04:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28834 at Wed Oct 18 17:04:44 UTC 2023 kill -USR1 28834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28834 killed at Wed Oct 18 17:04:44 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9355 starting at Wed Oct 18 17:04:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:04:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:44 UTC 2023 selfserv_9355 with PID 28905 started at Wed Oct 18 17:04:44 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:46 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:46 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:47 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:48 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:49 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:50 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:51 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:52 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:53 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:53 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:54 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:55 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:56 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:58 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:04:59 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:00 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:00 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:01 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:02 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:03 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:04 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:05 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:06 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:06 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:07 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:08 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:10 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:11 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:12 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:12 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:13 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:14 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:15 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:16 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:17 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:18 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:19 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:19 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28905 found at Wed Oct 18 17:05:20 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 28905 at Wed Oct 18 17:05:20 UTC 2023 kill -USR1 28905 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28905 killed at Wed Oct 18 17:05:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:05:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:05:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:21 UTC 2023 selfserv_9355 with PID 30168 started at Wed Oct 18 17:05:21 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:22 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:23 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:23 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:24 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:25 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:25 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:26 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:27 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:28 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:28 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:29 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:30 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:31 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:32 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:33 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:34 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:34 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:35 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:36 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:36 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:37 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:38 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:38 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:39 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:40 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:41 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:42 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:43 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:43 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:44 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:45 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:45 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:46 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:47 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:48 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:48 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:49 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:50 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30168 found at Wed Oct 18 17:05:50 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 30168 at Wed Oct 18 17:05:50 UTC 2023 kill -USR1 30168 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30168 killed at Wed Oct 18 17:05:50 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:05:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:05:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:51 UTC 2023 selfserv_9355 with PID 31434 started at Wed Oct 18 17:05:51 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:52 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:52 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:53 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:53 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:54 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:54 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:55 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:55 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:56 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:57 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:57 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:58 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:58 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:05:59 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:00 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:00 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:01 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:01 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:01 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:02 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:02 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:03 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:03 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:04 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:05 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:05 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:06 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:06 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:07 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:07 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:08 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:08 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:08 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:09 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:09 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:10 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:10 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:11 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:11 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31434 found at Wed Oct 18 17:06:12 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 31434 at Wed Oct 18 17:06:12 UTC 2023 kill -USR1 31434 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31434 killed at Wed Oct 18 17:06:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:06:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:06:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:12 UTC 2023 selfserv_9355 with PID 32696 started at Wed Oct 18 17:06:12 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:13 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:14 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:15 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:15 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:16 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:16 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:17 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:17 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:18 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:18 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:19 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:19 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:20 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:21 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:22 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:22 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:23 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:23 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:24 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:24 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:25 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:25 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:26 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:26 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:27 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:28 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:29 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:29 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:30 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:30 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:31 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:31 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:32 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:32 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:33 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:33 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:34 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:34 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32696 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32696 found at Wed Oct 18 17:06:35 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 32696 at Wed Oct 18 17:06:35 UTC 2023 kill -USR1 32696 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32696 killed at Wed Oct 18 17:06:35 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:06:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:06:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1558 found at Wed Oct 18 17:06:35 UTC 2023 selfserv_9355 with PID 1558 started at Wed Oct 18 17:06:35 UTC 2023 trying to kill selfserv_9355 with PID 1558 at Wed Oct 18 17:06:35 UTC 2023 kill -USR1 1558 ./ssl.sh: line 228: 1558 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1558 killed at Wed Oct 18 17:06:36 UTC 2023 selfserv_9355 starting at Wed Oct 18 17:06:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:06:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:36 UTC 2023 selfserv_9355 with PID 1600 started at Wed Oct 18 17:06:36 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:37 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:38 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:39 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:40 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:41 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:42 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:43 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:44 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:45 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:46 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:47 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:48 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:49 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:51 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:52 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:53 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:54 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:55 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:56 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:57 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:58 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:06:59 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:00 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:01 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:02 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:03 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:04 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:05 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:06 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:07 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:08 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:09 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:10 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:11 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:12 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:13 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:14 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:15 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:16 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1600 found at Wed Oct 18 17:07:17 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1600 at Wed Oct 18 17:07:17 UTC 2023 kill -USR1 1600 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1600 killed at Wed Oct 18 17:07:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:07:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:07:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:17 UTC 2023 selfserv_9355 with PID 2858 started at Wed Oct 18 17:07:17 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:19 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:20 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:21 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:22 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:23 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:24 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:25 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:26 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:27 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:28 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:29 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:30 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:32 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:34 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:35 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:36 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:37 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:38 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:39 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:40 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:41 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:42 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:43 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:44 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:45 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:46 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:48 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:49 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:50 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:51 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:52 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:53 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:54 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:55 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:56 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:57 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:58 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:07:59 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2858 found at Wed Oct 18 17:08:00 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2858 at Wed Oct 18 17:08:00 UTC 2023 kill -USR1 2858 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2858 killed at Wed Oct 18 17:08:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:08:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:01 UTC 2023 selfserv_9355 with PID 4127 started at Wed Oct 18 17:08:01 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:02 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:03 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:04 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:04 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:05 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:06 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:07 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:07 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:08 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:09 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:10 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:11 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:11 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:13 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:14 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:15 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:15 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:16 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:17 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:18 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:18 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:19 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:20 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:21 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:22 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:22 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:24 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:25 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:26 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:26 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:27 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:28 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:29 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:30 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:30 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:31 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:32 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:33 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4127 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4127 found at Wed Oct 18 17:08:33 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4127 at Wed Oct 18 17:08:33 UTC 2023 kill -USR1 4127 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4127 killed at Wed Oct 18 17:08:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:08:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:08:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:34 UTC 2023 selfserv_9355 with PID 5396 started at Wed Oct 18 17:08:34 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:35 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:36 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:36 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:37 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:38 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:38 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:39 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:40 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:40 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:41 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:41 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:42 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:43 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:44 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:45 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:45 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:46 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:46 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:47 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:48 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:48 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:49 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:50 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:50 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:51 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:51 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:53 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:53 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:54 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:55 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:55 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:56 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:56 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:57 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:58 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:58 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:59 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:08:59 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5396 found at Wed Oct 18 17:09:00 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5396 at Wed Oct 18 17:09:00 UTC 2023 kill -USR1 5396 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5396 killed at Wed Oct 18 17:09:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:01 UTC 2023 selfserv_9355 with PID 6654 started at Wed Oct 18 17:09:01 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:02 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:02 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:03 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:04 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:04 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:05 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:06 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:06 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:07 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:08 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:09 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:09 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:10 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:11 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:12 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:13 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:13 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:14 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:14 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:15 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:16 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:16 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:17 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:18 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:18 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:19 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:20 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:21 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:22 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:22 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:23 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:24 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:24 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:25 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:26 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:26 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:27 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:28 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6654 found at Wed Oct 18 17:09:28 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6654 at Wed Oct 18 17:09:28 UTC 2023 kill -USR1 6654 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6654 killed at Wed Oct 18 17:09:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:09:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:09:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:29 UTC 2023 selfserv_9355 with PID 7923 started at Wed Oct 18 17:09:29 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:30 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:31 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:31 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:32 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:32 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:39 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:42 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:44 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:44 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:45 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:49 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7923 found at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7923 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 7923 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7923 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9182 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9182 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9355 with PID 9182 started at Wed Oct 18 17:09:56 UTC 2023 trying to kill selfserv_9355 with PID 9182 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 9182 ./ssl.sh: line 228: 9182 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9182 killed at Wed Oct 18 17:09:56 UTC 2023 selfserv_9355 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9355 with PID 9224 started at Wed Oct 18 17:09:56 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:00 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:03 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:05 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:07 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:08 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9224 at Wed Oct 18 17:10:37 UTC 2023 kill -USR1 9224 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9224 killed at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:10:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:10:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:38 UTC 2023 selfserv_9355 with PID 10493 started at Wed Oct 18 17:10:38 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10493 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10493 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10493 at Wed Oct 18 17:11:20 UTC 2023 kill -USR1 10493 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10493 killed at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:11:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:21 UTC 2023 selfserv_9355 with PID 11756 started at Wed Oct 18 17:11:21 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:32 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:44 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:45 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:46 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:47 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:47 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:48 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:49 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:52 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:53 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11756 found at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11756 at Wed Oct 18 17:11:54 UTC 2023 kill -USR1 11756 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11756 killed at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:54 UTC 2023 selfserv_9355 with PID 13020 started at Wed Oct 18 17:11:54 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:55 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:11:59 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:01 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:03 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:04 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:04 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:05 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:05 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:06 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:07 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:07 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:08 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:09 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:09 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:10 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:10 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:11 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:12 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:13 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:14 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:14 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:15 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:15 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:16 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:17 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:17 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:18 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:18 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:19 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:20 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13020 found at Wed Oct 18 17:12:20 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13020 at Wed Oct 18 17:12:20 UTC 2023 kill -USR1 13020 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13020 killed at Wed Oct 18 17:12:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:12:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:12:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:21 UTC 2023 selfserv_9355 with PID 14296 started at Wed Oct 18 17:12:21 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:22 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:23 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:23 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:24 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:25 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:25 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:26 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:27 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:27 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:28 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:29 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:29 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:30 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:31 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:32 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:33 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:33 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:34 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:36 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:37 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:37 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:38 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:39 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:39 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:41 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:41 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14296 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14296 found at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14296 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 14296 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14296 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9355 with PID 15560 started at Wed Oct 18 17:12:49 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:52 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:53 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:53 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:54 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:55 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:55 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:56 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:57 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:57 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:58 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:12:59 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:00 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:00 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:01 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:02 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:02 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:03 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:03 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:04 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:05 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:05 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:06 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:07 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:08 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:09 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:09 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:10 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:10 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:11 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:13 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:15 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15560 found at Wed Oct 18 17:13:15 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15560 at Wed Oct 18 17:13:15 UTC 2023 kill -USR1 15560 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15560 killed at Wed Oct 18 17:13:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:13:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16818 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16818 found at Wed Oct 18 17:13:16 UTC 2023 selfserv_9355 with PID 16818 started at Wed Oct 18 17:13:16 UTC 2023 trying to kill selfserv_9355 with PID 16818 at Wed Oct 18 17:13:16 UTC 2023 kill -USR1 16818 ./ssl.sh: line 228: 16818 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9355 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16818 killed at Wed Oct 18 17:13:16 UTC 2023 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9355 starting at Wed Oct 18 17:13:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -M 3 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16923 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16923 found at Wed Oct 18 17:13:17 UTC 2023 selfserv_9355 with PID 16923 started at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16923 at Wed Oct 18 17:13:18 UTC 2023 kill -USR1 16923 SIG_USER: Parent got sig_user, killing children (3). Child 3 exited with exit code 100 Child 2 exited with exit code 100 Child 1 exited with exit code 100 selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16923 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9355 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16988 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16988 found at Wed Oct 18 17:13:19 UTC 2023 selfserv_9355 with PID 16988 started at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #663: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #666: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #667: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #668: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #669: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #670: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #671: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #672: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #673: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #674: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #683: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #686: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #687: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #688: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #689: Restrict RSA keys on signing produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #690: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #691: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #692: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #693: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #694: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #695: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16988 at Wed Oct 18 17:13:28 UTC 2023 kill -USR1 16988 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16988 killed at Wed Oct 18 17:13:28 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:13:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:13:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 17505 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17505 found at Wed Oct 18 17:13:29 UTC 2023 selfserv_9355 with PID 17505 started at Wed Oct 18 17:13:29 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 17505 at Wed Oct 18 17:13:43 UTC 2023 kill -USR1 17505 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17505 killed at Wed Oct 18 17:13:43 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:13:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:13:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 18054 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18054 found at Wed Oct 18 17:13:44 UTC 2023 selfserv_9355 with PID 18054 started at Wed Oct 18 17:13:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18054 at Wed Oct 18 17:14:07 UTC 2023 kill -USR1 18054 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18054 killed at Wed Oct 18 17:14:08 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:14:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18853 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18853 found at Wed Oct 18 17:14:08 UTC 2023 selfserv_9355 with PID 18853 started at Wed Oct 18 17:14:08 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18853 at Wed Oct 18 17:14:09 UTC 2023 kill -USR1 18853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18853 killed at Wed Oct 18 17:14:09 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18920 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18920 found at Wed Oct 18 17:14:09 UTC 2023 selfserv_9355 with PID 18920 started at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18920 at Wed Oct 18 17:14:11 UTC 2023 kill -USR1 18920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18920 killed at Wed Oct 18 17:14:11 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18972 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18972 found at Wed Oct 18 17:14:11 UTC 2023 selfserv_9355 with PID 18972 started at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18972 at Wed Oct 18 17:14:12 UTC 2023 kill -USR1 18972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18972 killed at Wed Oct 18 17:14:12 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19024 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19024 found at Wed Oct 18 17:14:12 UTC 2023 selfserv_9355 with PID 19024 started at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19024 at Wed Oct 18 17:14:14 UTC 2023 kill -USR1 19024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19024 killed at Wed Oct 18 17:14:14 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19076 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19076 found at Wed Oct 18 17:14:14 UTC 2023 selfserv_9355 with PID 19076 started at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19076 at Wed Oct 18 17:14:16 UTC 2023 kill -USR1 19076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19076 killed at Wed Oct 18 17:14:16 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19128 found at Wed Oct 18 17:14:16 UTC 2023 selfserv_9355 with PID 19128 started at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19128 at Wed Oct 18 17:14:17 UTC 2023 kill -USR1 19128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19128 killed at Wed Oct 18 17:14:17 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19180 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9355 with PID 19180 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19180 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 19180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19180 killed at Wed Oct 18 17:14:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19237 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19237 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9355 with PID 19237 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19237 at Wed Oct 18 17:14:21 UTC 2023 kill -USR1 19237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19237 killed at Wed Oct 18 17:14:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19292 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19292 found at Wed Oct 18 17:14:21 UTC 2023 selfserv_9355 with PID 19292 started at Wed Oct 18 17:14:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19292 at Wed Oct 18 17:14:22 UTC 2023 kill -USR1 19292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19292 killed at Wed Oct 18 17:14:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19350 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19350 found at Wed Oct 18 17:14:23 UTC 2023 selfserv_9355 with PID 19350 started at Wed Oct 18 17:14:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19350 at Wed Oct 18 17:14:24 UTC 2023 kill -USR1 19350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19350 killed at Wed Oct 18 17:14:24 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19403 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19403 found at Wed Oct 18 17:14:24 UTC 2023 selfserv_9355 with PID 19403 started at Wed Oct 18 17:14:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19403 at Wed Oct 18 17:14:25 UTC 2023 kill -USR1 19403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19403 killed at Wed Oct 18 17:14:26 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19456 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19456 found at Wed Oct 18 17:14:26 UTC 2023 selfserv_9355 with PID 19456 started at Wed Oct 18 17:14:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19456 at Wed Oct 18 17:14:27 UTC 2023 kill -USR1 19456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19456 killed at Wed Oct 18 17:14:27 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19508 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19508 found at Wed Oct 18 17:14:27 UTC 2023 selfserv_9355 with PID 19508 started at Wed Oct 18 17:14:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19508 at Wed Oct 18 17:14:29 UTC 2023 kill -USR1 19508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19508 killed at Wed Oct 18 17:14:29 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19560 found at Wed Oct 18 17:14:29 UTC 2023 selfserv_9355 with PID 19560 started at Wed Oct 18 17:14:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19560 at Wed Oct 18 17:14:30 UTC 2023 kill -USR1 19560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19560 killed at Wed Oct 18 17:14:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19612 found at Wed Oct 18 17:14:31 UTC 2023 selfserv_9355 with PID 19612 started at Wed Oct 18 17:14:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19612 at Wed Oct 18 17:14:32 UTC 2023 kill -USR1 19612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19612 killed at Wed Oct 18 17:14:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19664 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19664 found at Wed Oct 18 17:14:33 UTC 2023 selfserv_9355 with PID 19664 started at Wed Oct 18 17:14:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19664 at Wed Oct 18 17:14:34 UTC 2023 kill -USR1 19664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19664 killed at Wed Oct 18 17:14:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19716 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19716 found at Wed Oct 18 17:14:35 UTC 2023 selfserv_9355 with PID 19716 started at Wed Oct 18 17:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19716 at Wed Oct 18 17:14:36 UTC 2023 kill -USR1 19716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19716 killed at Wed Oct 18 17:14:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19768 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19768 found at Wed Oct 18 17:14:36 UTC 2023 selfserv_9355 with PID 19768 started at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19768 at Wed Oct 18 17:14:38 UTC 2023 kill -USR1 19768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19768 killed at Wed Oct 18 17:14:38 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19820 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19820 found at Wed Oct 18 17:14:38 UTC 2023 selfserv_9355 with PID 19820 started at Wed Oct 18 17:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19820 at Wed Oct 18 17:14:40 UTC 2023 kill -USR1 19820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19820 killed at Wed Oct 18 17:14:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19872 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19872 found at Wed Oct 18 17:14:40 UTC 2023 selfserv_9355 with PID 19872 started at Wed Oct 18 17:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19872 at Wed Oct 18 17:14:42 UTC 2023 kill -USR1 19872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19872 killed at Wed Oct 18 17:14:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19924 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19924 found at Wed Oct 18 17:14:42 UTC 2023 selfserv_9355 with PID 19924 started at Wed Oct 18 17:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19924 at Wed Oct 18 17:14:43 UTC 2023 kill -USR1 19924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19924 killed at Wed Oct 18 17:14:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19976 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19976 found at Wed Oct 18 17:14:44 UTC 2023 selfserv_9355 with PID 19976 started at Wed Oct 18 17:14:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19976 at Wed Oct 18 17:14:45 UTC 2023 kill -USR1 19976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19976 killed at Wed Oct 18 17:14:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20028 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20028 found at Wed Oct 18 17:14:46 UTC 2023 selfserv_9355 with PID 20028 started at Wed Oct 18 17:14:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20028 at Wed Oct 18 17:14:47 UTC 2023 kill -USR1 20028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20028 killed at Wed Oct 18 17:14:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20080 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20080 found at Wed Oct 18 17:14:48 UTC 2023 selfserv_9355 with PID 20080 started at Wed Oct 18 17:14:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20080 at Wed Oct 18 17:14:49 UTC 2023 kill -USR1 20080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20080 killed at Wed Oct 18 17:14:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20132 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20132 found at Wed Oct 18 17:14:49 UTC 2023 selfserv_9355 with PID 20132 started at Wed Oct 18 17:14:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20132 at Wed Oct 18 17:14:51 UTC 2023 kill -USR1 20132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20132 killed at Wed Oct 18 17:14:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20184 found at Wed Oct 18 17:14:51 UTC 2023 selfserv_9355 with PID 20184 started at Wed Oct 18 17:14:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20184 at Wed Oct 18 17:14:52 UTC 2023 kill -USR1 20184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20184 killed at Wed Oct 18 17:14:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20236 found at Wed Oct 18 17:14:53 UTC 2023 selfserv_9355 with PID 20236 started at Wed Oct 18 17:14:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20236 at Wed Oct 18 17:14:54 UTC 2023 kill -USR1 20236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20236 killed at Wed Oct 18 17:14:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20288 found at Wed Oct 18 17:14:54 UTC 2023 selfserv_9355 with PID 20288 started at Wed Oct 18 17:14:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20288 at Wed Oct 18 17:14:56 UTC 2023 kill -USR1 20288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20288 killed at Wed Oct 18 17:14:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20340 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20340 found at Wed Oct 18 17:14:56 UTC 2023 selfserv_9355 with PID 20340 started at Wed Oct 18 17:14:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #817: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20340 at Wed Oct 18 17:14:57 UTC 2023 kill -USR1 20340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20340 killed at Wed Oct 18 17:14:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:14:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20392 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20392 found at Wed Oct 18 17:14:58 UTC 2023 selfserv_9355 with PID 20392 started at Wed Oct 18 17:14:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20392 at Wed Oct 18 17:14:59 UTC 2023 kill -USR1 20392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20392 killed at Wed Oct 18 17:14:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:14:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:14:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20444 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20444 found at Wed Oct 18 17:14:59 UTC 2023 selfserv_9355 with PID 20444 started at Wed Oct 18 17:14:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20444 at Wed Oct 18 17:15:01 UTC 2023 kill -USR1 20444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20444 killed at Wed Oct 18 17:15:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20496 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20496 found at Wed Oct 18 17:15:01 UTC 2023 selfserv_9355 with PID 20496 started at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20496 at Wed Oct 18 17:15:02 UTC 2023 kill -USR1 20496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20496 killed at Wed Oct 18 17:15:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20548 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20548 found at Wed Oct 18 17:15:03 UTC 2023 selfserv_9355 with PID 20548 started at Wed Oct 18 17:15:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20548 at Wed Oct 18 17:15:04 UTC 2023 kill -USR1 20548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20548 killed at Wed Oct 18 17:15:04 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20600 found at Wed Oct 18 17:15:04 UTC 2023 selfserv_9355 with PID 20600 started at Wed Oct 18 17:15:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20600 at Wed Oct 18 17:15:06 UTC 2023 kill -USR1 20600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20600 killed at Wed Oct 18 17:15:06 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20652 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20652 found at Wed Oct 18 17:15:06 UTC 2023 selfserv_9355 with PID 20652 started at Wed Oct 18 17:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20652 at Wed Oct 18 17:15:07 UTC 2023 kill -USR1 20652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20652 killed at Wed Oct 18 17:15:07 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20704 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20704 found at Wed Oct 18 17:15:08 UTC 2023 selfserv_9355 with PID 20704 started at Wed Oct 18 17:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20704 at Wed Oct 18 17:15:09 UTC 2023 kill -USR1 20704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20704 killed at Wed Oct 18 17:15:09 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20756 found at Wed Oct 18 17:15:09 UTC 2023 selfserv_9355 with PID 20756 started at Wed Oct 18 17:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20756 at Wed Oct 18 17:15:11 UTC 2023 kill -USR1 20756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20756 killed at Wed Oct 18 17:15:11 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20808 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20808 found at Wed Oct 18 17:15:11 UTC 2023 selfserv_9355 with PID 20808 started at Wed Oct 18 17:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20808 at Wed Oct 18 17:15:13 UTC 2023 kill -USR1 20808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20808 killed at Wed Oct 18 17:15:13 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20880 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20880 found at Wed Oct 18 17:15:13 UTC 2023 selfserv_9355 with PID 20880 started at Wed Oct 18 17:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20880 at Wed Oct 18 17:15:14 UTC 2023 kill -USR1 20880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20880 killed at Wed Oct 18 17:15:14 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20936 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20936 found at Wed Oct 18 17:15:15 UTC 2023 selfserv_9355 with PID 20936 started at Wed Oct 18 17:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #828: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20936 at Wed Oct 18 17:15:16 UTC 2023 kill -USR1 20936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20936 killed at Wed Oct 18 17:15:16 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21020 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21020 found at Wed Oct 18 17:15:16 UTC 2023 selfserv_9355 with PID 21020 started at Wed Oct 18 17:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21020 at Wed Oct 18 17:15:17 UTC 2023 kill -USR1 21020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21020 killed at Wed Oct 18 17:15:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21072 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21072 found at Wed Oct 18 17:15:18 UTC 2023 selfserv_9355 with PID 21072 started at Wed Oct 18 17:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21072 at Wed Oct 18 17:15:19 UTC 2023 kill -USR1 21072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21072 killed at Wed Oct 18 17:15:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21124 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21124 found at Wed Oct 18 17:15:19 UTC 2023 selfserv_9355 with PID 21124 started at Wed Oct 18 17:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21124 at Wed Oct 18 17:15:20 UTC 2023 kill -USR1 21124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21124 killed at Wed Oct 18 17:15:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21181 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21181 found at Wed Oct 18 17:15:21 UTC 2023 selfserv_9355 with PID 21181 started at Wed Oct 18 17:15:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21181 at Wed Oct 18 17:15:22 UTC 2023 kill -USR1 21181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21181 killed at Wed Oct 18 17:15:22 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21233 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21233 found at Wed Oct 18 17:15:22 UTC 2023 selfserv_9355 with PID 21233 started at Wed Oct 18 17:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21233 at Wed Oct 18 17:15:23 UTC 2023 kill -USR1 21233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21233 killed at Wed Oct 18 17:15:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21289 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21289 found at Wed Oct 18 17:15:24 UTC 2023 selfserv_9355 with PID 21289 started at Wed Oct 18 17:15:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21289 at Wed Oct 18 17:15:25 UTC 2023 kill -USR1 21289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21289 killed at Wed Oct 18 17:15:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21343 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21343 found at Wed Oct 18 17:15:25 UTC 2023 selfserv_9355 with PID 21343 started at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21343 at Wed Oct 18 17:15:26 UTC 2023 kill -USR1 21343 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21343 killed at Wed Oct 18 17:15:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21396 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21396 found at Wed Oct 18 17:15:27 UTC 2023 selfserv_9355 with PID 21396 started at Wed Oct 18 17:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21396 at Wed Oct 18 17:15:28 UTC 2023 kill -USR1 21396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21396 killed at Wed Oct 18 17:15:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21448 found at Wed Oct 18 17:15:28 UTC 2023 selfserv_9355 with PID 21448 started at Wed Oct 18 17:15:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21448 at Wed Oct 18 17:15:30 UTC 2023 kill -USR1 21448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21448 killed at Wed Oct 18 17:15:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21500 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21500 found at Wed Oct 18 17:15:30 UTC 2023 selfserv_9355 with PID 21500 started at Wed Oct 18 17:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21500 at Wed Oct 18 17:15:31 UTC 2023 kill -USR1 21500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21500 killed at Wed Oct 18 17:15:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21552 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21552 found at Wed Oct 18 17:15:32 UTC 2023 selfserv_9355 with PID 21552 started at Wed Oct 18 17:15:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21552 at Wed Oct 18 17:15:33 UTC 2023 kill -USR1 21552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21552 killed at Wed Oct 18 17:15:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21604 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21604 found at Wed Oct 18 17:15:33 UTC 2023 selfserv_9355 with PID 21604 started at Wed Oct 18 17:15:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21604 at Wed Oct 18 17:15:35 UTC 2023 kill -USR1 21604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21604 killed at Wed Oct 18 17:15:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21656 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21656 found at Wed Oct 18 17:15:35 UTC 2023 selfserv_9355 with PID 21656 started at Wed Oct 18 17:15:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21656 at Wed Oct 18 17:15:36 UTC 2023 kill -USR1 21656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21656 killed at Wed Oct 18 17:15:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21708 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21708 found at Wed Oct 18 17:15:37 UTC 2023 selfserv_9355 with PID 21708 started at Wed Oct 18 17:15:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21708 at Wed Oct 18 17:15:38 UTC 2023 kill -USR1 21708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21708 killed at Wed Oct 18 17:15:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21760 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21760 found at Wed Oct 18 17:15:38 UTC 2023 selfserv_9355 with PID 21760 started at Wed Oct 18 17:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21760 at Wed Oct 18 17:15:39 UTC 2023 kill -USR1 21760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21760 killed at Wed Oct 18 17:15:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:15:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21812 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21812 found at Wed Oct 18 17:15:40 UTC 2023 selfserv_9355 with PID 21812 started at Wed Oct 18 17:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21812 at Wed Oct 18 17:15:41 UTC 2023 kill -USR1 21812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21812 killed at Wed Oct 18 17:15:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21864 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21864 found at Wed Oct 18 17:15:41 UTC 2023 selfserv_9355 with PID 21864 started at Wed Oct 18 17:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21864 at Wed Oct 18 17:15:43 UTC 2023 kill -USR1 21864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21864 killed at Wed Oct 18 17:15:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21916 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21916 found at Wed Oct 18 17:15:43 UTC 2023 selfserv_9355 with PID 21916 started at Wed Oct 18 17:15:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21916 at Wed Oct 18 17:15:45 UTC 2023 kill -USR1 21916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21916 killed at Wed Oct 18 17:15:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:15:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21968 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21968 found at Wed Oct 18 17:15:45 UTC 2023 selfserv_9355 with PID 21968 started at Wed Oct 18 17:15:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21968 at Wed Oct 18 17:15:46 UTC 2023 kill -USR1 21968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21968 killed at Wed Oct 18 17:15:46 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:15:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22026 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22026 found at Wed Oct 18 17:15:47 UTC 2023 selfserv_9355 with PID 22026 started at Wed Oct 18 17:15:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22026 at Wed Oct 18 17:15:48 UTC 2023 kill -USR1 22026 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22026 killed at Wed Oct 18 17:15:48 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:15:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22084 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22084 found at Wed Oct 18 17:15:48 UTC 2023 selfserv_9355 with PID 22084 started at Wed Oct 18 17:15:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22084 at Wed Oct 18 17:15:50 UTC 2023 kill -USR1 22084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22084 killed at Wed Oct 18 17:15:50 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:15:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22142 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22142 found at Wed Oct 18 17:15:50 UTC 2023 selfserv_9355 with PID 22142 started at Wed Oct 18 17:15:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22142 at Wed Oct 18 17:15:51 UTC 2023 kill -USR1 22142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22142 killed at Wed Oct 18 17:15:51 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:15:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22200 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22200 found at Wed Oct 18 17:15:52 UTC 2023 selfserv_9355 with PID 22200 started at Wed Oct 18 17:15:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22200 at Wed Oct 18 17:15:53 UTC 2023 kill -USR1 22200 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22200 killed at Wed Oct 18 17:15:53 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 17:15:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22258 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22258 found at Wed Oct 18 17:15:53 UTC 2023 selfserv_9355 with PID 22258 started at Wed Oct 18 17:15:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #852: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22258 at Wed Oct 18 17:15:54 UTC 2023 kill -USR1 22258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22258 killed at Wed Oct 18 17:15:54 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:15:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22316 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22316 found at Wed Oct 18 17:15:55 UTC 2023 selfserv_9355 with PID 22316 started at Wed Oct 18 17:15:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22316 at Wed Oct 18 17:15:56 UTC 2023 kill -USR1 22316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22316 killed at Wed Oct 18 17:15:56 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:15:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22374 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22374 found at Wed Oct 18 17:15:56 UTC 2023 selfserv_9355 with PID 22374 started at Wed Oct 18 17:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22374 at Wed Oct 18 17:15:58 UTC 2023 kill -USR1 22374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22374 killed at Wed Oct 18 17:15:58 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:15:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22432 found at Wed Oct 18 17:15:58 UTC 2023 selfserv_9355 with PID 22432 started at Wed Oct 18 17:15:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #855: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22432 at Wed Oct 18 17:16:00 UTC 2023 kill -USR1 22432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22432 killed at Wed Oct 18 17:16:00 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:16:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22490 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22490 found at Wed Oct 18 17:16:00 UTC 2023 selfserv_9355 with PID 22490 started at Wed Oct 18 17:16:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #856: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22490 at Wed Oct 18 17:16:01 UTC 2023 kill -USR1 22490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22490 killed at Wed Oct 18 17:16:01 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:16:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22548 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22548 found at Wed Oct 18 17:16:02 UTC 2023 selfserv_9355 with PID 22548 started at Wed Oct 18 17:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22548 at Wed Oct 18 17:16:02 UTC 2023 kill -USR1 22548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22548 killed at Wed Oct 18 17:16:02 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 17:16:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22590 found at Wed Oct 18 17:16:03 UTC 2023 selfserv_9355 with PID 22590 started at Wed Oct 18 17:16:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #790: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22590 at Wed Oct 18 17:16:04 UTC 2023 kill -USR1 22590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22590 killed at Wed Oct 18 17:16:04 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 17:16:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22632 found at Wed Oct 18 17:16:04 UTC 2023 selfserv_9355 with PID 22632 started at Wed Oct 18 17:16:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 22632 at Wed Oct 18 17:16:05 UTC 2023 kill -USR1 22632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22632 killed at Wed Oct 18 17:16:06 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 17:16:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22674 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22674 found at Wed Oct 18 17:16:06 UTC 2023 selfserv_9355 with PID 22674 started at Wed Oct 18 17:16:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 22674 at Wed Oct 18 17:16:07 UTC 2023 kill -USR1 22674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22674 killed at Wed Oct 18 17:16:07 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 17:16:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22716 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22716 found at Wed Oct 18 17:16:07 UTC 2023 selfserv_9355 with PID 22716 started at Wed Oct 18 17:16:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 22716 at Wed Oct 18 17:16:08 UTC 2023 kill -USR1 22716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22716 killed at Wed Oct 18 17:16:08 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 17:16:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22758 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22758 found at Wed Oct 18 17:16:09 UTC 2023 selfserv_9355 with PID 22758 started at Wed Oct 18 17:16:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 22758 at Wed Oct 18 17:16:09 UTC 2023 kill -USR1 22758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22758 killed at Wed Oct 18 17:16:10 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 17:16:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22801 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22801 found at Wed Oct 18 17:16:10 UTC 2023 selfserv_9355 with PID 22801 started at Wed Oct 18 17:16:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 22801 at Wed Oct 18 17:16:11 UTC 2023 kill -USR1 22801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22801 killed at Wed Oct 18 17:16:11 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 17:16:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22843 found at Wed Oct 18 17:16:11 UTC 2023 selfserv_9355 with PID 22843 started at Wed Oct 18 17:16:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #796: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 22843 at Wed Oct 18 17:16:12 UTC 2023 kill -USR1 22843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22843 killed at Wed Oct 18 17:16:12 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 17:16:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22885 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22885 found at Wed Oct 18 17:16:12 UTC 2023 selfserv_9355 with PID 22885 started at Wed Oct 18 17:16:12 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:16:12 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:16:56 UTC 2023 ssl.sh: #797: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 22885 at Wed Oct 18 17:16:56 UTC 2023 kill -USR1 22885 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22885 killed at Wed Oct 18 17:16:56 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:16:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22953 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22953 found at Wed Oct 18 17:16:57 UTC 2023 selfserv_9355 with PID 22953 started at Wed Oct 18 17:16:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22953 at Wed Oct 18 17:16:58 UTC 2023 kill -USR1 22953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22953 killed at Wed Oct 18 17:16:58 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:16:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22995 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22995 found at Wed Oct 18 17:16:58 UTC 2023 selfserv_9355 with PID 22995 started at Wed Oct 18 17:16:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22995 at Wed Oct 18 17:16:59 UTC 2023 kill -USR1 22995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22995 killed at Wed Oct 18 17:16:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:16:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23034 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23034 found at Wed Oct 18 17:16:59 UTC 2023 selfserv_9355 with PID 23034 started at Wed Oct 18 17:16:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 23034 at Wed Oct 18 17:17:00 UTC 2023 kill -USR1 23034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23034 killed at Wed Oct 18 17:17:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23073 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23073 found at Wed Oct 18 17:17:00 UTC 2023 selfserv_9355 with PID 23073 started at Wed Oct 18 17:17:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23073 at Wed Oct 18 17:17:01 UTC 2023 kill -USR1 23073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23073 killed at Wed Oct 18 17:17:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23112 found at Wed Oct 18 17:17:01 UTC 2023 selfserv_9355 with PID 23112 started at Wed Oct 18 17:17:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #802: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 23112 at Wed Oct 18 17:17:02 UTC 2023 kill -USR1 23112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23112 killed at Wed Oct 18 17:17:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23151 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23151 found at Wed Oct 18 17:17:02 UTC 2023 selfserv_9355 with PID 23151 started at Wed Oct 18 17:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23151 at Wed Oct 18 17:17:03 UTC 2023 kill -USR1 23151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23151 killed at Wed Oct 18 17:17:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23190 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23190 found at Wed Oct 18 17:17:03 UTC 2023 selfserv_9355 with PID 23190 started at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23190 at Wed Oct 18 17:17:04 UTC 2023 kill -USR1 23190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23190 killed at Wed Oct 18 17:17:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23229 found at Wed Oct 18 17:17:04 UTC 2023 selfserv_9355 with PID 23229 started at Wed Oct 18 17:17:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23229 at Wed Oct 18 17:17:05 UTC 2023 kill -USR1 23229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23229 killed at Wed Oct 18 17:17:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23268 found at Wed Oct 18 17:17:05 UTC 2023 selfserv_9355 with PID 23268 started at Wed Oct 18 17:17:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23268 at Wed Oct 18 17:17:06 UTC 2023 kill -USR1 23268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23268 killed at Wed Oct 18 17:17:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23307 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23307 found at Wed Oct 18 17:17:06 UTC 2023 selfserv_9355 with PID 23307 started at Wed Oct 18 17:17:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23307 at Wed Oct 18 17:17:07 UTC 2023 kill -USR1 23307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23307 killed at Wed Oct 18 17:17:07 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23346 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23346 found at Wed Oct 18 17:17:07 UTC 2023 selfserv_9355 with PID 23346 started at Wed Oct 18 17:17:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23346 at Wed Oct 18 17:17:08 UTC 2023 kill -USR1 23346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23346 killed at Wed Oct 18 17:17:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23386 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23386 found at Wed Oct 18 17:17:08 UTC 2023 selfserv_9355 with PID 23386 started at Wed Oct 18 17:17:08 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23386 at Wed Oct 18 17:17:09 UTC 2023 kill -USR1 23386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23386 killed at Wed Oct 18 17:17:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23426 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23426 found at Wed Oct 18 17:17:09 UTC 2023 selfserv_9355 with PID 23426 started at Wed Oct 18 17:17:09 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23426 at Wed Oct 18 17:17:10 UTC 2023 kill -USR1 23426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23426 killed at Wed Oct 18 17:17:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23466 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23466 found at Wed Oct 18 17:17:10 UTC 2023 selfserv_9355 with PID 23466 started at Wed Oct 18 17:17:10 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23466 at Wed Oct 18 17:17:11 UTC 2023 kill -USR1 23466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23466 killed at Wed Oct 18 17:17:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23506 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23506 found at Wed Oct 18 17:17:11 UTC 2023 selfserv_9355 with PID 23506 started at Wed Oct 18 17:17:11 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23506 at Wed Oct 18 17:17:12 UTC 2023 kill -USR1 23506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23506 killed at Wed Oct 18 17:17:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23546 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23546 found at Wed Oct 18 17:17:12 UTC 2023 selfserv_9355 with PID 23546 started at Wed Oct 18 17:17:12 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23546 at Wed Oct 18 17:17:13 UTC 2023 kill -USR1 23546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23546 killed at Wed Oct 18 17:17:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23586 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23586 found at Wed Oct 18 17:17:13 UTC 2023 selfserv_9355 with PID 23586 started at Wed Oct 18 17:17:13 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23586 at Wed Oct 18 17:17:14 UTC 2023 kill -USR1 23586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23586 killed at Wed Oct 18 17:17:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23626 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23626 found at Wed Oct 18 17:17:14 UTC 2023 selfserv_9355 with PID 23626 started at Wed Oct 18 17:17:14 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23626 at Wed Oct 18 17:17:15 UTC 2023 kill -USR1 23626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23626 killed at Wed Oct 18 17:17:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:17:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23666 found at Wed Oct 18 17:17:15 UTC 2023 selfserv_9355 with PID 23666 started at Wed Oct 18 17:17:15 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23666 at Wed Oct 18 17:17:16 UTC 2023 kill -USR1 23666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23666 killed at Wed Oct 18 17:17:16 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:17:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 23706 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23706 found at Wed Oct 18 17:17:16 UTC 2023 selfserv_9355 with PID 23706 started at Wed Oct 18 17:17:16 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 23706 at Wed Oct 18 17:17:31 UTC 2023 kill -USR1 23706 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23706 killed at Wed Oct 18 17:17:31 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:17:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 24266 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24266 found at Wed Oct 18 17:17:32 UTC 2023 selfserv_9355 with PID 24266 started at Wed Oct 18 17:17:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24266 at Wed Oct 18 17:17:54 UTC 2023 kill -USR1 24266 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24266 killed at Wed Oct 18 17:17:54 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:17:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25078 found at Wed Oct 18 17:17:55 UTC 2023 selfserv_9355 with PID 25078 started at Wed Oct 18 17:17:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25078 at Wed Oct 18 17:17:57 UTC 2023 kill -USR1 25078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25078 killed at Wed Oct 18 17:17:57 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:17:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25132 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25132 found at Wed Oct 18 17:17:57 UTC 2023 selfserv_9355 with PID 25132 started at Wed Oct 18 17:17:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25132 at Wed Oct 18 17:17:59 UTC 2023 kill -USR1 25132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25132 killed at Wed Oct 18 17:17:59 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:17:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:17:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25184 found at Wed Oct 18 17:17:59 UTC 2023 selfserv_9355 with PID 25184 started at Wed Oct 18 17:17:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25184 at Wed Oct 18 17:18:02 UTC 2023 kill -USR1 25184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25184 killed at Wed Oct 18 17:18:02 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25236 found at Wed Oct 18 17:18:02 UTC 2023 selfserv_9355 with PID 25236 started at Wed Oct 18 17:18:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25236 at Wed Oct 18 17:18:04 UTC 2023 kill -USR1 25236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25236 killed at Wed Oct 18 17:18:05 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25288 found at Wed Oct 18 17:18:05 UTC 2023 selfserv_9355 with PID 25288 started at Wed Oct 18 17:18:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25288 at Wed Oct 18 17:18:07 UTC 2023 kill -USR1 25288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25288 killed at Wed Oct 18 17:18:07 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25340 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25340 found at Wed Oct 18 17:18:07 UTC 2023 selfserv_9355 with PID 25340 started at Wed Oct 18 17:18:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25340 at Wed Oct 18 17:18:10 UTC 2023 kill -USR1 25340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25340 killed at Wed Oct 18 17:18:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25392 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25392 found at Wed Oct 18 17:18:10 UTC 2023 selfserv_9355 with PID 25392 started at Wed Oct 18 17:18:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25392 at Wed Oct 18 17:18:12 UTC 2023 kill -USR1 25392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25392 killed at Wed Oct 18 17:18:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25444 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25444 found at Wed Oct 18 17:18:13 UTC 2023 selfserv_9355 with PID 25444 started at Wed Oct 18 17:18:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25444 at Wed Oct 18 17:18:15 UTC 2023 kill -USR1 25444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25444 killed at Wed Oct 18 17:18:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25496 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25496 found at Wed Oct 18 17:18:15 UTC 2023 selfserv_9355 with PID 25496 started at Wed Oct 18 17:18:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25496 at Wed Oct 18 17:18:18 UTC 2023 kill -USR1 25496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25496 killed at Wed Oct 18 17:18:18 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25548 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25548 found at Wed Oct 18 17:18:18 UTC 2023 selfserv_9355 with PID 25548 started at Wed Oct 18 17:18:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25548 at Wed Oct 18 17:18:20 UTC 2023 kill -USR1 25548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25548 killed at Wed Oct 18 17:18:20 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25605 found at Wed Oct 18 17:18:21 UTC 2023 selfserv_9355 with PID 25605 started at Wed Oct 18 17:18:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25605 at Wed Oct 18 17:18:23 UTC 2023 kill -USR1 25605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25605 killed at Wed Oct 18 17:18:23 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25661 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25661 found at Wed Oct 18 17:18:23 UTC 2023 selfserv_9355 with PID 25661 started at Wed Oct 18 17:18:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25661 at Wed Oct 18 17:18:26 UTC 2023 kill -USR1 25661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25661 killed at Wed Oct 18 17:18:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25715 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25715 found at Wed Oct 18 17:18:26 UTC 2023 selfserv_9355 with PID 25715 started at Wed Oct 18 17:18:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25715 at Wed Oct 18 17:18:28 UTC 2023 kill -USR1 25715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25715 killed at Wed Oct 18 17:18:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25767 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25767 found at Wed Oct 18 17:18:29 UTC 2023 selfserv_9355 with PID 25767 started at Wed Oct 18 17:18:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25767 at Wed Oct 18 17:18:31 UTC 2023 kill -USR1 25767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25767 killed at Wed Oct 18 17:18:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25820 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25820 found at Wed Oct 18 17:18:31 UTC 2023 selfserv_9355 with PID 25820 started at Wed Oct 18 17:18:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25820 at Wed Oct 18 17:18:34 UTC 2023 kill -USR1 25820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25820 killed at Wed Oct 18 17:18:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25872 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25872 found at Wed Oct 18 17:18:34 UTC 2023 selfserv_9355 with PID 25872 started at Wed Oct 18 17:18:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25872 at Wed Oct 18 17:18:36 UTC 2023 kill -USR1 25872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25872 killed at Wed Oct 18 17:18:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25924 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25924 found at Wed Oct 18 17:18:37 UTC 2023 selfserv_9355 with PID 25924 started at Wed Oct 18 17:18:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25924 at Wed Oct 18 17:18:39 UTC 2023 kill -USR1 25924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25924 killed at Wed Oct 18 17:18:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25976 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25976 found at Wed Oct 18 17:18:39 UTC 2023 selfserv_9355 with PID 25976 started at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25976 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 25976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25976 killed at Wed Oct 18 17:18:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26028 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26028 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9355 with PID 26028 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26028 at Wed Oct 18 17:18:44 UTC 2023 kill -USR1 26028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26028 killed at Wed Oct 18 17:18:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26080 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26080 found at Wed Oct 18 17:18:45 UTC 2023 selfserv_9355 with PID 26080 started at Wed Oct 18 17:18:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26080 at Wed Oct 18 17:18:47 UTC 2023 kill -USR1 26080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26080 killed at Wed Oct 18 17:18:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26132 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26132 found at Wed Oct 18 17:18:47 UTC 2023 selfserv_9355 with PID 26132 started at Wed Oct 18 17:18:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26132 at Wed Oct 18 17:18:50 UTC 2023 kill -USR1 26132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26132 killed at Wed Oct 18 17:18:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26184 found at Wed Oct 18 17:18:50 UTC 2023 selfserv_9355 with PID 26184 started at Wed Oct 18 17:18:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26184 at Wed Oct 18 17:18:52 UTC 2023 kill -USR1 26184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26184 killed at Wed Oct 18 17:18:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:18:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26236 found at Wed Oct 18 17:18:53 UTC 2023 selfserv_9355 with PID 26236 started at Wed Oct 18 17:18:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26236 at Wed Oct 18 17:18:55 UTC 2023 kill -USR1 26236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26236 killed at Wed Oct 18 17:18:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26289 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26289 found at Wed Oct 18 17:18:55 UTC 2023 selfserv_9355 with PID 26289 started at Wed Oct 18 17:18:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26289 at Wed Oct 18 17:18:58 UTC 2023 kill -USR1 26289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26289 killed at Wed Oct 18 17:18:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:18:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:18:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26341 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26341 found at Wed Oct 18 17:18:58 UTC 2023 selfserv_9355 with PID 26341 started at Wed Oct 18 17:18:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26341 at Wed Oct 18 17:19:00 UTC 2023 kill -USR1 26341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26341 killed at Wed Oct 18 17:19:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26393 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26393 found at Wed Oct 18 17:19:01 UTC 2023 selfserv_9355 with PID 26393 started at Wed Oct 18 17:19:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26393 at Wed Oct 18 17:19:03 UTC 2023 kill -USR1 26393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26393 killed at Wed Oct 18 17:19:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26445 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26445 found at Wed Oct 18 17:19:03 UTC 2023 selfserv_9355 with PID 26445 started at Wed Oct 18 17:19:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26445 at Wed Oct 18 17:19:06 UTC 2023 kill -USR1 26445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26445 killed at Wed Oct 18 17:19:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26497 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26497 found at Wed Oct 18 17:19:06 UTC 2023 selfserv_9355 with PID 26497 started at Wed Oct 18 17:19:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #971: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26497 at Wed Oct 18 17:19:08 UTC 2023 kill -USR1 26497 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26497 killed at Wed Oct 18 17:19:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26549 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26549 found at Wed Oct 18 17:19:09 UTC 2023 selfserv_9355 with PID 26549 started at Wed Oct 18 17:19:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26549 at Wed Oct 18 17:19:11 UTC 2023 kill -USR1 26549 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26549 killed at Wed Oct 18 17:19:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26601 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26601 found at Wed Oct 18 17:19:11 UTC 2023 selfserv_9355 with PID 26601 started at Wed Oct 18 17:19:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26601 at Wed Oct 18 17:19:14 UTC 2023 kill -USR1 26601 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26601 killed at Wed Oct 18 17:19:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26653 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26653 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9355 with PID 26653 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26653 at Wed Oct 18 17:19:17 UTC 2023 kill -USR1 26653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26653 killed at Wed Oct 18 17:19:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26705 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26705 found at Wed Oct 18 17:19:18 UTC 2023 selfserv_9355 with PID 26705 started at Wed Oct 18 17:19:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26705 at Wed Oct 18 17:19:20 UTC 2023 kill -USR1 26705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26705 killed at Wed Oct 18 17:19:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26762 found at Wed Oct 18 17:19:21 UTC 2023 selfserv_9355 with PID 26762 started at Wed Oct 18 17:19:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26762 at Wed Oct 18 17:19:23 UTC 2023 kill -USR1 26762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26762 killed at Wed Oct 18 17:19:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26818 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26818 found at Wed Oct 18 17:19:23 UTC 2023 selfserv_9355 with PID 26818 started at Wed Oct 18 17:19:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #977: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26818 at Wed Oct 18 17:19:25 UTC 2023 kill -USR1 26818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26818 killed at Wed Oct 18 17:19:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26873 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26873 found at Wed Oct 18 17:19:25 UTC 2023 selfserv_9355 with PID 26873 started at Wed Oct 18 17:19:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26873 at Wed Oct 18 17:19:28 UTC 2023 kill -USR1 26873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26873 killed at Wed Oct 18 17:19:28 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26926 found at Wed Oct 18 17:19:28 UTC 2023 selfserv_9355 with PID 26926 started at Wed Oct 18 17:19:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26926 at Wed Oct 18 17:19:31 UTC 2023 kill -USR1 26926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26926 killed at Wed Oct 18 17:19:31 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26978 found at Wed Oct 18 17:19:32 UTC 2023 selfserv_9355 with PID 26978 started at Wed Oct 18 17:19:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26978 at Wed Oct 18 17:19:33 UTC 2023 kill -USR1 26978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26978 killed at Wed Oct 18 17:19:34 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27030 found at Wed Oct 18 17:19:34 UTC 2023 selfserv_9355 with PID 27030 started at Wed Oct 18 17:19:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27030 at Wed Oct 18 17:19:36 UTC 2023 kill -USR1 27030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27030 killed at Wed Oct 18 17:19:36 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27082 found at Wed Oct 18 17:19:37 UTC 2023 selfserv_9355 with PID 27082 started at Wed Oct 18 17:19:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #982: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27082 at Wed Oct 18 17:19:39 UTC 2023 kill -USR1 27082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27082 killed at Wed Oct 18 17:19:39 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27134 found at Wed Oct 18 17:19:39 UTC 2023 selfserv_9355 with PID 27134 started at Wed Oct 18 17:19:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27134 at Wed Oct 18 17:19:41 UTC 2023 kill -USR1 27134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27134 killed at Wed Oct 18 17:19:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27186 found at Wed Oct 18 17:19:42 UTC 2023 selfserv_9355 with PID 27186 started at Wed Oct 18 17:19:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27186 at Wed Oct 18 17:19:44 UTC 2023 kill -USR1 27186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27186 killed at Wed Oct 18 17:19:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27238 found at Wed Oct 18 17:19:44 UTC 2023 selfserv_9355 with PID 27238 started at Wed Oct 18 17:19:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27238 at Wed Oct 18 17:19:47 UTC 2023 kill -USR1 27238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27238 killed at Wed Oct 18 17:19:47 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27290 found at Wed Oct 18 17:19:47 UTC 2023 selfserv_9355 with PID 27290 started at Wed Oct 18 17:19:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #986: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27290 at Wed Oct 18 17:19:49 UTC 2023 kill -USR1 27290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27290 killed at Wed Oct 18 17:19:49 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27342 found at Wed Oct 18 17:19:49 UTC 2023 selfserv_9355 with PID 27342 started at Wed Oct 18 17:19:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27342 at Wed Oct 18 17:19:52 UTC 2023 kill -USR1 27342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27342 killed at Wed Oct 18 17:19:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27394 found at Wed Oct 18 17:19:52 UTC 2023 selfserv_9355 with PID 27394 started at Wed Oct 18 17:19:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27394 at Wed Oct 18 17:19:54 UTC 2023 kill -USR1 27394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27394 killed at Wed Oct 18 17:19:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:19:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27448 found at Wed Oct 18 17:19:55 UTC 2023 selfserv_9355 with PID 27448 started at Wed Oct 18 17:19:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27448 at Wed Oct 18 17:19:57 UTC 2023 kill -USR1 27448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27448 killed at Wed Oct 18 17:19:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:19:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:19:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27508 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27508 found at Wed Oct 18 17:19:57 UTC 2023 selfserv_9355 with PID 27508 started at Wed Oct 18 17:19:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #990: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27508 at Wed Oct 18 17:19:59 UTC 2023 kill -USR1 27508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27508 killed at Wed Oct 18 17:20:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27562 found at Wed Oct 18 17:20:00 UTC 2023 selfserv_9355 with PID 27562 started at Wed Oct 18 17:20:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27562 at Wed Oct 18 17:20:02 UTC 2023 kill -USR1 27562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27562 killed at Wed Oct 18 17:20:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:20:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27614 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27614 found at Wed Oct 18 17:20:03 UTC 2023 selfserv_9355 with PID 27614 started at Wed Oct 18 17:20:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27614 at Wed Oct 18 17:20:05 UTC 2023 kill -USR1 27614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27614 killed at Wed Oct 18 17:20:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27666 found at Wed Oct 18 17:20:05 UTC 2023 selfserv_9355 with PID 27666 started at Wed Oct 18 17:20:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27666 at Wed Oct 18 17:20:08 UTC 2023 kill -USR1 27666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27666 killed at Wed Oct 18 17:20:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:20:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27718 found at Wed Oct 18 17:20:08 UTC 2023 selfserv_9355 with PID 27718 started at Wed Oct 18 17:20:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27718 at Wed Oct 18 17:20:10 UTC 2023 kill -USR1 27718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27718 killed at Wed Oct 18 17:20:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27770 found at Wed Oct 18 17:20:11 UTC 2023 selfserv_9355 with PID 27770 started at Wed Oct 18 17:20:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27770 at Wed Oct 18 17:20:13 UTC 2023 kill -USR1 27770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27770 killed at Wed Oct 18 17:20:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:20:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27828 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27828 found at Wed Oct 18 17:20:13 UTC 2023 selfserv_9355 with PID 27828 started at Wed Oct 18 17:20:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27828 at Wed Oct 18 17:20:15 UTC 2023 kill -USR1 27828 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27828 killed at Wed Oct 18 17:20:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27880 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27880 found at Wed Oct 18 17:20:16 UTC 2023 selfserv_9355 with PID 27880 started at Wed Oct 18 17:20:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27880 at Wed Oct 18 17:20:18 UTC 2023 kill -USR1 27880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27880 killed at Wed Oct 18 17:20:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:20:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27932 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27932 found at Wed Oct 18 17:20:19 UTC 2023 selfserv_9355 with PID 27932 started at Wed Oct 18 17:20:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #998: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27932 at Wed Oct 18 17:20:21 UTC 2023 kill -USR1 27932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27932 killed at Wed Oct 18 17:20:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27989 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27989 found at Wed Oct 18 17:20:21 UTC 2023 selfserv_9355 with PID 27989 started at Wed Oct 18 17:20:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27989 at Wed Oct 18 17:20:24 UTC 2023 kill -USR1 27989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27989 killed at Wed Oct 18 17:20:24 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28045 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28045 found at Wed Oct 18 17:20:24 UTC 2023 selfserv_9355 with PID 28045 started at Wed Oct 18 17:20:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28045 at Wed Oct 18 17:20:27 UTC 2023 kill -USR1 28045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28045 killed at Wed Oct 18 17:20:27 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:20:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28101 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28101 found at Wed Oct 18 17:20:27 UTC 2023 selfserv_9355 with PID 28101 started at Wed Oct 18 17:20:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28101 at Wed Oct 18 17:20:29 UTC 2023 kill -USR1 28101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28101 killed at Wed Oct 18 17:20:30 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:20:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28183 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28183 found at Wed Oct 18 17:20:30 UTC 2023 selfserv_9355 with PID 28183 started at Wed Oct 18 17:20:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28183 at Wed Oct 18 17:20:31 UTC 2023 kill -USR1 28183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28183 killed at Wed Oct 18 17:20:31 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28225 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28225 found at Wed Oct 18 17:20:32 UTC 2023 selfserv_9355 with PID 28225 started at Wed Oct 18 17:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28225 at Wed Oct 18 17:20:33 UTC 2023 kill -USR1 28225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28225 killed at Wed Oct 18 17:20:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28264 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28264 found at Wed Oct 18 17:20:33 UTC 2023 selfserv_9355 with PID 28264 started at Wed Oct 18 17:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 28264 at Wed Oct 18 17:20:34 UTC 2023 kill -USR1 28264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28264 killed at Wed Oct 18 17:20:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28303 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28303 found at Wed Oct 18 17:20:35 UTC 2023 selfserv_9355 with PID 28303 started at Wed Oct 18 17:20:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28303 at Wed Oct 18 17:20:36 UTC 2023 kill -USR1 28303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28303 killed at Wed Oct 18 17:20:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28342 found at Wed Oct 18 17:20:36 UTC 2023 selfserv_9355 with PID 28342 started at Wed Oct 18 17:20:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #948: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 28342 at Wed Oct 18 17:20:37 UTC 2023 kill -USR1 28342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28342 killed at Wed Oct 18 17:20:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28381 found at Wed Oct 18 17:20:38 UTC 2023 selfserv_9355 with PID 28381 started at Wed Oct 18 17:20:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28381 at Wed Oct 18 17:20:39 UTC 2023 kill -USR1 28381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28381 killed at Wed Oct 18 17:20:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28420 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28420 found at Wed Oct 18 17:20:39 UTC 2023 selfserv_9355 with PID 28420 started at Wed Oct 18 17:20:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28420 at Wed Oct 18 17:20:40 UTC 2023 kill -USR1 28420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28420 killed at Wed Oct 18 17:20:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28460 found at Wed Oct 18 17:20:40 UTC 2023 selfserv_9355 with PID 28460 started at Wed Oct 18 17:20:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28460 at Wed Oct 18 17:20:41 UTC 2023 kill -USR1 28460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28460 killed at Wed Oct 18 17:20:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28499 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28499 found at Wed Oct 18 17:20:42 UTC 2023 selfserv_9355 with PID 28499 started at Wed Oct 18 17:20:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28499 at Wed Oct 18 17:20:43 UTC 2023 kill -USR1 28499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28499 killed at Wed Oct 18 17:20:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28538 found at Wed Oct 18 17:20:43 UTC 2023 selfserv_9355 with PID 28538 started at Wed Oct 18 17:20:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28538 at Wed Oct 18 17:20:44 UTC 2023 kill -USR1 28538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28538 killed at Wed Oct 18 17:20:44 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28577 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28577 found at Wed Oct 18 17:20:45 UTC 2023 selfserv_9355 with PID 28577 started at Wed Oct 18 17:20:45 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28577 at Wed Oct 18 17:20:46 UTC 2023 kill -USR1 28577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28577 killed at Wed Oct 18 17:20:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28617 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28617 found at Wed Oct 18 17:20:46 UTC 2023 selfserv_9355 with PID 28617 started at Wed Oct 18 17:20:46 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28617 at Wed Oct 18 17:20:47 UTC 2023 kill -USR1 28617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28617 killed at Wed Oct 18 17:20:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28657 found at Wed Oct 18 17:20:48 UTC 2023 selfserv_9355 with PID 28657 started at Wed Oct 18 17:20:48 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28657 at Wed Oct 18 17:20:49 UTC 2023 kill -USR1 28657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28657 killed at Wed Oct 18 17:20:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28697 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28697 found at Wed Oct 18 17:20:49 UTC 2023 selfserv_9355 with PID 28697 started at Wed Oct 18 17:20:49 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28697 at Wed Oct 18 17:20:50 UTC 2023 kill -USR1 28697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28697 killed at Wed Oct 18 17:20:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28737 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28737 found at Wed Oct 18 17:20:51 UTC 2023 selfserv_9355 with PID 28737 started at Wed Oct 18 17:20:51 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28737 at Wed Oct 18 17:20:52 UTC 2023 kill -USR1 28737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28737 killed at Wed Oct 18 17:20:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28777 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28777 found at Wed Oct 18 17:20:52 UTC 2023 selfserv_9355 with PID 28777 started at Wed Oct 18 17:20:52 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28777 at Wed Oct 18 17:20:53 UTC 2023 kill -USR1 28777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28777 killed at Wed Oct 18 17:20:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28817 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28817 found at Wed Oct 18 17:20:53 UTC 2023 selfserv_9355 with PID 28817 started at Wed Oct 18 17:20:53 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28817 at Wed Oct 18 17:20:55 UTC 2023 kill -USR1 28817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28817 killed at Wed Oct 18 17:20:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28857 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28857 found at Wed Oct 18 17:20:55 UTC 2023 selfserv_9355 with PID 28857 started at Wed Oct 18 17:20:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28857 at Wed Oct 18 17:20:56 UTC 2023 kill -USR1 28857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28857 killed at Wed Oct 18 17:20:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:20:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28897 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28897 found at Wed Oct 18 17:20:56 UTC 2023 selfserv_9355 with PID 28897 started at Wed Oct 18 17:20:56 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28897 at Wed Oct 18 17:20:57 UTC 2023 kill -USR1 28897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28897 killed at Wed Oct 18 17:20:58 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -fips true -force FIPS mode enabled. ssl.sh: #963: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #964: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #965: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #966: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #967: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #968: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:20:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:20:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 28981 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28981 found at Wed Oct 18 17:20:59 UTC 2023 selfserv_9355 with PID 28981 started at Wed Oct 18 17:20:59 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 28981 at Wed Oct 18 17:21:14 UTC 2023 kill -USR1 28981 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28981 killed at Wed Oct 18 17:21:14 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:21:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 29530 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29530 found at Wed Oct 18 17:21:15 UTC 2023 selfserv_9355 with PID 29530 started at Wed Oct 18 17:21:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29530 at Wed Oct 18 17:21:39 UTC 2023 kill -USR1 29530 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29530 killed at Wed Oct 18 17:21:39 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:21:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30340 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30340 found at Wed Oct 18 17:21:39 UTC 2023 selfserv_9355 with PID 30340 started at Wed Oct 18 17:21:39 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30340 at Wed Oct 18 17:21:40 UTC 2023 kill -USR1 30340 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30340 killed at Wed Oct 18 17:21:40 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30406 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30406 found at Wed Oct 18 17:21:41 UTC 2023 selfserv_9355 with PID 30406 started at Wed Oct 18 17:21:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30406 at Wed Oct 18 17:21:42 UTC 2023 kill -USR1 30406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30406 killed at Wed Oct 18 17:21:42 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:21:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30460 found at Wed Oct 18 17:21:42 UTC 2023 selfserv_9355 with PID 30460 started at Wed Oct 18 17:21:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30460 at Wed Oct 18 17:21:43 UTC 2023 kill -USR1 30460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30460 killed at Wed Oct 18 17:21:44 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30512 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30512 found at Wed Oct 18 17:21:44 UTC 2023 selfserv_9355 with PID 30512 started at Wed Oct 18 17:21:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30512 at Wed Oct 18 17:21:45 UTC 2023 kill -USR1 30512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30512 killed at Wed Oct 18 17:21:45 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30564 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30564 found at Wed Oct 18 17:21:46 UTC 2023 selfserv_9355 with PID 30564 started at Wed Oct 18 17:21:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30564 at Wed Oct 18 17:21:47 UTC 2023 kill -USR1 30564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30564 killed at Wed Oct 18 17:21:47 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:21:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30616 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30616 found at Wed Oct 18 17:21:48 UTC 2023 selfserv_9355 with PID 30616 started at Wed Oct 18 17:21:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30616 at Wed Oct 18 17:21:49 UTC 2023 kill -USR1 30616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30616 killed at Wed Oct 18 17:21:49 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30668 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30668 found at Wed Oct 18 17:21:49 UTC 2023 selfserv_9355 with PID 30668 started at Wed Oct 18 17:21:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30668 at Wed Oct 18 17:21:51 UTC 2023 kill -USR1 30668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30668 killed at Wed Oct 18 17:21:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30720 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30720 found at Wed Oct 18 17:21:51 UTC 2023 selfserv_9355 with PID 30720 started at Wed Oct 18 17:21:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30720 at Wed Oct 18 17:21:52 UTC 2023 kill -USR1 30720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30720 killed at Wed Oct 18 17:21:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:21:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30772 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30772 found at Wed Oct 18 17:21:53 UTC 2023 selfserv_9355 with PID 30772 started at Wed Oct 18 17:21:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30772 at Wed Oct 18 17:21:54 UTC 2023 kill -USR1 30772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30772 killed at Wed Oct 18 17:21:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30824 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30824 found at Wed Oct 18 17:21:54 UTC 2023 selfserv_9355 with PID 30824 started at Wed Oct 18 17:21:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30824 at Wed Oct 18 17:21:56 UTC 2023 kill -USR1 30824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30824 killed at Wed Oct 18 17:21:56 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30876 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30876 found at Wed Oct 18 17:21:56 UTC 2023 selfserv_9355 with PID 30876 started at Wed Oct 18 17:21:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30876 at Wed Oct 18 17:21:57 UTC 2023 kill -USR1 30876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30876 killed at Wed Oct 18 17:21:57 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:21:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30928 found at Wed Oct 18 17:21:58 UTC 2023 selfserv_9355 with PID 30928 started at Wed Oct 18 17:21:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30928 at Wed Oct 18 17:21:59 UTC 2023 kill -USR1 30928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30928 killed at Wed Oct 18 17:21:59 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:21:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30980 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30980 found at Wed Oct 18 17:21:59 UTC 2023 selfserv_9355 with PID 30980 started at Wed Oct 18 17:21:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30980 at Wed Oct 18 17:22:00 UTC 2023 kill -USR1 30980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30980 killed at Wed Oct 18 17:22:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31032 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31032 found at Wed Oct 18 17:22:01 UTC 2023 selfserv_9355 with PID 31032 started at Wed Oct 18 17:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31032 at Wed Oct 18 17:22:02 UTC 2023 kill -USR1 31032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31032 killed at Wed Oct 18 17:22:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31084 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31084 found at Wed Oct 18 17:22:03 UTC 2023 selfserv_9355 with PID 31084 started at Wed Oct 18 17:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31084 at Wed Oct 18 17:22:04 UTC 2023 kill -USR1 31084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31084 killed at Wed Oct 18 17:22:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31136 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31136 found at Wed Oct 18 17:22:05 UTC 2023 selfserv_9355 with PID 31136 started at Wed Oct 18 17:22:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31136 at Wed Oct 18 17:22:06 UTC 2023 kill -USR1 31136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31136 killed at Wed Oct 18 17:22:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31188 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31188 found at Wed Oct 18 17:22:07 UTC 2023 selfserv_9355 with PID 31188 started at Wed Oct 18 17:22:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31188 at Wed Oct 18 17:22:08 UTC 2023 kill -USR1 31188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31188 killed at Wed Oct 18 17:22:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31240 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31240 found at Wed Oct 18 17:22:08 UTC 2023 selfserv_9355 with PID 31240 started at Wed Oct 18 17:22:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31240 at Wed Oct 18 17:22:10 UTC 2023 kill -USR1 31240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31240 killed at Wed Oct 18 17:22:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31294 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31294 found at Wed Oct 18 17:22:10 UTC 2023 selfserv_9355 with PID 31294 started at Wed Oct 18 17:22:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31294 at Wed Oct 18 17:22:12 UTC 2023 kill -USR1 31294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31294 killed at Wed Oct 18 17:22:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31347 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31347 found at Wed Oct 18 17:22:12 UTC 2023 selfserv_9355 with PID 31347 started at Wed Oct 18 17:22:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31347 at Wed Oct 18 17:22:14 UTC 2023 kill -USR1 31347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31347 killed at Wed Oct 18 17:22:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31399 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31399 found at Wed Oct 18 17:22:14 UTC 2023 selfserv_9355 with PID 31399 started at Wed Oct 18 17:22:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31399 at Wed Oct 18 17:22:15 UTC 2023 kill -USR1 31399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31399 killed at Wed Oct 18 17:22:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31451 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31451 found at Wed Oct 18 17:22:16 UTC 2023 selfserv_9355 with PID 31451 started at Wed Oct 18 17:22:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31451 at Wed Oct 18 17:22:17 UTC 2023 kill -USR1 31451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31451 killed at Wed Oct 18 17:22:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31503 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31503 found at Wed Oct 18 17:22:18 UTC 2023 selfserv_9355 with PID 31503 started at Wed Oct 18 17:22:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31503 at Wed Oct 18 17:22:19 UTC 2023 kill -USR1 31503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31503 killed at Wed Oct 18 17:22:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31560 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31560 found at Wed Oct 18 17:22:20 UTC 2023 selfserv_9355 with PID 31560 started at Wed Oct 18 17:22:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31560 at Wed Oct 18 17:22:21 UTC 2023 kill -USR1 31560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31560 killed at Wed Oct 18 17:22:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31612 found at Wed Oct 18 17:22:21 UTC 2023 selfserv_9355 with PID 31612 started at Wed Oct 18 17:22:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31612 at Wed Oct 18 17:22:23 UTC 2023 kill -USR1 31612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31612 killed at Wed Oct 18 17:22:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31668 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31668 found at Wed Oct 18 17:22:23 UTC 2023 selfserv_9355 with PID 31668 started at Wed Oct 18 17:22:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31668 at Wed Oct 18 17:22:25 UTC 2023 kill -USR1 31668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31668 killed at Wed Oct 18 17:22:25 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31726 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31726 found at Wed Oct 18 17:22:25 UTC 2023 selfserv_9355 with PID 31726 started at Wed Oct 18 17:22:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31726 at Wed Oct 18 17:22:26 UTC 2023 kill -USR1 31726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31726 killed at Wed Oct 18 17:22:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31778 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31778 found at Wed Oct 18 17:22:27 UTC 2023 selfserv_9355 with PID 31778 started at Wed Oct 18 17:22:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31778 at Wed Oct 18 17:22:28 UTC 2023 kill -USR1 31778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31778 killed at Wed Oct 18 17:22:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31830 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31830 found at Wed Oct 18 17:22:29 UTC 2023 selfserv_9355 with PID 31830 started at Wed Oct 18 17:22:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1123: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31830 at Wed Oct 18 17:22:30 UTC 2023 kill -USR1 31830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31830 killed at Wed Oct 18 17:22:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31882 found at Wed Oct 18 17:22:31 UTC 2023 selfserv_9355 with PID 31882 started at Wed Oct 18 17:22:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31882 at Wed Oct 18 17:22:32 UTC 2023 kill -USR1 31882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31882 killed at Wed Oct 18 17:22:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31934 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31934 found at Wed Oct 18 17:22:32 UTC 2023 selfserv_9355 with PID 31934 started at Wed Oct 18 17:22:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31934 at Wed Oct 18 17:22:34 UTC 2023 kill -USR1 31934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31934 killed at Wed Oct 18 17:22:34 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31988 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31988 found at Wed Oct 18 17:22:34 UTC 2023 selfserv_9355 with PID 31988 started at Wed Oct 18 17:22:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31988 at Wed Oct 18 17:22:35 UTC 2023 kill -USR1 31988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31988 killed at Wed Oct 18 17:22:35 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32042 found at Wed Oct 18 17:22:36 UTC 2023 selfserv_9355 with PID 32042 started at Wed Oct 18 17:22:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32042 at Wed Oct 18 17:22:37 UTC 2023 kill -USR1 32042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32042 killed at Wed Oct 18 17:22:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32094 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32094 found at Wed Oct 18 17:22:37 UTC 2023 selfserv_9355 with PID 32094 started at Wed Oct 18 17:22:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32094 at Wed Oct 18 17:22:39 UTC 2023 kill -USR1 32094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32094 killed at Wed Oct 18 17:22:39 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32146 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32146 found at Wed Oct 18 17:22:39 UTC 2023 selfserv_9355 with PID 32146 started at Wed Oct 18 17:22:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1129: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32146 at Wed Oct 18 17:22:40 UTC 2023 kill -USR1 32146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32146 killed at Wed Oct 18 17:22:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32202 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32202 found at Wed Oct 18 17:22:41 UTC 2023 selfserv_9355 with PID 32202 started at Wed Oct 18 17:22:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32202 at Wed Oct 18 17:22:42 UTC 2023 kill -USR1 32202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32202 killed at Wed Oct 18 17:22:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32254 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32254 found at Wed Oct 18 17:22:42 UTC 2023 selfserv_9355 with PID 32254 started at Wed Oct 18 17:22:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32254 at Wed Oct 18 17:22:44 UTC 2023 kill -USR1 32254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32254 killed at Wed Oct 18 17:22:44 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32306 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32306 found at Wed Oct 18 17:22:45 UTC 2023 selfserv_9355 with PID 32306 started at Wed Oct 18 17:22:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32306 at Wed Oct 18 17:22:46 UTC 2023 kill -USR1 32306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32306 killed at Wed Oct 18 17:22:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32358 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32358 found at Wed Oct 18 17:22:46 UTC 2023 selfserv_9355 with PID 32358 started at Wed Oct 18 17:22:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32358 at Wed Oct 18 17:22:47 UTC 2023 kill -USR1 32358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32358 killed at Wed Oct 18 17:22:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32410 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32410 found at Wed Oct 18 17:22:48 UTC 2023 selfserv_9355 with PID 32410 started at Wed Oct 18 17:22:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1134: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32410 at Wed Oct 18 17:22:49 UTC 2023 kill -USR1 32410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32410 killed at Wed Oct 18 17:22:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32462 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32462 found at Wed Oct 18 17:22:49 UTC 2023 selfserv_9355 with PID 32462 started at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32462 at Wed Oct 18 17:22:50 UTC 2023 kill -USR1 32462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32462 killed at Wed Oct 18 17:22:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32514 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32514 found at Wed Oct 18 17:22:51 UTC 2023 selfserv_9355 with PID 32514 started at Wed Oct 18 17:22:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32514 at Wed Oct 18 17:22:52 UTC 2023 kill -USR1 32514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32514 killed at Wed Oct 18 17:22:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32566 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32566 found at Wed Oct 18 17:22:52 UTC 2023 selfserv_9355 with PID 32566 started at Wed Oct 18 17:22:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32566 at Wed Oct 18 17:22:53 UTC 2023 kill -USR1 32566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32566 killed at Wed Oct 18 17:22:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32618 found at Wed Oct 18 17:22:54 UTC 2023 selfserv_9355 with PID 32618 started at Wed Oct 18 17:22:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32618 at Wed Oct 18 17:22:55 UTC 2023 kill -USR1 32618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32618 killed at Wed Oct 18 17:22:55 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32670 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32670 found at Wed Oct 18 17:22:55 UTC 2023 selfserv_9355 with PID 32670 started at Wed Oct 18 17:22:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32670 at Wed Oct 18 17:22:56 UTC 2023 kill -USR1 32670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32670 killed at Wed Oct 18 17:22:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:22:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32722 found at Wed Oct 18 17:22:57 UTC 2023 selfserv_9355 with PID 32722 started at Wed Oct 18 17:22:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32722 at Wed Oct 18 17:22:58 UTC 2023 kill -USR1 32722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32722 killed at Wed Oct 18 17:22:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:22:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:22:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 306 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 306 found at Wed Oct 18 17:22:58 UTC 2023 selfserv_9355 with PID 306 started at Wed Oct 18 17:22:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 306 at Wed Oct 18 17:23:00 UTC 2023 kill -USR1 306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 306 killed at Wed Oct 18 17:23:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:23:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 365 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 365 found at Wed Oct 18 17:23:00 UTC 2023 selfserv_9355 with PID 365 started at Wed Oct 18 17:23:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 365 at Wed Oct 18 17:23:01 UTC 2023 kill -USR1 365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 365 killed at Wed Oct 18 17:23:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 418 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 418 found at Wed Oct 18 17:23:02 UTC 2023 selfserv_9355 with PID 418 started at Wed Oct 18 17:23:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 418 at Wed Oct 18 17:23:03 UTC 2023 kill -USR1 418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 418 killed at Wed Oct 18 17:23:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:23:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 472 found at Wed Oct 18 17:23:04 UTC 2023 selfserv_9355 with PID 472 started at Wed Oct 18 17:23:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 472 at Wed Oct 18 17:23:05 UTC 2023 kill -USR1 472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 472 killed at Wed Oct 18 17:23:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 526 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 526 found at Wed Oct 18 17:23:05 UTC 2023 selfserv_9355 with PID 526 started at Wed Oct 18 17:23:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 526 at Wed Oct 18 17:23:06 UTC 2023 kill -USR1 526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 526 killed at Wed Oct 18 17:23:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:23:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 597 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 597 found at Wed Oct 18 17:23:07 UTC 2023 selfserv_9355 with PID 597 started at Wed Oct 18 17:23:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1146: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 597 at Wed Oct 18 17:23:08 UTC 2023 kill -USR1 597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 597 killed at Wed Oct 18 17:23:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 660 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 660 found at Wed Oct 18 17:23:08 UTC 2023 selfserv_9355 with PID 660 started at Wed Oct 18 17:23:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 660 at Wed Oct 18 17:23:10 UTC 2023 kill -USR1 660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 660 killed at Wed Oct 18 17:23:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:23:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 712 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 712 found at Wed Oct 18 17:23:10 UTC 2023 selfserv_9355 with PID 712 started at Wed Oct 18 17:23:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 712 at Wed Oct 18 17:23:11 UTC 2023 kill -USR1 712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 712 killed at Wed Oct 18 17:23:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 764 found at Wed Oct 18 17:23:12 UTC 2023 selfserv_9355 with PID 764 started at Wed Oct 18 17:23:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 764 at Wed Oct 18 17:23:13 UTC 2023 kill -USR1 764 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 764 killed at Wed Oct 18 17:23:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:23:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 816 found at Wed Oct 18 17:23:14 UTC 2023 selfserv_9355 with PID 816 started at Wed Oct 18 17:23:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 816 at Wed Oct 18 17:23:15 UTC 2023 kill -USR1 816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 816 killed at Wed Oct 18 17:23:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 868 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 868 found at Wed Oct 18 17:23:15 UTC 2023 selfserv_9355 with PID 868 started at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 868 at Wed Oct 18 17:23:16 UTC 2023 kill -USR1 868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 868 killed at Wed Oct 18 17:23:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 933 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 933 found at Wed Oct 18 17:23:17 UTC 2023 selfserv_9355 with PID 933 started at Wed Oct 18 17:23:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 933 at Wed Oct 18 17:23:18 UTC 2023 kill -USR1 933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 933 killed at Wed Oct 18 17:23:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:23:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 989 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 989 found at Wed Oct 18 17:23:19 UTC 2023 selfserv_9355 with PID 989 started at Wed Oct 18 17:23:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 989 at Wed Oct 18 17:23:20 UTC 2023 kill -USR1 989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 989 killed at Wed Oct 18 17:23:20 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:23:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1054 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1054 found at Wed Oct 18 17:23:21 UTC 2023 selfserv_9355 with PID 1054 started at Wed Oct 18 17:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1054 at Wed Oct 18 17:23:22 UTC 2023 kill -USR1 1054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1054 killed at Wed Oct 18 17:23:22 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:23:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1116 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1116 found at Wed Oct 18 17:23:22 UTC 2023 selfserv_9355 with PID 1116 started at Wed Oct 18 17:23:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1116 at Wed Oct 18 17:23:24 UTC 2023 kill -USR1 1116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1116 killed at Wed Oct 18 17:23:24 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:23:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1175 found at Wed Oct 18 17:23:24 UTC 2023 selfserv_9355 with PID 1175 started at Wed Oct 18 17:23:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1175 at Wed Oct 18 17:23:25 UTC 2023 kill -USR1 1175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1175 killed at Wed Oct 18 17:23:25 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:23:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1234 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1234 found at Wed Oct 18 17:23:26 UTC 2023 selfserv_9355 with PID 1234 started at Wed Oct 18 17:23:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1157: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1234 at Wed Oct 18 17:23:27 UTC 2023 kill -USR1 1234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1234 killed at Wed Oct 18 17:23:27 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 17:23:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1292 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1292 found at Wed Oct 18 17:23:27 UTC 2023 selfserv_9355 with PID 1292 started at Wed Oct 18 17:23:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1158: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1292 at Wed Oct 18 17:23:28 UTC 2023 kill -USR1 1292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1292 killed at Wed Oct 18 17:23:28 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:23:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1350 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1350 found at Wed Oct 18 17:23:29 UTC 2023 selfserv_9355 with PID 1350 started at Wed Oct 18 17:23:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1159: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1350 at Wed Oct 18 17:23:30 UTC 2023 kill -USR1 1350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1350 killed at Wed Oct 18 17:23:30 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:23:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1408 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1408 found at Wed Oct 18 17:23:31 UTC 2023 selfserv_9355 with PID 1408 started at Wed Oct 18 17:23:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1408 at Wed Oct 18 17:23:32 UTC 2023 kill -USR1 1408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1408 killed at Wed Oct 18 17:23:32 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:23:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1466 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1466 found at Wed Oct 18 17:23:33 UTC 2023 selfserv_9355 with PID 1466 started at Wed Oct 18 17:23:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1161: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1466 at Wed Oct 18 17:23:34 UTC 2023 kill -USR1 1466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1466 killed at Wed Oct 18 17:23:34 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:23:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1524 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1524 found at Wed Oct 18 17:23:34 UTC 2023 selfserv_9355 with PID 1524 started at Wed Oct 18 17:23:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1162: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1524 at Wed Oct 18 17:23:35 UTC 2023 kill -USR1 1524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1524 killed at Wed Oct 18 17:23:35 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:23:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1582 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1582 found at Wed Oct 18 17:23:36 UTC 2023 selfserv_9355 with PID 1582 started at Wed Oct 18 17:23:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1582 at Wed Oct 18 17:23:36 UTC 2023 kill -USR1 1582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1582 killed at Wed Oct 18 17:23:37 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 17:23:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1624 found at Wed Oct 18 17:23:37 UTC 2023 selfserv_9355 with PID 1624 started at Wed Oct 18 17:23:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1096: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1624 at Wed Oct 18 17:23:38 UTC 2023 kill -USR1 1624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1624 killed at Wed Oct 18 17:23:38 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 17:23:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1666 found at Wed Oct 18 17:23:38 UTC 2023 selfserv_9355 with PID 1666 started at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 1666 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 1666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1666 killed at Wed Oct 18 17:23:40 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1708 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1708 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9355 with PID 1708 started at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1708 at Wed Oct 18 17:23:41 UTC 2023 kill -USR1 1708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1708 killed at Wed Oct 18 17:23:41 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 17:23:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1750 found at Wed Oct 18 17:23:42 UTC 2023 selfserv_9355 with PID 1750 started at Wed Oct 18 17:23:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1750 at Wed Oct 18 17:23:42 UTC 2023 kill -USR1 1750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1750 killed at Wed Oct 18 17:23:43 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 17:23:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1792 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1792 found at Wed Oct 18 17:23:43 UTC 2023 selfserv_9355 with PID 1792 started at Wed Oct 18 17:23:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1792 at Wed Oct 18 17:23:44 UTC 2023 kill -USR1 1792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1792 killed at Wed Oct 18 17:23:44 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 17:23:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1834 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1834 found at Wed Oct 18 17:23:44 UTC 2023 selfserv_9355 with PID 1834 started at Wed Oct 18 17:23:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1834 at Wed Oct 18 17:23:45 UTC 2023 kill -USR1 1834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1834 killed at Wed Oct 18 17:23:45 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 17:23:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1876 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1876 found at Wed Oct 18 17:23:45 UTC 2023 selfserv_9355 with PID 1876 started at Wed Oct 18 17:23:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1102: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 1876 at Wed Oct 18 17:23:46 UTC 2023 kill -USR1 1876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1876 killed at Wed Oct 18 17:23:46 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 17:23:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:23:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1918 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1918 found at Wed Oct 18 17:23:47 UTC 2023 selfserv_9355 with PID 1918 started at Wed Oct 18 17:23:47 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:23:47 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:24:30 UTC 2023 ssl.sh: #1103: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 1918 at Wed Oct 18 17:24:30 UTC 2023 kill -USR1 1918 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1918 killed at Wed Oct 18 17:24:30 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:24:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1982 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1982 found at Wed Oct 18 17:24:31 UTC 2023 selfserv_9355 with PID 1982 started at Wed Oct 18 17:24:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1982 at Wed Oct 18 17:24:32 UTC 2023 kill -USR1 1982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1982 killed at Wed Oct 18 17:24:32 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2024 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2024 found at Wed Oct 18 17:24:32 UTC 2023 selfserv_9355 with PID 2024 started at Wed Oct 18 17:24:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2024 at Wed Oct 18 17:24:33 UTC 2023 kill -USR1 2024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2024 killed at Wed Oct 18 17:24:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2063 found at Wed Oct 18 17:24:33 UTC 2023 selfserv_9355 with PID 2063 started at Wed Oct 18 17:24:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 2063 at Wed Oct 18 17:24:34 UTC 2023 kill -USR1 2063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2063 killed at Wed Oct 18 17:24:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2102 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2102 found at Wed Oct 18 17:24:34 UTC 2023 selfserv_9355 with PID 2102 started at Wed Oct 18 17:24:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2102 at Wed Oct 18 17:24:35 UTC 2023 kill -USR1 2102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2102 killed at Wed Oct 18 17:24:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2141 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2141 found at Wed Oct 18 17:24:35 UTC 2023 selfserv_9355 with PID 2141 started at Wed Oct 18 17:24:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1108: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 2141 at Wed Oct 18 17:24:36 UTC 2023 kill -USR1 2141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2141 killed at Wed Oct 18 17:24:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2180 found at Wed Oct 18 17:24:36 UTC 2023 selfserv_9355 with PID 2180 started at Wed Oct 18 17:24:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2180 at Wed Oct 18 17:24:37 UTC 2023 kill -USR1 2180 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2180 killed at Wed Oct 18 17:24:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2219 found at Wed Oct 18 17:24:37 UTC 2023 selfserv_9355 with PID 2219 started at Wed Oct 18 17:24:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2219 at Wed Oct 18 17:24:38 UTC 2023 kill -USR1 2219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2219 killed at Wed Oct 18 17:24:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2258 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2258 found at Wed Oct 18 17:24:38 UTC 2023 selfserv_9355 with PID 2258 started at Wed Oct 18 17:24:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2258 at Wed Oct 18 17:24:39 UTC 2023 kill -USR1 2258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2258 killed at Wed Oct 18 17:24:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2297 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2297 found at Wed Oct 18 17:24:39 UTC 2023 selfserv_9355 with PID 2297 started at Wed Oct 18 17:24:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2297 at Wed Oct 18 17:24:40 UTC 2023 kill -USR1 2297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2297 killed at Wed Oct 18 17:24:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2336 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2336 found at Wed Oct 18 17:24:40 UTC 2023 selfserv_9355 with PID 2336 started at Wed Oct 18 17:24:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2336 at Wed Oct 18 17:24:41 UTC 2023 kill -USR1 2336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2336 killed at Wed Oct 18 17:24:41 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2375 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2375 found at Wed Oct 18 17:24:41 UTC 2023 selfserv_9355 with PID 2375 started at Wed Oct 18 17:24:41 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2375 at Wed Oct 18 17:24:42 UTC 2023 kill -USR1 2375 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2375 killed at Wed Oct 18 17:24:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2415 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2415 found at Wed Oct 18 17:24:42 UTC 2023 selfserv_9355 with PID 2415 started at Wed Oct 18 17:24:42 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2415 at Wed Oct 18 17:24:43 UTC 2023 kill -USR1 2415 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2415 killed at Wed Oct 18 17:24:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2455 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2455 found at Wed Oct 18 17:24:43 UTC 2023 selfserv_9355 with PID 2455 started at Wed Oct 18 17:24:43 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2455 at Wed Oct 18 17:24:44 UTC 2023 kill -USR1 2455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2455 killed at Wed Oct 18 17:24:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2495 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2495 found at Wed Oct 18 17:24:44 UTC 2023 selfserv_9355 with PID 2495 started at Wed Oct 18 17:24:44 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2495 at Wed Oct 18 17:24:45 UTC 2023 kill -USR1 2495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2495 killed at Wed Oct 18 17:24:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2535 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2535 found at Wed Oct 18 17:24:45 UTC 2023 selfserv_9355 with PID 2535 started at Wed Oct 18 17:24:45 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2535 at Wed Oct 18 17:24:46 UTC 2023 kill -USR1 2535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2535 killed at Wed Oct 18 17:24:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2575 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2575 found at Wed Oct 18 17:24:46 UTC 2023 selfserv_9355 with PID 2575 started at Wed Oct 18 17:24:46 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2575 at Wed Oct 18 17:24:47 UTC 2023 kill -USR1 2575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2575 killed at Wed Oct 18 17:24:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2615 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2615 found at Wed Oct 18 17:24:47 UTC 2023 selfserv_9355 with PID 2615 started at Wed Oct 18 17:24:47 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2615 at Wed Oct 18 17:24:48 UTC 2023 kill -USR1 2615 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2615 killed at Wed Oct 18 17:24:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2655 found at Wed Oct 18 17:24:48 UTC 2023 selfserv_9355 with PID 2655 started at Wed Oct 18 17:24:48 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2655 at Wed Oct 18 17:24:49 UTC 2023 kill -USR1 2655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2655 killed at Wed Oct 18 17:24:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:24:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2695 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2695 found at Wed Oct 18 17:24:49 UTC 2023 selfserv_9355 with PID 2695 started at Wed Oct 18 17:24:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2695 at Wed Oct 18 17:24:50 UTC 2023 kill -USR1 2695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2695 killed at Wed Oct 18 17:24:50 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 17:24:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:24:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 2735 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2735 found at Wed Oct 18 17:24:50 UTC 2023 selfserv_9355 with PID 2735 started at Wed Oct 18 17:24:50 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 2735 at Wed Oct 18 17:25:06 UTC 2023 kill -USR1 2735 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2735 killed at Wed Oct 18 17:25:06 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:25:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 3288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3288 found at Wed Oct 18 17:25:07 UTC 2023 selfserv_9355 with PID 3288 started at Wed Oct 18 17:25:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3288 at Wed Oct 18 17:25:29 UTC 2023 kill -USR1 3288 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3288 killed at Wed Oct 18 17:25:29 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4109 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4109 found at Wed Oct 18 17:25:30 UTC 2023 selfserv_9355 with PID 4109 started at Wed Oct 18 17:25:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4109 at Wed Oct 18 17:25:32 UTC 2023 kill -USR1 4109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4109 killed at Wed Oct 18 17:25:32 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:25:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4161 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4161 found at Wed Oct 18 17:25:32 UTC 2023 selfserv_9355 with PID 4161 started at Wed Oct 18 17:25:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4161 at Wed Oct 18 17:25:34 UTC 2023 kill -USR1 4161 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4161 killed at Wed Oct 18 17:25:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4213 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4213 found at Wed Oct 18 17:25:35 UTC 2023 selfserv_9355 with PID 4213 started at Wed Oct 18 17:25:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4213 at Wed Oct 18 17:25:37 UTC 2023 kill -USR1 4213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4213 killed at Wed Oct 18 17:25:37 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4265 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4265 found at Wed Oct 18 17:25:38 UTC 2023 selfserv_9355 with PID 4265 started at Wed Oct 18 17:25:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4265 at Wed Oct 18 17:25:40 UTC 2023 kill -USR1 4265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4265 killed at Wed Oct 18 17:25:40 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:25:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4317 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4317 found at Wed Oct 18 17:25:40 UTC 2023 selfserv_9355 with PID 4317 started at Wed Oct 18 17:25:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4317 at Wed Oct 18 17:25:42 UTC 2023 kill -USR1 4317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4317 killed at Wed Oct 18 17:25:42 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4369 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4369 found at Wed Oct 18 17:25:43 UTC 2023 selfserv_9355 with PID 4369 started at Wed Oct 18 17:25:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4369 at Wed Oct 18 17:25:45 UTC 2023 kill -USR1 4369 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4369 killed at Wed Oct 18 17:25:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4421 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4421 found at Wed Oct 18 17:25:46 UTC 2023 selfserv_9355 with PID 4421 started at Wed Oct 18 17:25:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4421 at Wed Oct 18 17:25:48 UTC 2023 kill -USR1 4421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4421 killed at Wed Oct 18 17:25:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:25:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4473 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4473 found at Wed Oct 18 17:25:48 UTC 2023 selfserv_9355 with PID 4473 started at Wed Oct 18 17:25:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4473 at Wed Oct 18 17:25:50 UTC 2023 kill -USR1 4473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4473 killed at Wed Oct 18 17:25:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4525 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4525 found at Wed Oct 18 17:25:51 UTC 2023 selfserv_9355 with PID 4525 started at Wed Oct 18 17:25:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4525 at Wed Oct 18 17:25:53 UTC 2023 kill -USR1 4525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4525 killed at Wed Oct 18 17:25:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4587 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4587 found at Wed Oct 18 17:25:54 UTC 2023 selfserv_9355 with PID 4587 started at Wed Oct 18 17:25:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4587 at Wed Oct 18 17:25:56 UTC 2023 kill -USR1 4587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4587 killed at Wed Oct 18 17:25:56 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:25:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4639 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4639 found at Wed Oct 18 17:25:56 UTC 2023 selfserv_9355 with PID 4639 started at Wed Oct 18 17:25:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4639 at Wed Oct 18 17:25:58 UTC 2023 kill -USR1 4639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4639 killed at Wed Oct 18 17:25:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:25:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:25:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4691 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4691 found at Wed Oct 18 17:25:59 UTC 2023 selfserv_9355 with PID 4691 started at Wed Oct 18 17:25:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4691 at Wed Oct 18 17:26:01 UTC 2023 kill -USR1 4691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4691 killed at Wed Oct 18 17:26:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4743 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4743 found at Wed Oct 18 17:26:02 UTC 2023 selfserv_9355 with PID 4743 started at Wed Oct 18 17:26:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4743 at Wed Oct 18 17:26:04 UTC 2023 kill -USR1 4743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4743 killed at Wed Oct 18 17:26:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4795 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4795 found at Wed Oct 18 17:26:04 UTC 2023 selfserv_9355 with PID 4795 started at Wed Oct 18 17:26:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4795 at Wed Oct 18 17:26:06 UTC 2023 kill -USR1 4795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4795 killed at Wed Oct 18 17:26:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4847 found at Wed Oct 18 17:26:07 UTC 2023 selfserv_9355 with PID 4847 started at Wed Oct 18 17:26:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4847 at Wed Oct 18 17:26:10 UTC 2023 kill -USR1 4847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4847 killed at Wed Oct 18 17:26:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4901 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4901 found at Wed Oct 18 17:26:10 UTC 2023 selfserv_9355 with PID 4901 started at Wed Oct 18 17:26:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4901 at Wed Oct 18 17:26:12 UTC 2023 kill -USR1 4901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4901 killed at Wed Oct 18 17:26:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4953 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4953 found at Wed Oct 18 17:26:12 UTC 2023 selfserv_9355 with PID 4953 started at Wed Oct 18 17:26:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4953 at Wed Oct 18 17:26:14 UTC 2023 kill -USR1 4953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4953 killed at Wed Oct 18 17:26:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5005 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5005 found at Wed Oct 18 17:26:15 UTC 2023 selfserv_9355 with PID 5005 started at Wed Oct 18 17:26:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5005 at Wed Oct 18 17:26:18 UTC 2023 kill -USR1 5005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5005 killed at Wed Oct 18 17:26:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5057 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5057 found at Wed Oct 18 17:26:18 UTC 2023 selfserv_9355 with PID 5057 started at Wed Oct 18 17:26:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5057 at Wed Oct 18 17:26:20 UTC 2023 kill -USR1 5057 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5057 killed at Wed Oct 18 17:26:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5114 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5114 found at Wed Oct 18 17:26:21 UTC 2023 selfserv_9355 with PID 5114 started at Wed Oct 18 17:26:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5114 at Wed Oct 18 17:26:23 UTC 2023 kill -USR1 5114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5114 killed at Wed Oct 18 17:26:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5170 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5170 found at Wed Oct 18 17:26:23 UTC 2023 selfserv_9355 with PID 5170 started at Wed Oct 18 17:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5170 at Wed Oct 18 17:26:26 UTC 2023 kill -USR1 5170 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5170 killed at Wed Oct 18 17:26:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5224 found at Wed Oct 18 17:26:26 UTC 2023 selfserv_9355 with PID 5224 started at Wed Oct 18 17:26:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5224 at Wed Oct 18 17:26:28 UTC 2023 kill -USR1 5224 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5224 killed at Wed Oct 18 17:26:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5276 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5276 found at Wed Oct 18 17:26:29 UTC 2023 selfserv_9355 with PID 5276 started at Wed Oct 18 17:26:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5276 at Wed Oct 18 17:26:31 UTC 2023 kill -USR1 5276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5276 killed at Wed Oct 18 17:26:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5328 found at Wed Oct 18 17:26:31 UTC 2023 selfserv_9355 with PID 5328 started at Wed Oct 18 17:26:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5328 at Wed Oct 18 17:26:34 UTC 2023 kill -USR1 5328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5328 killed at Wed Oct 18 17:26:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5380 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5380 found at Wed Oct 18 17:26:34 UTC 2023 selfserv_9355 with PID 5380 started at Wed Oct 18 17:26:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5380 at Wed Oct 18 17:26:37 UTC 2023 kill -USR1 5380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5380 killed at Wed Oct 18 17:26:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5432 found at Wed Oct 18 17:26:37 UTC 2023 selfserv_9355 with PID 5432 started at Wed Oct 18 17:26:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5432 at Wed Oct 18 17:26:39 UTC 2023 kill -USR1 5432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5432 killed at Wed Oct 18 17:26:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5484 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5484 found at Wed Oct 18 17:26:40 UTC 2023 selfserv_9355 with PID 5484 started at Wed Oct 18 17:26:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5484 at Wed Oct 18 17:26:42 UTC 2023 kill -USR1 5484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5484 killed at Wed Oct 18 17:26:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5536 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5536 found at Wed Oct 18 17:26:43 UTC 2023 selfserv_9355 with PID 5536 started at Wed Oct 18 17:26:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1277: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5536 at Wed Oct 18 17:26:45 UTC 2023 kill -USR1 5536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5536 killed at Wed Oct 18 17:26:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:26:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5588 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5588 found at Wed Oct 18 17:26:45 UTC 2023 selfserv_9355 with PID 5588 started at Wed Oct 18 17:26:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5588 at Wed Oct 18 17:26:48 UTC 2023 kill -USR1 5588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5588 killed at Wed Oct 18 17:26:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5640 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5640 found at Wed Oct 18 17:26:48 UTC 2023 selfserv_9355 with PID 5640 started at Wed Oct 18 17:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5640 at Wed Oct 18 17:26:51 UTC 2023 kill -USR1 5640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5640 killed at Wed Oct 18 17:26:51 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5692 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5692 found at Wed Oct 18 17:26:51 UTC 2023 selfserv_9355 with PID 5692 started at Wed Oct 18 17:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5692 at Wed Oct 18 17:26:54 UTC 2023 kill -USR1 5692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5692 killed at Wed Oct 18 17:26:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5744 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5744 found at Wed Oct 18 17:26:54 UTC 2023 selfserv_9355 with PID 5744 started at Wed Oct 18 17:26:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5744 at Wed Oct 18 17:26:57 UTC 2023 kill -USR1 5744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5744 killed at Wed Oct 18 17:26:57 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:26:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:26:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5796 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5796 found at Wed Oct 18 17:26:57 UTC 2023 selfserv_9355 with PID 5796 started at Wed Oct 18 17:26:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5796 at Wed Oct 18 17:26:59 UTC 2023 kill -USR1 5796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5796 killed at Wed Oct 18 17:26:59 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5848 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5848 found at Wed Oct 18 17:27:00 UTC 2023 selfserv_9355 with PID 5848 started at Wed Oct 18 17:27:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1283: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5848 at Wed Oct 18 17:27:02 UTC 2023 kill -USR1 5848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5848 killed at Wed Oct 18 17:27:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5900 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5900 found at Wed Oct 18 17:27:02 UTC 2023 selfserv_9355 with PID 5900 started at Wed Oct 18 17:27:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5900 at Wed Oct 18 17:27:05 UTC 2023 kill -USR1 5900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5900 killed at Wed Oct 18 17:27:05 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5952 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5952 found at Wed Oct 18 17:27:05 UTC 2023 selfserv_9355 with PID 5952 started at Wed Oct 18 17:27:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5952 at Wed Oct 18 17:27:08 UTC 2023 kill -USR1 5952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5952 killed at Wed Oct 18 17:27:08 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6004 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6004 found at Wed Oct 18 17:27:08 UTC 2023 selfserv_9355 with PID 6004 started at Wed Oct 18 17:27:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6004 at Wed Oct 18 17:27:10 UTC 2023 kill -USR1 6004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6004 killed at Wed Oct 18 17:27:11 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6056 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6056 found at Wed Oct 18 17:27:11 UTC 2023 selfserv_9355 with PID 6056 started at Wed Oct 18 17:27:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6056 at Wed Oct 18 17:27:13 UTC 2023 kill -USR1 6056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6056 killed at Wed Oct 18 17:27:13 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6108 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6108 found at Wed Oct 18 17:27:14 UTC 2023 selfserv_9355 with PID 6108 started at Wed Oct 18 17:27:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1288: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6108 at Wed Oct 18 17:27:16 UTC 2023 kill -USR1 6108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6108 killed at Wed Oct 18 17:27:16 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6160 found at Wed Oct 18 17:27:16 UTC 2023 selfserv_9355 with PID 6160 started at Wed Oct 18 17:27:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6160 at Wed Oct 18 17:27:18 UTC 2023 kill -USR1 6160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6160 killed at Wed Oct 18 17:27:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6212 found at Wed Oct 18 17:27:19 UTC 2023 selfserv_9355 with PID 6212 started at Wed Oct 18 17:27:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6212 at Wed Oct 18 17:27:21 UTC 2023 kill -USR1 6212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6212 killed at Wed Oct 18 17:27:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6269 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6269 found at Wed Oct 18 17:27:21 UTC 2023 selfserv_9355 with PID 6269 started at Wed Oct 18 17:27:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6269 at Wed Oct 18 17:27:24 UTC 2023 kill -USR1 6269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6269 killed at Wed Oct 18 17:27:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6325 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6325 found at Wed Oct 18 17:27:24 UTC 2023 selfserv_9355 with PID 6325 started at Wed Oct 18 17:27:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6325 at Wed Oct 18 17:27:26 UTC 2023 kill -USR1 6325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6325 killed at Wed Oct 18 17:27:26 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6379 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6379 found at Wed Oct 18 17:27:27 UTC 2023 selfserv_9355 with PID 6379 started at Wed Oct 18 17:27:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6379 at Wed Oct 18 17:27:29 UTC 2023 kill -USR1 6379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6379 killed at Wed Oct 18 17:27:29 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6431 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6431 found at Wed Oct 18 17:27:30 UTC 2023 selfserv_9355 with PID 6431 started at Wed Oct 18 17:27:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6431 at Wed Oct 18 17:27:32 UTC 2023 kill -USR1 6431 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6431 killed at Wed Oct 18 17:27:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6483 found at Wed Oct 18 17:27:32 UTC 2023 selfserv_9355 with PID 6483 started at Wed Oct 18 17:27:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6483 at Wed Oct 18 17:27:34 UTC 2023 kill -USR1 6483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6483 killed at Wed Oct 18 17:27:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6535 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6535 found at Wed Oct 18 17:27:35 UTC 2023 selfserv_9355 with PID 6535 started at Wed Oct 18 17:27:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6535 at Wed Oct 18 17:27:37 UTC 2023 kill -USR1 6535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6535 killed at Wed Oct 18 17:27:37 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6587 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6587 found at Wed Oct 18 17:27:37 UTC 2023 selfserv_9355 with PID 6587 started at Wed Oct 18 17:27:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6587 at Wed Oct 18 17:27:40 UTC 2023 kill -USR1 6587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6587 killed at Wed Oct 18 17:27:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6639 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6639 found at Wed Oct 18 17:27:40 UTC 2023 selfserv_9355 with PID 6639 started at Wed Oct 18 17:27:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6639 at Wed Oct 18 17:27:42 UTC 2023 kill -USR1 6639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6639 killed at Wed Oct 18 17:27:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6691 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6691 found at Wed Oct 18 17:27:43 UTC 2023 selfserv_9355 with PID 6691 started at Wed Oct 18 17:27:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6691 at Wed Oct 18 17:27:45 UTC 2023 kill -USR1 6691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6691 killed at Wed Oct 18 17:27:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6743 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6743 found at Wed Oct 18 17:27:46 UTC 2023 selfserv_9355 with PID 6743 started at Wed Oct 18 17:27:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6743 at Wed Oct 18 17:27:48 UTC 2023 kill -USR1 6743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6743 killed at Wed Oct 18 17:27:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6795 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6795 found at Wed Oct 18 17:27:48 UTC 2023 selfserv_9355 with PID 6795 started at Wed Oct 18 17:27:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6795 at Wed Oct 18 17:27:50 UTC 2023 kill -USR1 6795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6795 killed at Wed Oct 18 17:27:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6847 found at Wed Oct 18 17:27:51 UTC 2023 selfserv_9355 with PID 6847 started at Wed Oct 18 17:27:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6847 at Wed Oct 18 17:27:53 UTC 2023 kill -USR1 6847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6847 killed at Wed Oct 18 17:27:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6901 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6901 found at Wed Oct 18 17:27:54 UTC 2023 selfserv_9355 with PID 6901 started at Wed Oct 18 17:27:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6901 at Wed Oct 18 17:27:56 UTC 2023 kill -USR1 6901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6901 killed at Wed Oct 18 17:27:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:27:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6953 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6953 found at Wed Oct 18 17:27:57 UTC 2023 selfserv_9355 with PID 6953 started at Wed Oct 18 17:27:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1304: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6953 at Wed Oct 18 17:27:59 UTC 2023 kill -USR1 6953 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6953 killed at Wed Oct 18 17:27:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:27:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:27:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7005 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7005 found at Wed Oct 18 17:27:59 UTC 2023 selfserv_9355 with PID 7005 started at Wed Oct 18 17:27:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7005 at Wed Oct 18 17:28:02 UTC 2023 kill -USR1 7005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7005 killed at Wed Oct 18 17:28:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:28:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7057 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7057 found at Wed Oct 18 17:28:02 UTC 2023 selfserv_9355 with PID 7057 started at Wed Oct 18 17:28:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7057 at Wed Oct 18 17:28:05 UTC 2023 kill -USR1 7057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7057 killed at Wed Oct 18 17:28:05 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:28:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7109 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7109 found at Wed Oct 18 17:28:05 UTC 2023 selfserv_9355 with PID 7109 started at Wed Oct 18 17:28:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7109 at Wed Oct 18 17:28:07 UTC 2023 kill -USR1 7109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7109 killed at Wed Oct 18 17:28:08 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:28:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7191 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7191 found at Wed Oct 18 17:28:08 UTC 2023 selfserv_9355 with PID 7191 started at Wed Oct 18 17:28:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7191 at Wed Oct 18 17:28:09 UTC 2023 kill -USR1 7191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7191 killed at Wed Oct 18 17:28:10 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7233 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7233 found at Wed Oct 18 17:28:10 UTC 2023 selfserv_9355 with PID 7233 started at Wed Oct 18 17:28:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7233 at Wed Oct 18 17:28:11 UTC 2023 kill -USR1 7233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7233 killed at Wed Oct 18 17:28:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7272 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7272 found at Wed Oct 18 17:28:11 UTC 2023 selfserv_9355 with PID 7272 started at Wed Oct 18 17:28:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7272 at Wed Oct 18 17:28:12 UTC 2023 kill -USR1 7272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7272 killed at Wed Oct 18 17:28:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7311 found at Wed Oct 18 17:28:13 UTC 2023 selfserv_9355 with PID 7311 started at Wed Oct 18 17:28:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7311 at Wed Oct 18 17:28:14 UTC 2023 kill -USR1 7311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7311 killed at Wed Oct 18 17:28:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7350 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7350 found at Wed Oct 18 17:28:14 UTC 2023 selfserv_9355 with PID 7350 started at Wed Oct 18 17:28:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1254: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 7350 at Wed Oct 18 17:28:15 UTC 2023 kill -USR1 7350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7350 killed at Wed Oct 18 17:28:15 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7389 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7389 found at Wed Oct 18 17:28:16 UTC 2023 selfserv_9355 with PID 7389 started at Wed Oct 18 17:28:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7389 at Wed Oct 18 17:28:17 UTC 2023 kill -USR1 7389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7389 killed at Wed Oct 18 17:28:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7428 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7428 found at Wed Oct 18 17:28:17 UTC 2023 selfserv_9355 with PID 7428 started at Wed Oct 18 17:28:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7428 at Wed Oct 18 17:28:18 UTC 2023 kill -USR1 7428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7428 killed at Wed Oct 18 17:28:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7467 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7467 found at Wed Oct 18 17:28:19 UTC 2023 selfserv_9355 with PID 7467 started at Wed Oct 18 17:28:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7467 at Wed Oct 18 17:28:20 UTC 2023 kill -USR1 7467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7467 killed at Wed Oct 18 17:28:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7511 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7511 found at Wed Oct 18 17:28:20 UTC 2023 selfserv_9355 with PID 7511 started at Wed Oct 18 17:28:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7511 at Wed Oct 18 17:28:21 UTC 2023 kill -USR1 7511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7511 killed at Wed Oct 18 17:28:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7550 found at Wed Oct 18 17:28:21 UTC 2023 selfserv_9355 with PID 7550 started at Wed Oct 18 17:28:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7550 at Wed Oct 18 17:28:23 UTC 2023 kill -USR1 7550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7550 killed at Wed Oct 18 17:28:23 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7593 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7593 found at Wed Oct 18 17:28:23 UTC 2023 selfserv_9355 with PID 7593 started at Wed Oct 18 17:28:23 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7593 at Wed Oct 18 17:28:24 UTC 2023 kill -USR1 7593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7593 killed at Wed Oct 18 17:28:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7635 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7635 found at Wed Oct 18 17:28:24 UTC 2023 selfserv_9355 with PID 7635 started at Wed Oct 18 17:28:24 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7635 at Wed Oct 18 17:28:25 UTC 2023 kill -USR1 7635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7635 killed at Wed Oct 18 17:28:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7677 found at Wed Oct 18 17:28:26 UTC 2023 selfserv_9355 with PID 7677 started at Wed Oct 18 17:28:26 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7677 at Wed Oct 18 17:28:27 UTC 2023 kill -USR1 7677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7677 killed at Wed Oct 18 17:28:27 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7717 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7717 found at Wed Oct 18 17:28:27 UTC 2023 selfserv_9355 with PID 7717 started at Wed Oct 18 17:28:27 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7717 at Wed Oct 18 17:28:28 UTC 2023 kill -USR1 7717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7717 killed at Wed Oct 18 17:28:28 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7757 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7757 found at Wed Oct 18 17:28:29 UTC 2023 selfserv_9355 with PID 7757 started at Wed Oct 18 17:28:29 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7757 at Wed Oct 18 17:28:30 UTC 2023 kill -USR1 7757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7757 killed at Wed Oct 18 17:28:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7797 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7797 found at Wed Oct 18 17:28:30 UTC 2023 selfserv_9355 with PID 7797 started at Wed Oct 18 17:28:30 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7797 at Wed Oct 18 17:28:31 UTC 2023 kill -USR1 7797 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7797 killed at Wed Oct 18 17:28:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7837 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7837 found at Wed Oct 18 17:28:32 UTC 2023 selfserv_9355 with PID 7837 started at Wed Oct 18 17:28:32 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7837 at Wed Oct 18 17:28:33 UTC 2023 kill -USR1 7837 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7837 killed at Wed Oct 18 17:28:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7877 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7877 found at Wed Oct 18 17:28:33 UTC 2023 selfserv_9355 with PID 7877 started at Wed Oct 18 17:28:33 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7877 at Wed Oct 18 17:28:34 UTC 2023 kill -USR1 7877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7877 killed at Wed Oct 18 17:28:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:28:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7917 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7917 found at Wed Oct 18 17:28:35 UTC 2023 selfserv_9355 with PID 7917 started at Wed Oct 18 17:28:35 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7917 at Wed Oct 18 17:28:36 UTC 2023 kill -USR1 7917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7917 killed at Wed Oct 18 17:28:36 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -fips false -force FIPS mode disabled. ssl.sh: #1269: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1272: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -fips true -force FIPS mode enabled. ssl.sh: #1275: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1276: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1277: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1278: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1279: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1280: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 17:28:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:28:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 8039 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8039 found at Wed Oct 18 17:28:38 UTC 2023 selfserv_9355 with PID 8039 started at Wed Oct 18 17:28:38 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 8039 at Wed Oct 18 17:28:59 UTC 2023 kill -USR1 8039 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8039 killed at Wed Oct 18 17:29:00 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:29:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:29:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 8589 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8589 found at Wed Oct 18 17:29:00 UTC 2023 selfserv_9355 with PID 8589 started at Wed Oct 18 17:29:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8589 at Wed Oct 18 17:29:34 UTC 2023 kill -USR1 8589 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8589 killed at Wed Oct 18 17:29:34 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 17:29:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:29:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9399 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9399 found at Wed Oct 18 17:29:35 UTC 2023 selfserv_9355 with PID 9399 started at Wed Oct 18 17:29:35 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9399 at Wed Oct 18 17:29:36 UTC 2023 kill -USR1 9399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9399 killed at Wed Oct 18 17:29:36 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:29:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:29:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9477 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9477 found at Wed Oct 18 17:29:36 UTC 2023 selfserv_9355 with PID 9477 started at Wed Oct 18 17:29:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9477 at Wed Oct 18 17:29:38 UTC 2023 kill -USR1 9477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9477 killed at Wed Oct 18 17:29:38 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:29:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:29:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9529 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9529 found at Wed Oct 18 17:29:38 UTC 2023 selfserv_9355 with PID 9529 started at Wed Oct 18 17:29:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9529 at Wed Oct 18 17:30:03 UTC 2023 kill -USR1 9529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9529 killed at Wed Oct 18 17:30:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:30:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9645 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9645 found at Wed Oct 18 17:30:03 UTC 2023 selfserv_9355 with PID 9645 started at Wed Oct 18 17:30:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9645 at Wed Oct 18 17:30:05 UTC 2023 kill -USR1 9645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9645 killed at Wed Oct 18 17:30:05 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:30:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9709 found at Wed Oct 18 17:30:05 UTC 2023 selfserv_9355 with PID 9709 started at Wed Oct 18 17:30:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9709 at Wed Oct 18 17:30:07 UTC 2023 kill -USR1 9709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9709 killed at Wed Oct 18 17:30:07 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:30:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9761 found at Wed Oct 18 17:30:07 UTC 2023 selfserv_9355 with PID 9761 started at Wed Oct 18 17:30:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1412: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9761 at Wed Oct 18 17:30:31 UTC 2023 kill -USR1 9761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9761 killed at Wed Oct 18 17:30:31 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:30:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9825 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9825 found at Wed Oct 18 17:30:31 UTC 2023 selfserv_9355 with PID 9825 started at Wed Oct 18 17:30:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9825 at Wed Oct 18 17:30:33 UTC 2023 kill -USR1 9825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9825 killed at Wed Oct 18 17:30:33 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:30:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9889 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9889 found at Wed Oct 18 17:30:33 UTC 2023 selfserv_9355 with PID 9889 started at Wed Oct 18 17:30:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9889 at Wed Oct 18 17:30:35 UTC 2023 kill -USR1 9889 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9889 killed at Wed Oct 18 17:30:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:30:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:30:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9944 found at Wed Oct 18 17:30:36 UTC 2023 selfserv_9355 with PID 9944 started at Wed Oct 18 17:30:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1415: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9944 at Wed Oct 18 17:31:00 UTC 2023 kill -USR1 9944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9944 killed at Wed Oct 18 17:31:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:31:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9996 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9996 found at Wed Oct 18 17:31:00 UTC 2023 selfserv_9355 with PID 9996 started at Wed Oct 18 17:31:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9996 at Wed Oct 18 17:31:02 UTC 2023 kill -USR1 9996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9996 killed at Wed Oct 18 17:31:02 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:31:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10060 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10060 found at Wed Oct 18 17:31:02 UTC 2023 selfserv_9355 with PID 10060 started at Wed Oct 18 17:31:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1417: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10060 at Wed Oct 18 17:31:04 UTC 2023 kill -USR1 10060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10060 killed at Wed Oct 18 17:31:05 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:31:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10112 found at Wed Oct 18 17:31:05 UTC 2023 selfserv_9355 with PID 10112 started at Wed Oct 18 17:31:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10112 at Wed Oct 18 17:31:29 UTC 2023 kill -USR1 10112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10112 killed at Wed Oct 18 17:31:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:31:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10177 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10177 found at Wed Oct 18 17:31:30 UTC 2023 selfserv_9355 with PID 10177 started at Wed Oct 18 17:31:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10177 at Wed Oct 18 17:31:31 UTC 2023 kill -USR1 10177 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10177 killed at Wed Oct 18 17:31:31 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:31:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10241 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10241 found at Wed Oct 18 17:31:32 UTC 2023 selfserv_9355 with PID 10241 started at Wed Oct 18 17:31:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1420: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10241 at Wed Oct 18 17:31:34 UTC 2023 kill -USR1 10241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10241 killed at Wed Oct 18 17:31:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:31:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10293 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10293 found at Wed Oct 18 17:31:34 UTC 2023 selfserv_9355 with PID 10293 started at Wed Oct 18 17:31:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10293 at Wed Oct 18 17:31:58 UTC 2023 kill -USR1 10293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10293 killed at Wed Oct 18 17:31:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:31:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:31:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10347 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10347 found at Wed Oct 18 17:31:58 UTC 2023 selfserv_9355 with PID 10347 started at Wed Oct 18 17:31:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10347 at Wed Oct 18 17:32:00 UTC 2023 kill -USR1 10347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10347 killed at Wed Oct 18 17:32:00 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:32:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10403 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10403 found at Wed Oct 18 17:32:00 UTC 2023 selfserv_9355 with PID 10403 started at Wed Oct 18 17:32:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10403 at Wed Oct 18 17:32:01 UTC 2023 kill -USR1 10403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10403 killed at Wed Oct 18 17:32:01 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:32:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10459 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10459 found at Wed Oct 18 17:32:02 UTC 2023 selfserv_9355 with PID 10459 started at Wed Oct 18 17:32:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10459 at Wed Oct 18 17:32:03 UTC 2023 kill -USR1 10459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10459 killed at Wed Oct 18 17:32:04 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:32:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10515 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10515 found at Wed Oct 18 17:32:04 UTC 2023 selfserv_9355 with PID 10515 started at Wed Oct 18 17:32:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10515 at Wed Oct 18 17:32:06 UTC 2023 kill -USR1 10515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10515 killed at Wed Oct 18 17:32:06 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:32:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10577 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10577 found at Wed Oct 18 17:32:06 UTC 2023 selfserv_9355 with PID 10577 started at Wed Oct 18 17:32:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10577 at Wed Oct 18 17:32:31 UTC 2023 kill -USR1 10577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10577 killed at Wed Oct 18 17:32:31 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:32:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10642 found at Wed Oct 18 17:32:31 UTC 2023 selfserv_9355 with PID 10642 started at Wed Oct 18 17:32:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10642 at Wed Oct 18 17:32:32 UTC 2023 kill -USR1 10642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10642 killed at Wed Oct 18 17:32:33 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:32:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10702 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10702 found at Wed Oct 18 17:32:33 UTC 2023 selfserv_9355 with PID 10702 started at Wed Oct 18 17:32:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10702 at Wed Oct 18 17:32:56 UTC 2023 kill -USR1 10702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10702 killed at Wed Oct 18 17:32:56 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:32:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10756 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10756 found at Wed Oct 18 17:32:57 UTC 2023 selfserv_9355 with PID 10756 started at Wed Oct 18 17:32:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10756 at Wed Oct 18 17:32:58 UTC 2023 kill -USR1 10756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10756 killed at Wed Oct 18 17:32:58 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:32:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:32:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10816 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10816 found at Wed Oct 18 17:32:59 UTC 2023 selfserv_9355 with PID 10816 started at Wed Oct 18 17:32:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1430: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10816 at Wed Oct 18 17:33:23 UTC 2023 kill -USR1 10816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10816 killed at Wed Oct 18 17:33:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:33:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:33:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10877 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10877 found at Wed Oct 18 17:33:23 UTC 2023 selfserv_9355 with PID 10877 started at Wed Oct 18 17:33:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10877 at Wed Oct 18 17:33:25 UTC 2023 kill -USR1 10877 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10877 killed at Wed Oct 18 17:33:25 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:33:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:33:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10938 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10938 found at Wed Oct 18 17:33:25 UTC 2023 selfserv_9355 with PID 10938 started at Wed Oct 18 17:33:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1432: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10938 at Wed Oct 18 17:33:49 UTC 2023 kill -USR1 10938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10938 killed at Wed Oct 18 17:33:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:33:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:33:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10991 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10991 found at Wed Oct 18 17:33:50 UTC 2023 selfserv_9355 with PID 10991 started at Wed Oct 18 17:33:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10991 at Wed Oct 18 17:33:51 UTC 2023 kill -USR1 10991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10991 killed at Wed Oct 18 17:33:51 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:33:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:33:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11051 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11051 found at Wed Oct 18 17:33:52 UTC 2023 selfserv_9355 with PID 11051 started at Wed Oct 18 17:33:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1434: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11051 at Wed Oct 18 17:34:15 UTC 2023 kill -USR1 11051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11051 killed at Wed Oct 18 17:34:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:34:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11103 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11103 found at Wed Oct 18 17:34:16 UTC 2023 selfserv_9355 with PID 11103 started at Wed Oct 18 17:34:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11103 at Wed Oct 18 17:34:17 UTC 2023 kill -USR1 11103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11103 killed at Wed Oct 18 17:34:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:34:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11155 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11155 found at Wed Oct 18 17:34:17 UTC 2023 selfserv_9355 with PID 11155 started at Wed Oct 18 17:34:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11155 at Wed Oct 18 17:34:19 UTC 2023 kill -USR1 11155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11155 killed at Wed Oct 18 17:34:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:34:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11212 found at Wed Oct 18 17:34:20 UTC 2023 selfserv_9355 with PID 11212 started at Wed Oct 18 17:34:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11212 at Wed Oct 18 17:34:22 UTC 2023 kill -USR1 11212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11212 killed at Wed Oct 18 17:34:22 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:34:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11270 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11270 found at Wed Oct 18 17:34:22 UTC 2023 selfserv_9355 with PID 11270 started at Wed Oct 18 17:34:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11270 at Wed Oct 18 17:34:23 UTC 2023 kill -USR1 11270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11270 killed at Wed Oct 18 17:34:24 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:34:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11332 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11332 found at Wed Oct 18 17:34:24 UTC 2023 selfserv_9355 with PID 11332 started at Wed Oct 18 17:34:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11332 at Wed Oct 18 17:34:26 UTC 2023 kill -USR1 11332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11332 killed at Wed Oct 18 17:34:26 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:34:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11391 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11391 found at Wed Oct 18 17:34:26 UTC 2023 selfserv_9355 with PID 11391 started at Wed Oct 18 17:34:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11391 at Wed Oct 18 17:34:27 UTC 2023 kill -USR1 11391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11391 killed at Wed Oct 18 17:34:27 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:34:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11450 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11450 found at Wed Oct 18 17:34:27 UTC 2023 selfserv_9355 with PID 11450 started at Wed Oct 18 17:34:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1441: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11450 at Wed Oct 18 17:34:29 UTC 2023 kill -USR1 11450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11450 killed at Wed Oct 18 17:34:29 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 17:34:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11508 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11508 found at Wed Oct 18 17:34:29 UTC 2023 selfserv_9355 with PID 11508 started at Wed Oct 18 17:34:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1442: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11508 at Wed Oct 18 17:34:30 UTC 2023 kill -USR1 11508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11508 killed at Wed Oct 18 17:34:30 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 17:34:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11566 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11566 found at Wed Oct 18 17:34:30 UTC 2023 selfserv_9355 with PID 11566 started at Wed Oct 18 17:34:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1443: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11566 at Wed Oct 18 17:34:32 UTC 2023 kill -USR1 11566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11566 killed at Wed Oct 18 17:34:32 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 17:34:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11624 found at Wed Oct 18 17:34:32 UTC 2023 selfserv_9355 with PID 11624 started at Wed Oct 18 17:34:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11624 at Wed Oct 18 17:34:34 UTC 2023 kill -USR1 11624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11624 killed at Wed Oct 18 17:34:34 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:34:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11682 found at Wed Oct 18 17:34:34 UTC 2023 selfserv_9355 with PID 11682 started at Wed Oct 18 17:34:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1445: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11682 at Wed Oct 18 17:34:36 UTC 2023 kill -USR1 11682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11682 killed at Wed Oct 18 17:34:36 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 17:34:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11740 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11740 found at Wed Oct 18 17:34:36 UTC 2023 selfserv_9355 with PID 11740 started at Wed Oct 18 17:34:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1446: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11740 at Wed Oct 18 17:34:37 UTC 2023 kill -USR1 11740 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11740 killed at Wed Oct 18 17:34:37 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 17:34:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11798 found at Wed Oct 18 17:34:38 UTC 2023 selfserv_9355 with PID 11798 started at Wed Oct 18 17:34:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11798 at Wed Oct 18 17:34:38 UTC 2023 kill -USR1 11798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11798 killed at Wed Oct 18 17:34:39 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 17:34:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11840 found at Wed Oct 18 17:34:39 UTC 2023 selfserv_9355 with PID 11840 started at Wed Oct 18 17:34:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1408: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11840 at Wed Oct 18 17:34:40 UTC 2023 kill -USR1 11840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11840 killed at Wed Oct 18 17:34:40 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 17:34:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11882 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11882 found at Wed Oct 18 17:34:41 UTC 2023 selfserv_9355 with PID 11882 started at Wed Oct 18 17:34:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 11882 at Wed Oct 18 17:34:42 UTC 2023 kill -USR1 11882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11882 killed at Wed Oct 18 17:34:42 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 17:34:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11924 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11924 found at Wed Oct 18 17:34:42 UTC 2023 selfserv_9355 with PID 11924 started at Wed Oct 18 17:34:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 11924 at Wed Oct 18 17:34:44 UTC 2023 kill -USR1 11924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11924 killed at Wed Oct 18 17:34:44 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 17:34:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11966 found at Wed Oct 18 17:34:44 UTC 2023 selfserv_9355 with PID 11966 started at Wed Oct 18 17:34:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 11966 at Wed Oct 18 17:34:45 UTC 2023 kill -USR1 11966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11966 killed at Wed Oct 18 17:34:45 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 17:34:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12008 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12008 found at Wed Oct 18 17:34:45 UTC 2023 selfserv_9355 with PID 12008 started at Wed Oct 18 17:34:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12008 at Wed Oct 18 17:34:46 UTC 2023 kill -USR1 12008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12008 killed at Wed Oct 18 17:34:46 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 17:34:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12050 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12050 found at Wed Oct 18 17:34:47 UTC 2023 selfserv_9355 with PID 12050 started at Wed Oct 18 17:34:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12050 at Wed Oct 18 17:34:48 UTC 2023 kill -USR1 12050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12050 killed at Wed Oct 18 17:34:48 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 17:34:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12092 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12092 found at Wed Oct 18 17:34:48 UTC 2023 selfserv_9355 with PID 12092 started at Wed Oct 18 17:34:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1414: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 12092 at Wed Oct 18 17:34:49 UTC 2023 kill -USR1 12092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12092 killed at Wed Oct 18 17:34:49 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 17:34:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:34:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12134 found at Wed Oct 18 17:34:49 UTC 2023 selfserv_9355 with PID 12134 started at Wed Oct 18 17:34:49 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:34:49 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:35:34 UTC 2023 ssl.sh: #1415: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 12134 at Wed Oct 18 17:35:34 UTC 2023 kill -USR1 12134 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12134 killed at Wed Oct 18 17:35:34 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:35:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12211 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12211 found at Wed Oct 18 17:35:34 UTC 2023 selfserv_9355 with PID 12211 started at Wed Oct 18 17:35:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12211 at Wed Oct 18 17:35:35 UTC 2023 kill -USR1 12211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12211 killed at Wed Oct 18 17:35:36 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12253 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12253 found at Wed Oct 18 17:35:36 UTC 2023 selfserv_9355 with PID 12253 started at Wed Oct 18 17:35:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12253 at Wed Oct 18 17:35:37 UTC 2023 kill -USR1 12253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12253 killed at Wed Oct 18 17:35:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12292 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12292 found at Wed Oct 18 17:35:37 UTC 2023 selfserv_9355 with PID 12292 started at Wed Oct 18 17:35:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12292 at Wed Oct 18 17:35:38 UTC 2023 kill -USR1 12292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12292 killed at Wed Oct 18 17:35:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12331 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12331 found at Wed Oct 18 17:35:38 UTC 2023 selfserv_9355 with PID 12331 started at Wed Oct 18 17:35:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12331 at Wed Oct 18 17:35:39 UTC 2023 kill -USR1 12331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12331 killed at Wed Oct 18 17:35:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12370 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12370 found at Wed Oct 18 17:35:39 UTC 2023 selfserv_9355 with PID 12370 started at Wed Oct 18 17:35:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 12370 at Wed Oct 18 17:35:40 UTC 2023 kill -USR1 12370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12370 killed at Wed Oct 18 17:35:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12409 found at Wed Oct 18 17:35:40 UTC 2023 selfserv_9355 with PID 12409 started at Wed Oct 18 17:35:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12409 at Wed Oct 18 17:35:41 UTC 2023 kill -USR1 12409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12409 killed at Wed Oct 18 17:35:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12448 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12448 found at Wed Oct 18 17:35:41 UTC 2023 selfserv_9355 with PID 12448 started at Wed Oct 18 17:35:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12448 at Wed Oct 18 17:35:42 UTC 2023 kill -USR1 12448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12448 killed at Wed Oct 18 17:35:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12487 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12487 found at Wed Oct 18 17:35:42 UTC 2023 selfserv_9355 with PID 12487 started at Wed Oct 18 17:35:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12487 at Wed Oct 18 17:35:43 UTC 2023 kill -USR1 12487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12487 killed at Wed Oct 18 17:35:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12526 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12526 found at Wed Oct 18 17:35:43 UTC 2023 selfserv_9355 with PID 12526 started at Wed Oct 18 17:35:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12526 at Wed Oct 18 17:35:44 UTC 2023 kill -USR1 12526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12526 killed at Wed Oct 18 17:35:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12565 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12565 found at Wed Oct 18 17:35:45 UTC 2023 selfserv_9355 with PID 12565 started at Wed Oct 18 17:35:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12565 at Wed Oct 18 17:35:45 UTC 2023 kill -USR1 12565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12565 killed at Wed Oct 18 17:35:45 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12604 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12604 found at Wed Oct 18 17:35:46 UTC 2023 selfserv_9355 with PID 12604 started at Wed Oct 18 17:35:46 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12604 at Wed Oct 18 17:35:46 UTC 2023 kill -USR1 12604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12604 killed at Wed Oct 18 17:35:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12644 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12644 found at Wed Oct 18 17:35:47 UTC 2023 selfserv_9355 with PID 12644 started at Wed Oct 18 17:35:47 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12644 at Wed Oct 18 17:35:47 UTC 2023 kill -USR1 12644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12644 killed at Wed Oct 18 17:35:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12684 found at Wed Oct 18 17:35:48 UTC 2023 selfserv_9355 with PID 12684 started at Wed Oct 18 17:35:48 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12684 at Wed Oct 18 17:35:48 UTC 2023 kill -USR1 12684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12684 killed at Wed Oct 18 17:35:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12724 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12724 found at Wed Oct 18 17:35:49 UTC 2023 selfserv_9355 with PID 12724 started at Wed Oct 18 17:35:49 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12724 at Wed Oct 18 17:35:49 UTC 2023 kill -USR1 12724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12724 killed at Wed Oct 18 17:35:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12764 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12764 found at Wed Oct 18 17:35:50 UTC 2023 selfserv_9355 with PID 12764 started at Wed Oct 18 17:35:50 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12764 at Wed Oct 18 17:35:51 UTC 2023 kill -USR1 12764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12764 killed at Wed Oct 18 17:35:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12804 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12804 found at Wed Oct 18 17:35:51 UTC 2023 selfserv_9355 with PID 12804 started at Wed Oct 18 17:35:51 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12804 at Wed Oct 18 17:35:52 UTC 2023 kill -USR1 12804 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12804 killed at Wed Oct 18 17:35:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12844 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12844 found at Wed Oct 18 17:35:52 UTC 2023 selfserv_9355 with PID 12844 started at Wed Oct 18 17:35:52 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12844 at Wed Oct 18 17:35:53 UTC 2023 kill -USR1 12844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12844 killed at Wed Oct 18 17:35:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12884 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12884 found at Wed Oct 18 17:35:53 UTC 2023 selfserv_9355 with PID 12884 started at Wed Oct 18 17:35:53 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12884 at Wed Oct 18 17:35:54 UTC 2023 kill -USR1 12884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12884 killed at Wed Oct 18 17:35:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:35:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12924 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12924 found at Wed Oct 18 17:35:54 UTC 2023 selfserv_9355 with PID 12924 started at Wed Oct 18 17:35:54 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12924 at Wed Oct 18 17:35:55 UTC 2023 kill -USR1 12924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12924 killed at Wed Oct 18 17:35:55 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 17:35:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:35:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 12964 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12964 found at Wed Oct 18 17:35:55 UTC 2023 selfserv_9355 with PID 12964 started at Wed Oct 18 17:35:55 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 12964 at Wed Oct 18 17:36:17 UTC 2023 kill -USR1 12964 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12964 killed at Wed Oct 18 17:36:17 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 17:36:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:36:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 13515 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13515 found at Wed Oct 18 17:36:18 UTC 2023 selfserv_9355 with PID 13515 started at Wed Oct 18 17:36:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13515 at Wed Oct 18 17:36:50 UTC 2023 kill -USR1 13515 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13515 killed at Wed Oct 18 17:36:51 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:36:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:36:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14361 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14361 found at Wed Oct 18 17:36:51 UTC 2023 selfserv_9355 with PID 14361 started at Wed Oct 18 17:36:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14361 at Wed Oct 18 17:36:54 UTC 2023 kill -USR1 14361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14361 killed at Wed Oct 18 17:36:54 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:36:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:36:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14413 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14413 found at Wed Oct 18 17:36:55 UTC 2023 selfserv_9355 with PID 14413 started at Wed Oct 18 17:36:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14413 at Wed Oct 18 17:37:20 UTC 2023 kill -USR1 14413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14413 killed at Wed Oct 18 17:37:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:37:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14472 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14472 found at Wed Oct 18 17:37:21 UTC 2023 selfserv_9355 with PID 14472 started at Wed Oct 18 17:37:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14472 at Wed Oct 18 17:37:24 UTC 2023 kill -USR1 14472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14472 killed at Wed Oct 18 17:37:24 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:37:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14540 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14540 found at Wed Oct 18 17:37:24 UTC 2023 selfserv_9355 with PID 14540 started at Wed Oct 18 17:37:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14540 at Wed Oct 18 17:37:27 UTC 2023 kill -USR1 14540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14540 killed at Wed Oct 18 17:37:28 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:37:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14594 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14594 found at Wed Oct 18 17:37:28 UTC 2023 selfserv_9355 with PID 14594 started at Wed Oct 18 17:37:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1566: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14594 at Wed Oct 18 17:37:52 UTC 2023 kill -USR1 14594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14594 killed at Wed Oct 18 17:37:52 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:37:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14646 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14646 found at Wed Oct 18 17:37:52 UTC 2023 selfserv_9355 with PID 14646 started at Wed Oct 18 17:37:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14646 at Wed Oct 18 17:37:55 UTC 2023 kill -USR1 14646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14646 killed at Wed Oct 18 17:37:55 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:37:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14710 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14710 found at Wed Oct 18 17:37:56 UTC 2023 selfserv_9355 with PID 14710 started at Wed Oct 18 17:37:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14710 at Wed Oct 18 17:37:59 UTC 2023 kill -USR1 14710 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14710 killed at Wed Oct 18 17:37:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:37:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:37:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14762 found at Wed Oct 18 17:37:59 UTC 2023 selfserv_9355 with PID 14762 started at Wed Oct 18 17:37:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1569: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14762 at Wed Oct 18 17:38:25 UTC 2023 kill -USR1 14762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14762 killed at Wed Oct 18 17:38:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:38:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:38:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14830 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14830 found at Wed Oct 18 17:38:25 UTC 2023 selfserv_9355 with PID 14830 started at Wed Oct 18 17:38:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14830 at Wed Oct 18 17:38:28 UTC 2023 kill -USR1 14830 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14830 killed at Wed Oct 18 17:38:28 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:38:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:38:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14895 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14895 found at Wed Oct 18 17:38:28 UTC 2023 selfserv_9355 with PID 14895 started at Wed Oct 18 17:38:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1571: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14895 at Wed Oct 18 17:38:32 UTC 2023 kill -USR1 14895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14895 killed at Wed Oct 18 17:38:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:38:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:38:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14947 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14947 found at Wed Oct 18 17:38:32 UTC 2023 selfserv_9355 with PID 14947 started at Wed Oct 18 17:38:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14947 at Wed Oct 18 17:38:57 UTC 2023 kill -USR1 14947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14947 killed at Wed Oct 18 17:38:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:38:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:38:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15001 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15001 found at Wed Oct 18 17:38:58 UTC 2023 selfserv_9355 with PID 15001 started at Wed Oct 18 17:38:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15001 at Wed Oct 18 17:39:01 UTC 2023 kill -USR1 15001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15001 killed at Wed Oct 18 17:39:01 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:39:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15065 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15065 found at Wed Oct 18 17:39:01 UTC 2023 selfserv_9355 with PID 15065 started at Wed Oct 18 17:39:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15065 at Wed Oct 18 17:39:05 UTC 2023 kill -USR1 15065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15065 killed at Wed Oct 18 17:39:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:39:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15117 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15117 found at Wed Oct 18 17:39:05 UTC 2023 selfserv_9355 with PID 15117 started at Wed Oct 18 17:39:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15117 at Wed Oct 18 17:39:29 UTC 2023 kill -USR1 15117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15117 killed at Wed Oct 18 17:39:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:39:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15180 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15180 found at Wed Oct 18 17:39:29 UTC 2023 selfserv_9355 with PID 15180 started at Wed Oct 18 17:39:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15180 at Wed Oct 18 17:39:32 UTC 2023 kill -USR1 15180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15180 killed at Wed Oct 18 17:39:32 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:39:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15236 found at Wed Oct 18 17:39:32 UTC 2023 selfserv_9355 with PID 15236 started at Wed Oct 18 17:39:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15236 at Wed Oct 18 17:39:35 UTC 2023 kill -USR1 15236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15236 killed at Wed Oct 18 17:39:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 17:39:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15292 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15292 found at Wed Oct 18 17:39:35 UTC 2023 selfserv_9355 with PID 15292 started at Wed Oct 18 17:39:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15292 at Wed Oct 18 17:39:39 UTC 2023 kill -USR1 15292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15292 killed at Wed Oct 18 17:39:39 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:39:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15348 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15348 found at Wed Oct 18 17:39:39 UTC 2023 selfserv_9355 with PID 15348 started at Wed Oct 18 17:39:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15348 at Wed Oct 18 17:39:43 UTC 2023 kill -USR1 15348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15348 killed at Wed Oct 18 17:39:43 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:39:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:39:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15408 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15408 found at Wed Oct 18 17:39:43 UTC 2023 selfserv_9355 with PID 15408 started at Wed Oct 18 17:39:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15408 at Wed Oct 18 17:40:09 UTC 2023 kill -USR1 15408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15408 killed at Wed Oct 18 17:40:09 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:40:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:40:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15460 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15460 found at Wed Oct 18 17:40:10 UTC 2023 selfserv_9355 with PID 15460 started at Wed Oct 18 17:40:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15460 at Wed Oct 18 17:40:12 UTC 2023 kill -USR1 15460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15460 killed at Wed Oct 18 17:40:12 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:40:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:40:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15520 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15520 found at Wed Oct 18 17:40:12 UTC 2023 selfserv_9355 with PID 15520 started at Wed Oct 18 17:40:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15520 at Wed Oct 18 17:40:36 UTC 2023 kill -USR1 15520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15520 killed at Wed Oct 18 17:40:36 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:40:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:40:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15583 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15583 found at Wed Oct 18 17:40:37 UTC 2023 selfserv_9355 with PID 15583 started at Wed Oct 18 17:40:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15583 at Wed Oct 18 17:40:39 UTC 2023 kill -USR1 15583 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15583 killed at Wed Oct 18 17:40:39 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:40:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:40:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15643 found at Wed Oct 18 17:40:40 UTC 2023 selfserv_9355 with PID 15643 started at Wed Oct 18 17:40:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1584: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15643 at Wed Oct 18 17:41:05 UTC 2023 kill -USR1 15643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15643 killed at Wed Oct 18 17:41:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:41:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:41:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15695 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15695 found at Wed Oct 18 17:41:05 UTC 2023 selfserv_9355 with PID 15695 started at Wed Oct 18 17:41:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15695 at Wed Oct 18 17:41:08 UTC 2023 kill -USR1 15695 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15695 killed at Wed Oct 18 17:41:08 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:41:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:41:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15755 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15755 found at Wed Oct 18 17:41:08 UTC 2023 selfserv_9355 with PID 15755 started at Wed Oct 18 17:41:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15755 at Wed Oct 18 17:41:34 UTC 2023 kill -USR1 15755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15755 killed at Wed Oct 18 17:41:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:41:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:41:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15822 found at Wed Oct 18 17:41:34 UTC 2023 selfserv_9355 with PID 15822 started at Wed Oct 18 17:41:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15822 at Wed Oct 18 17:41:37 UTC 2023 kill -USR1 15822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15822 killed at Wed Oct 18 17:41:37 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 17:41:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:41:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15882 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15882 found at Wed Oct 18 17:41:37 UTC 2023 selfserv_9355 with PID 15882 started at Wed Oct 18 17:41:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1588: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 15882 at Wed Oct 18 17:42:00 UTC 2023 kill -USR1 15882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15882 killed at Wed Oct 18 17:42:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:42:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15938 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15938 found at Wed Oct 18 17:42:01 UTC 2023 selfserv_9355 with PID 15938 started at Wed Oct 18 17:42:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15938 at Wed Oct 18 17:42:04 UTC 2023 kill -USR1 15938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15938 killed at Wed Oct 18 17:42:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:42:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15990 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15990 found at Wed Oct 18 17:42:04 UTC 2023 selfserv_9355 with PID 15990 started at Wed Oct 18 17:42:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 15990 at Wed Oct 18 17:42:08 UTC 2023 kill -USR1 15990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15990 killed at Wed Oct 18 17:42:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 17:42:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16042 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16042 found at Wed Oct 18 17:42:08 UTC 2023 selfserv_9355 with PID 16042 started at Wed Oct 18 17:42:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16042 at Wed Oct 18 17:42:11 UTC 2023 kill -USR1 16042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16042 killed at Wed Oct 18 17:42:11 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 17:42:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16124 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16124 found at Wed Oct 18 17:42:12 UTC 2023 selfserv_9355 with PID 16124 started at Wed Oct 18 17:42:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16124 at Wed Oct 18 17:42:13 UTC 2023 kill -USR1 16124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16124 killed at Wed Oct 18 17:42:14 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16166 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16166 found at Wed Oct 18 17:42:14 UTC 2023 selfserv_9355 with PID 16166 started at Wed Oct 18 17:42:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16166 at Wed Oct 18 17:42:15 UTC 2023 kill -USR1 16166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16166 killed at Wed Oct 18 17:42:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16205 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16205 found at Wed Oct 18 17:42:15 UTC 2023 selfserv_9355 with PID 16205 started at Wed Oct 18 17:42:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16205 at Wed Oct 18 17:42:16 UTC 2023 kill -USR1 16205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16205 killed at Wed Oct 18 17:42:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16244 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16244 found at Wed Oct 18 17:42:17 UTC 2023 selfserv_9355 with PID 16244 started at Wed Oct 18 17:42:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16244 at Wed Oct 18 17:42:18 UTC 2023 kill -USR1 16244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16244 killed at Wed Oct 18 17:42:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16283 found at Wed Oct 18 17:42:18 UTC 2023 selfserv_9355 with PID 16283 started at Wed Oct 18 17:42:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1566: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 16283 at Wed Oct 18 17:42:19 UTC 2023 kill -USR1 16283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16283 killed at Wed Oct 18 17:42:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16322 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16322 found at Wed Oct 18 17:42:20 UTC 2023 selfserv_9355 with PID 16322 started at Wed Oct 18 17:42:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16322 at Wed Oct 18 17:42:21 UTC 2023 kill -USR1 16322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16322 killed at Wed Oct 18 17:42:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16366 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16366 found at Wed Oct 18 17:42:21 UTC 2023 selfserv_9355 with PID 16366 started at Wed Oct 18 17:42:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16366 at Wed Oct 18 17:42:23 UTC 2023 kill -USR1 16366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16366 killed at Wed Oct 18 17:42:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16409 found at Wed Oct 18 17:42:23 UTC 2023 selfserv_9355 with PID 16409 started at Wed Oct 18 17:42:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16409 at Wed Oct 18 17:42:24 UTC 2023 kill -USR1 16409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16409 killed at Wed Oct 18 17:42:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16449 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16449 found at Wed Oct 18 17:42:25 UTC 2023 selfserv_9355 with PID 16449 started at Wed Oct 18 17:42:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16449 at Wed Oct 18 17:42:26 UTC 2023 kill -USR1 16449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16449 killed at Wed Oct 18 17:42:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16488 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16488 found at Wed Oct 18 17:42:26 UTC 2023 selfserv_9355 with PID 16488 started at Wed Oct 18 17:42:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16488 at Wed Oct 18 17:42:27 UTC 2023 kill -USR1 16488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16488 killed at Wed Oct 18 17:42:27 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16528 found at Wed Oct 18 17:42:28 UTC 2023 selfserv_9355 with PID 16528 started at Wed Oct 18 17:42:28 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16528 at Wed Oct 18 17:42:29 UTC 2023 kill -USR1 16528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16528 killed at Wed Oct 18 17:42:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16568 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16568 found at Wed Oct 18 17:42:29 UTC 2023 selfserv_9355 with PID 16568 started at Wed Oct 18 17:42:29 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16568 at Wed Oct 18 17:42:30 UTC 2023 kill -USR1 16568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16568 killed at Wed Oct 18 17:42:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16608 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16608 found at Wed Oct 18 17:42:31 UTC 2023 selfserv_9355 with PID 16608 started at Wed Oct 18 17:42:31 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16608 at Wed Oct 18 17:42:32 UTC 2023 kill -USR1 16608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16608 killed at Wed Oct 18 17:42:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16648 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16648 found at Wed Oct 18 17:42:32 UTC 2023 selfserv_9355 with PID 16648 started at Wed Oct 18 17:42:32 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 16648 at Wed Oct 18 17:42:33 UTC 2023 kill -USR1 16648 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16648 killed at Wed Oct 18 17:42:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16688 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16688 found at Wed Oct 18 17:42:34 UTC 2023 selfserv_9355 with PID 16688 started at Wed Oct 18 17:42:34 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16688 at Wed Oct 18 17:42:35 UTC 2023 kill -USR1 16688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16688 killed at Wed Oct 18 17:42:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16728 found at Wed Oct 18 17:42:35 UTC 2023 selfserv_9355 with PID 16728 started at Wed Oct 18 17:42:35 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16728 at Wed Oct 18 17:42:36 UTC 2023 kill -USR1 16728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16728 killed at Wed Oct 18 17:42:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16768 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16768 found at Wed Oct 18 17:42:37 UTC 2023 selfserv_9355 with PID 16768 started at Wed Oct 18 17:42:37 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16768 at Wed Oct 18 17:42:38 UTC 2023 kill -USR1 16768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16768 killed at Wed Oct 18 17:42:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16808 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16808 found at Wed Oct 18 17:42:38 UTC 2023 selfserv_9355 with PID 16808 started at Wed Oct 18 17:42:38 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16808 at Wed Oct 18 17:42:40 UTC 2023 kill -USR1 16808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16808 killed at Wed Oct 18 17:42:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 17:42:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 17:42:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16850 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16850 found at Wed Oct 18 17:42:40 UTC 2023 selfserv_9355 with PID 16850 started at Wed Oct 18 17:42:40 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16850 at Wed Oct 18 17:42:41 UTC 2023 kill -USR1 16850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16850 killed at Wed Oct 18 17:42:41 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -fips false -force FIPS mode disabled. ssl.sh: #1581: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1582: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1583: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1584: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1585: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1586: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 17:42:42 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 17:42:42 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 17:42:42 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 17:42:42 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:32:21 2023 Not After : Wed Oct 18 16:32:21 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:84:01:ff:1f:d7:20:73:94:4e:41:ad:d6:15:03:a1: a0:1c:b3:af:0a:3f:d3:27:96:fa:d0:85:af:bf:41:4f: 23:48:97:d5:2e:0b:f1:6e:00:4c:bc:0d:3b:36:96:2c: 1f:a8:81:26:a6:9c:9f:ec:cc:77:b5:34:57:d2:b5:f4: 41:c6:51:ff:de:c9:14:f7:4b:cd:a8:c0:cc:77:84:a2: 85:b3:fc:ed:1f:93:d3:8f:0c:1c:70:64:bd:1e:18:dc: 0a:4e:72:36:6d:d0:d0:a0:b2:1e:b8:26:48:7c:51:ba: 7a:eb:ef:7e:1c:1c:e7:3d:4a:3b:b3:bc:a0:7b:9a:0f: a1:5e:79:55:33:7e:b5:d9:69:8d:c8:50:3f:c2:23:1e: 28:e8:31:69:e2:8b:92:0a:fd:e4:dc:3b:83:7a:b9:80: e9:cd:fa:01:95:2c:96:75:33:cb:3c:b0:b1:e2:9d:24: f4:cc:df:dd:90:d0:7f:23:b5:5f:22:ee:ff:0d:e8:06: 54:74:ef:bd:04:ac:80:52:eb:bc:75:02:fd:de:d7:a0: 75:cc:79:3a:50:f3:c5:b5:2c:5f:3f:87:ec:ec:7d:27: 1f:3e:eb:ce:c4:7e:d6:98:2a:ce:5c:c1:f4:34:c1:85: 32:84:2f:35:a1:0b:1e:aa:52:09:f1:8e:64:60:35:e3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:eb:cc:e7:e4:71:8d:ff:ec:50:78:a8:c5:1f:d6:07: 44:c1:17:f5:84:8c:ea:0a:ae:4a:ef:33:27:e5:b1:f9: 56:c8:c8:6d:32:3a:ab:ba:bf:32:e1:e7:63:dc:69:01: 8c:51:a2:e7:ea:e7:87:3e:ef:df:cb:84:60:a4:cf:39: 04:06:1d:57:f6:57:7b:9d:a3:df:25:8d:30:a8:8c:4a: 60:c2:f6:64:41:7c:b8:a4:00:bf:8c:5f:52:72:0c:d6: b5:42:62:89:ce:58:34:26:34:e3:7a:f1:05:c3:29:03: 1b:c2:a8:cd:f9:a5:3b:d1:57:77:40:85:98:ba:16:6c: f9:aa:4c:ac:a1:cc:84:d5:a7:22:cb:04:80:54:d8:9f: 2f:59:9d:9c:fa:75:8c:46:e7:a4:24:4e:f6:01:63:4b: 66:48:64:d7:a0:34:f6:79:6a:61:70:8b:5c:c0:c0:b4: d2:b5:08:3c:09:7d:1b:1a:a0:44:7e:df:a0:37:5e:bd: f8:87:83:ef:c5:c1:f8:f6:6e:3e:3d:1b:d0:69:f8:e1: 26:d6:b3:50:ea:03:0e:52:12:7d:7a:dd:8e:1d:e6:e6: 64:6f:4a:de:63:ce:c8:b6:e6:eb:11:6a:5a:9c:bc:23: f9:df:90:e4:23:7b:25:3f:d0:1a:56:35:33:f9:70:a5 Fingerprint (SHA-256): D0:EB:26:A1:2A:58:6E:1C:B1:BE:0E:F5:22:C0:18:25:95:C1:45:97:A9:1F:4A:84:C9:77:22:49:41:2F:A1:B6 Fingerprint (SHA1): EB:7E:48:E2:2C:DE:FA:F5:5A:7E:A8:50:53:0B:C2:AA:0A:31:EB:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 16:32:29 2023 Not After : Wed Oct 18 16:32:29 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:44:04:18:78:07:95:1d:c8:65:73:f4:11:24:a6:ae: 01:36:f4:d1:93:0c:2a:97:c0:30:bf:dc:03:23:47:83: 33:52:2c:73:25:0a:39:dd:d5:3c:08:da:2a:84:ec:ab: ed:6b:ca:c4:eb:c3:34:a8:f2:c1:fc:a0:25:4c:34:9d: 74:b9:24:33:1b:8a:ce:fc:ff:ac:9d:e2:24:56:00:03: 5a:b8:ac:ca:c5:16:e0:4b:08:25:6c:5e:2d:76:f2:89: f4:ef:83:12:3c:19:43:3c:0f:dc:5f:d0:0c:e5:97:3e: 6a:3a:10:1c:51:3e:6c:2d:99:ba:1a:f6:5a:36:ec:68: fa:c6:4f:9a:bf:f4:17:91:4a:82:d3:7d:9d:17:ad:fa: ea:77:7c:e8:b2:d0:3f:a6:fc:2f:15:21:ca:23:1c:3b: 66:fd:14:13:e1:18:b5:39:f0:c9:6f:8e:3a:d2:91:36: cf:19:b3:88:c3:7c:e8:93:fa:52:5a:39:91:26:aa:4c: cc:c1:10:a5:81:ea:5c:ad:86:27:c7:02:2a:38:25:4e: 76:20:37:ae:5b:65:96:05:7a:5d:15:9d:aa:a8:66:62: ea:20:62:3b:97:2d:79:17:a4:48:b6:ff:45:dc:89:f9: 17:f2:1f:a0:16:98:c7:c7:57:3a:00:df:60:1e:c1:f9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:c6:7a:96:75:e8:6a:8f:33:74:52:bf:94:27:98:0a: 1b:30:41:d7:c8:c3:d1:90:16:e5:87:e8:45:dc:76:2b: d6:05:d1:07:a1:c0:93:5d:03:9b:0f:e0:2c:65:c9:c2: 2a:f7:41:f9:09:9e:8f:f1:2e:89:36:60:23:d9:75:1a: fb:ec:a8:af:88:00:39:c4:4c:7f:b8:8d:b1:c3:0c:40: af:18:b2:75:d7:8c:62:f5:f9:04:7d:15:f5:82:f3:87: 70:22:2a:8a:b3:9d:1a:98:83:1d:07:dc:7f:55:21:db: fe:17:c0:fd:73:91:4e:c2:c8:04:f4:56:6f:7b:51:ad: 8a:e6:b6:92:7f:c4:94:c5:39:0a:c4:73:c9:92:e7:17: 87:fd:e9:3f:99:19:47:a0:c9:31:c0:be:2c:b1:5d:6b: a6:ab:a4:25:cb:1c:7c:09:89:dc:ba:a4:d6:59:62:9f: 25:50:17:b2:aa:6a:ff:8f:f6:b3:ab:5f:2d:4b:b2:94: 5e:8b:6a:88:76:b7:cf:c6:6f:f1:a6:30:f6:05:30:3a: fb:4b:82:fe:ed:4c:24:a9:3b:7a:62:4c:b4:76:3d:65: 09:50:11:b2:eb:b0:eb:74:fe:5e:cf:e9:4b:87:36:9e: 6c:af:a4:9c:8a:bf:14:9c:44:f4:04:79:d2:13:33:10 Fingerprint (SHA-256): E8:D8:14:63:72:E1:11:7B:D1:D4:51:31:16:D8:3C:8B:6F:5D:A8:D1:87:D0:5E:6E:12:5C:25:DD:37:CE:0F:89 Fingerprint (SHA1): 47:38:19:C8:43:F1:38:5D:48:67:C4:0A:12:45:FB:6F:FD:12:A4:DF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-1-clientCA-ec ,, clientCA-ec T,C,C clientCA-dsa T,C,C chain-1-clientCA-dsa ,, chain-1-clientCA ,, chain-2-clientCA-ec ,, clientCA T,C,C chain-2-clientCA-dsa ,, chain-2-clientCA ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.27434 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.27434 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 16:33:35 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 16:27:26 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 16:33:29 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Oct 18 17:43:03 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Wed Oct 18 17:43:03 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed Oct 18 17:43:03 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 17:43:03 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174304 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9365/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9366 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018174351Z nextupdate=20241018174351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 17:43:51 2023 Next Update: Fri Oct 18 17:43:51 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018174352Z addcert 2 20231018174352Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 17:43:52 2023 Next Update: Fri Oct 18 17:43:51 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:52 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018174352Z nextupdate=20241018174352Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 17:43:52 2023 Next Update: Fri Oct 18 17:43:52 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018174353Z addcert 2 20231018174353Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 17:43:53 2023 Next Update: Fri Oct 18 17:43:52 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:53 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018174354Z addcert 4 20231018174354Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 17:43:54 2023 Next Update: Fri Oct 18 17:43:52 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:53 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 17:43:54 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018174354Z nextupdate=20241018174354Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 17:43:54 2023 Next Update: Fri Oct 18 17:43:54 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018174355Z addcert 2 20231018174355Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 17:43:55 2023 Next Update: Fri Oct 18 17:43:54 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:55 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018174356Z addcert 3 20231018174356Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 17:43:56 2023 Next Update: Fri Oct 18 17:43:54 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:55 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 17:43:56 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018174357Z nextupdate=20241018174357Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 17:43:57 2023 Next Update: Fri Oct 18 17:43:57 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018174358Z addcert 2 20231018174358Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 17:43:58 2023 Next Update: Fri Oct 18 17:43:57 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:58 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018174359Z addcert 3 20231018174359Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 17:43:59 2023 Next Update: Fri Oct 18 17:43:57 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 17:43:58 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 17:43:59 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174305 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174306 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018174307 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018174308 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018174309 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018174310 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018174311 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018174312 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018174313 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018174314 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018174315 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018174316 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018174317 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018174318 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018174319 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018174320 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 17:45:06 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 17:45:06 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 19238 >/dev/null 2>/dev/null httpserv with PID 19238 found at Wed Oct 18 17:45:06 UTC 2023 httpserv with PID 19238 started at Wed Oct 18 17:45:06 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174305 (0x3cb01b61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:44:19 2023 Not After : Wed Oct 18 17:44:19 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:ea:e8:2d:d0:12:6d:34:35:04:06:2f:b2:9e:6b:49: 51:8d:fb:fe:9c:f7:2f:5e:e1:06:95:2c:1f:7f:33:ca: 59:65:b7:fa:cd:f1:ca:72:79:3f:a5:22:c4:0a:fc:31: d7:1d:51:04:1f:a8:02:d8:1d:7d:94:ed:b5:ea:e2:f6: c0:11:37:44:c7:a4:8a:b7:52:bf:a7:d9:72:e8:a2:c7: 86:be:dd:3f:6e:58:17:4d:9e:bc:19:db:7d:f3:85:62: 01:5f:cc:7a:2f:5f:51:97:0c:be:79:c8:00:52:6c:40: 53:28:ef:bb:35:70:fa:ca:10:a8:9c:c6:af:a7:5e:3b: e5:b6:95:ae:5a:7c:4c:06:95:98:35:cd:09:fb:14:0f: 93:3c:e3:2c:e8:08:b2:19:3c:8a:a9:26:5e:79:c8:ad: 9f:7b:05:01:2c:73:09:11:cf:a4:8b:1b:28:4a:75:fd: 2d:60:f6:ce:10:dd:85:48:9a:bc:5c:1f:dc:5f:8d:fa: a9:91:79:18:f7:9a:00:5e:6d:6d:65:1c:7c:f5:66:11: 6e:3c:8a:1d:43:42:3f:7d:50:ac:55:29:ae:c4:f1:00: c0:c1:32:36:8d:a4:c9:ec:b7:75:a9:2f:9e:48:d1:29: 15:77:4c:1e:ce:c1:88:9c:e3:d7:f9:dc:d1:b7:d0:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:ca:9c:57:fe:c6:ab:a8:a7:7e:b6:f6:2a:a9:9d:25: f8:2e:f0:2a:f9:1c:52:8e:75:38:78:6c:1d:67:b0:7c: 1a:cd:a2:53:79:64:a2:60:f8:76:c1:75:6c:9b:3f:d1: c8:fa:b9:54:e1:cb:9f:ec:d6:f2:00:4e:09:37:1c:15: 26:d0:19:a8:c8:13:38:b8:94:dd:ef:e5:a9:c9:08:91: 2e:76:44:d7:86:cf:df:aa:f3:c7:59:57:3c:f2:c6:24: 37:ce:8a:75:db:d9:1f:de:4a:0b:5a:91:2d:74:ec:9d: 5a:0f:4e:c1:29:e8:ab:6b:2f:57:97:97:62:24:94:46: 59:f7:01:64:9c:11:75:45:70:4e:b3:ef:6b:61:dd:28: f3:70:b9:b0:45:fd:50:bb:5b:2d:5e:df:c7:3c:e8:f9: 1a:be:93:24:1c:fe:68:5f:a5:2c:94:a2:07:ee:88:c7: 9e:c5:fa:18:60:64:ce:80:87:a3:a4:fa:1c:b3:1e:49: 52:1e:94:6c:bc:c6:4c:e5:6b:fd:cd:f9:72:0b:cc:df: 54:ab:14:8c:8e:10:28:99:dc:56:bd:1c:27:d6:25:0c: b2:63:cc:8d:5f:14:89:f5:bb:94:d3:e0:32:84:0c:4d: b3:6d:aa:85:f5:c4:e0:59:4b:23:46:f9:ea:27:78:ef Fingerprint (SHA-256): 80:05:13:3A:A3:3E:FE:4E:73:1D:C5:3F:D4:7D:ED:C1:A6:F3:5B:E8:E1:D8:7D:75:86:8C:15:1B:F1:D7:40:BF Fingerprint (SHA1): A9:36:1D:DC:E4:CC:E8:67:11:37:FB:2E:65:F8:87:6E:E0:39:61:74 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174304 (0x3cb01b60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 17:43:04 2023 Not After : Wed Oct 18 17:43:04 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ab:92:48:ee:8c:e6:7e:eb:c3:54:f8:ed:a1:c5:ec: 79:e8:33:a5:cc:ee:af:88:c8:9b:f2:48:89:a1:fa:26: c9:11:f1:f4:33:fd:4f:63:af:7f:c3:68:8c:7f:df:b0: a7:72:fe:35:6a:c0:d7:33:4f:1a:76:ba:f4:ef:47:3a: 7a:ca:10:d7:c4:36:b6:b9:87:fc:28:3d:36:f6:32:19: 96:c3:4b:00:3c:6e:38:58:12:de:76:d8:33:27:c7:fb: eb:35:7b:64:0e:39:6a:aa:a7:7d:e4:b8:0d:fe:cd:e8: 35:5b:ab:0f:1f:81:93:7d:ba:ce:20:22:df:af:bb:e1: 81:ba:41:db:c0:01:9f:4e:c1:de:c1:0f:98:a2:9f:41: 44:a9:3c:32:a4:65:30:61:09:67:82:3b:3c:4a:12:23: 85:5f:87:79:18:b2:68:48:c7:ac:35:87:1d:84:df:6e: ed:a5:c3:55:9c:64:df:b4:bf:c3:c9:f8:c9:8d:4e:e1: 25:76:01:e4:6a:88:27:9c:08:84:3b:3e:6e:a7:2b:a0: 48:ff:d1:5f:8d:64:a4:54:1c:cf:ad:eb:ff:15:3e:ba: 33:3e:5b:84:d3:08:84:88:0a:2e:93:2e:9c:cb:fc:74: e9:d4:b5:a4:66:1e:cd:92:78:06:14:60:36:74:8b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:6d:ad:c8:a3:04:67:c3:21:4b:b9:95:17:3b:a7:c9: 78:13:b0:9c:af:33:1e:86:0d:91:4d:ed:f5:81:fa:e9: 40:d8:1c:65:7f:79:2e:e2:0d:3d:c8:9c:3a:9e:e5:61: 1e:be:63:a5:bd:d8:18:9a:d1:32:44:7d:97:47:b4:43: 47:e7:bd:05:5c:b6:b2:54:74:24:e9:45:9e:06:82:8c: b5:90:37:cf:7f:25:26:87:55:60:59:e8:11:3e:4b:6b: 25:82:f6:ba:1b:3e:77:a2:1d:41:75:44:fa:88:80:8c: 97:27:4b:60:dc:c8:4e:e5:4c:ff:91:0f:c8:a7:75:c3: f6:5d:6e:80:a7:c1:92:da:bf:df:82:49:5d:ab:fd:14: da:4e:3f:92:1c:cb:1c:06:b9:5e:87:a1:cc:9d:0b:0b: 87:df:b4:9f:d0:aa:44:dc:11:89:b1:96:8c:f5:f3:52: 51:1e:b0:71:ec:98:d3:f1:5f:ca:b1:82:6b:2e:1d:37: 28:96:b0:8b:21:e7:5a:11:dd:e4:97:d6:ac:00:f8:86: 88:47:e2:1e:1c:79:3c:fc:f7:ba:a2:3f:cd:6a:73:e0: 9a:a0:f9:a2:6d:cc:ef:05:22:ce:30:22:ab:a8:0b:96: a1:92:94:99:ea:7c:3e:bc:93:54:1f:4a:81:84:47:1d Fingerprint (SHA-256): 8C:BD:D9:E5:7F:E9:74:5D:BF:81:D3:14:4E:42:45:5A:A8:E0:48:D0:D1:9F:C5:54:9B:86:9F:49:64:2B:B7:27 Fingerprint (SHA1): E7:0C:EC:B1:B1:E9:4B:10:71:B7:C2:78:C7:0C:9A:01:ED:EB:3E:FB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19238 at Wed Oct 18 17:45:09 UTC 2023 kill -USR1 19238 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 19238 killed at Wed Oct 18 17:45:09 UTC 2023 httpserv starting at Wed Oct 18 17:45:09 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 17:45:09 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 19444 >/dev/null 2>/dev/null httpserv with PID 19444 found at Wed Oct 18 17:45:09 UTC 2023 httpserv with PID 19444 started at Wed Oct 18 17:45:09 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9365 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174304 (0x3cb01b60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 17:43:04 2023 Not After : Wed Oct 18 17:43:04 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:ab:92:48:ee:8c:e6:7e:eb:c3:54:f8:ed:a1:c5:ec: 79:e8:33:a5:cc:ee:af:88:c8:9b:f2:48:89:a1:fa:26: c9:11:f1:f4:33:fd:4f:63:af:7f:c3:68:8c:7f:df:b0: a7:72:fe:35:6a:c0:d7:33:4f:1a:76:ba:f4:ef:47:3a: 7a:ca:10:d7:c4:36:b6:b9:87:fc:28:3d:36:f6:32:19: 96:c3:4b:00:3c:6e:38:58:12:de:76:d8:33:27:c7:fb: eb:35:7b:64:0e:39:6a:aa:a7:7d:e4:b8:0d:fe:cd:e8: 35:5b:ab:0f:1f:81:93:7d:ba:ce:20:22:df:af:bb:e1: 81:ba:41:db:c0:01:9f:4e:c1:de:c1:0f:98:a2:9f:41: 44:a9:3c:32:a4:65:30:61:09:67:82:3b:3c:4a:12:23: 85:5f:87:79:18:b2:68:48:c7:ac:35:87:1d:84:df:6e: ed:a5:c3:55:9c:64:df:b4:bf:c3:c9:f8:c9:8d:4e:e1: 25:76:01:e4:6a:88:27:9c:08:84:3b:3e:6e:a7:2b:a0: 48:ff:d1:5f:8d:64:a4:54:1c:cf:ad:eb:ff:15:3e:ba: 33:3e:5b:84:d3:08:84:88:0a:2e:93:2e:9c:cb:fc:74: e9:d4:b5:a4:66:1e:cd:92:78:06:14:60:36:74:8b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:6d:ad:c8:a3:04:67:c3:21:4b:b9:95:17:3b:a7:c9: 78:13:b0:9c:af:33:1e:86:0d:91:4d:ed:f5:81:fa:e9: 40:d8:1c:65:7f:79:2e:e2:0d:3d:c8:9c:3a:9e:e5:61: 1e:be:63:a5:bd:d8:18:9a:d1:32:44:7d:97:47:b4:43: 47:e7:bd:05:5c:b6:b2:54:74:24:e9:45:9e:06:82:8c: b5:90:37:cf:7f:25:26:87:55:60:59:e8:11:3e:4b:6b: 25:82:f6:ba:1b:3e:77:a2:1d:41:75:44:fa:88:80:8c: 97:27:4b:60:dc:c8:4e:e5:4c:ff:91:0f:c8:a7:75:c3: f6:5d:6e:80:a7:c1:92:da:bf:df:82:49:5d:ab:fd:14: da:4e:3f:92:1c:cb:1c:06:b9:5e:87:a1:cc:9d:0b:0b: 87:df:b4:9f:d0:aa:44:dc:11:89:b1:96:8c:f5:f3:52: 51:1e:b0:71:ec:98:d3:f1:5f:ca:b1:82:6b:2e:1d:37: 28:96:b0:8b:21:e7:5a:11:dd:e4:97:d6:ac:00:f8:86: 88:47:e2:1e:1c:79:3c:fc:f7:ba:a2:3f:cd:6a:73:e0: 9a:a0:f9:a2:6d:cc:ef:05:22:ce:30:22:ab:a8:0b:96: a1:92:94:99:ea:7c:3e:bc:93:54:1f:4a:81:84:47:1d Fingerprint (SHA-256): 8C:BD:D9:E5:7F:E9:74:5D:BF:81:D3:14:4E:42:45:5A:A8:E0:48:D0:D1:9F:C5:54:9B:86:9F:49:64:2B:B7:27 Fingerprint (SHA1): E7:0C:EC:B1:B1:E9:4B:10:71:B7:C2:78:C7:0C:9A:01:ED:EB:3E:FB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 19444 at Wed Oct 18 17:45:12 UTC 2023 kill -USR1 19444 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 19444 killed at Wed Oct 18 17:45:12 UTC 2023 httpserv starting at Wed Oct 18 17:45:12 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 17:45:12 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 19663 >/dev/null 2>/dev/null httpserv with PID 19663 found at Wed Oct 18 17:45:12 UTC 2023 httpserv with PID 19663 started at Wed Oct 18 17:45:12 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174321 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174322 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174323 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174324 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018174325 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174322 (0x3cb01b72) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:45:16 2023 Not After : Wed Oct 18 17:45:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8b:f2:29:a1:fe:8b:d3:82:38:52:a1:21:1d:30:f7: 51:b5:b2:11:6d:e6:af:11:21:24:f1:f7:06:c6:77:e3: 97:5d:70:c7:29:62:7e:80:06:9c:83:63:6f:ce:91:48: 1d:23:1b:76:2f:ef:cf:0b:54:71:54:8e:f3:7e:61:18: e8:9d:db:8e:a3:94:ba:d7:9b:aa:c1:c9:3c:7c:10:74: d3:b6:49:70:35:52:c7:18:84:35:96:82:cc:14:49:51: 39:6e:c8:56:4b:c1:b2:bb:63:b3:67:5f:46:2a:84:5d: a9:bd:30:ac:13:ba:8d:48:2f:e5:5f:79:b6:11:a8:5c: f6:ac:c4:c0:1e:d1:f5:6b:0f:53:e5:c9:fe:b4:fb:53: e8:32:24:9e:06:4c:3e:ff:df:b5:00:55:f0:ff:09:23: 96:a3:90:2e:78:79:73:f5:3d:f8:4d:a2:29:23:a7:81: 61:93:4e:38:7a:ea:88:99:de:54:9e:3a:64:e4:15:28: 5e:7c:51:cb:65:98:32:99:4e:7d:f2:6a:cc:82:bc:cf: 50:6b:80:ba:37:76:91:8d:b5:3d:35:1e:76:cf:03:b2: 2d:a2:c0:3f:81:ae:8a:f2:5a:1e:c4:0d:24:02:93:27: 45:ea:28:83:7d:57:74:47:48:5f:58:76:77:34:3d:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:4a:02:e9:5f:8c:c9:4d:7b:19:e3:34:8d:3d:ab:9f: 1e:83:4c:b5:5d:40:20:25:de:48:81:0b:b8:97:fd:51: ea:cb:25:04:6d:80:40:fc:e7:5d:cc:1f:ce:25:f3:0f: 1d:1c:8d:be:2b:e7:b2:cb:cf:aa:d7:6c:f6:1f:25:45: c3:95:51:b0:10:fc:39:b0:3c:08:48:99:ac:e9:e1:ed: 50:da:c8:85:aa:ee:ec:bb:22:3c:68:b3:4c:10:97:19: 16:9f:de:7d:ed:eb:ab:7b:58:77:b0:7b:74:3f:35:70: b6:7a:f0:45:c7:9d:50:44:36:93:2b:25:cc:fc:39:0c: b7:8e:8d:80:98:0a:b4:1b:a7:02:63:e8:e7:fb:5d:b3: 38:2c:7b:42:4e:38:17:85:04:1b:f0:67:40:fa:97:b1: 40:4a:3e:0a:bf:e0:c7:bd:95:c2:02:7d:5a:03:08:86: 7c:d7:5f:14:35:fc:9a:7b:49:3b:0e:08:9b:5d:ab:2a: fc:15:df:8b:be:4c:81:e7:f5:53:b0:50:77:04:a2:73: c7:61:48:aa:c8:95:3d:33:12:ae:08:7a:1c:57:cc:01: 35:7b:7b:2e:3f:f8:e8:b2:e4:77:35:b9:1a:e5:cb:04: 01:1c:94:01:2c:3d:f7:7b:a0:29:a0:69:72:65:bf:01 Fingerprint (SHA-256): 88:EA:08:BA:09:5C:A5:F3:BD:2E:D1:87:13:4C:4F:6A:4E:86:5E:A2:06:18:88:3E:7C:21:34:D1:42:E3:60:09 Fingerprint (SHA1): EF:9E:34:CC:43:0F:EE:90:81:C9:D6:6F:A1:4F:30:98:FD:E6:D1:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174321 (0x3cb01b71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:45:15 2023 Not After : Wed Oct 18 17:45:15 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:44:c6:be:63:3f:4f:fe:f8:81:ae:5e:85:0a:96:eb: 7f:92:cb:34:f4:74:7d:42:84:df:c9:a4:66:21:62:d0: 09:30:6a:98:9f:9b:45:3f:95:7c:08:db:bc:61:bf:68: 24:73:e5:8f:55:55:48:8e:28:71:e4:44:72:c6:ba:36: dc:a3:49:fe:95:36:86:ac:0f:3f:91:73:4d:ad:7b:75: 56:fb:00:8f:75:58:7f:f2:ed:b5:5d:c4:b1:0c:0b:dc: 9f:84:9b:9f:f9:e6:4c:ac:a5:a9:68:12:ae:12:b3:b4: 1b:21:32:d2:df:00:9b:4b:0b:a4:e9:2b:c2:b2:20:d5: aa:c9:f0:49:5f:96:4d:55:ed:09:08:13:5c:bc:5f:5b: 87:ca:f6:8d:e1:18:87:b4:02:ae:4e:29:64:cc:b8:50: 69:3f:68:1e:b9:d9:64:cd:d4:67:a5:12:50:b6:f7:fd: a6:a0:43:d0:22:4b:3f:f9:39:d3:3b:1d:89:1f:3e:67: e6:56:50:9e:9a:48:c7:a4:04:09:a2:20:62:e1:d9:a4: 75:4e:77:86:ae:1c:e2:95:c0:1f:80:49:b8:da:71:e5: 6c:01:d2:91:0e:96:2d:31:85:7e:bd:90:ac:ca:c7:b3: f0:3a:50:46:64:fb:34:1f:68:d2:79:a7:05:18:26:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:b7:da:75:0c:8b:bd:0b:fb:29:61:e0:4b:f9:f7:d7: b2:98:8d:00:b1:ad:ae:99:25:c4:12:ef:e9:e3:f6:5e: 27:84:43:b9:a4:28:d0:9a:7c:a9:22:57:61:cd:65:66: 68:f1:a0:ed:43:24:a7:68:a0:32:2e:c1:24:df:2a:4f: 61:d9:7c:af:44:0a:92:1e:32:e5:3f:e6:cc:56:9c:5a: 49:c4:f4:1f:a8:13:ce:0e:67:82:31:b0:45:39:74:ec: 44:f2:ea:0d:25:06:92:22:a2:e6:55:bb:bf:bf:fd:0d: c4:a1:ec:c9:f2:c4:93:fa:cc:ee:3a:2b:78:5c:60:ec: aa:32:db:82:fc:58:c8:3b:cc:9c:27:84:46:da:1c:de: 68:32:c3:ac:1b:cc:9f:db:1e:19:da:d1:c0:83:92:f2: ff:73:a8:1d:98:56:2f:15:2c:07:4b:77:35:95:4a:bb: 76:54:dc:44:08:da:e3:2a:b4:c4:0a:28:76:19:ea:8b: 27:51:72:7f:c5:13:a7:cc:df:7f:91:24:17:c7:eb:36: 7e:93:4b:b7:70:3b:4f:d1:f4:79:5e:96:47:02:21:2d: 42:1d:36:8d:ea:86:0e:ca:c8:c5:57:de:8f:d7:2f:1d: 88:f0:35:59:f3:24:3c:4a:3e:3b:1b:32:ff:66:69:dc Fingerprint (SHA-256): 88:D3:98:28:3A:61:2B:48:53:1A:7C:A3:F0:F0:B9:83:56:C5:AE:31:16:27:DC:57:33:E0:9D:AF:CF:68:49:64 Fingerprint (SHA1): 10:78:66:1F:CC:C0:C4:12:FA:E4:0B:AA:C8:49:F3:91:AF:09:03:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174321 (0x3cb01b71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:45:15 2023 Not After : Wed Oct 18 17:45:15 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:44:c6:be:63:3f:4f:fe:f8:81:ae:5e:85:0a:96:eb: 7f:92:cb:34:f4:74:7d:42:84:df:c9:a4:66:21:62:d0: 09:30:6a:98:9f:9b:45:3f:95:7c:08:db:bc:61:bf:68: 24:73:e5:8f:55:55:48:8e:28:71:e4:44:72:c6:ba:36: dc:a3:49:fe:95:36:86:ac:0f:3f:91:73:4d:ad:7b:75: 56:fb:00:8f:75:58:7f:f2:ed:b5:5d:c4:b1:0c:0b:dc: 9f:84:9b:9f:f9:e6:4c:ac:a5:a9:68:12:ae:12:b3:b4: 1b:21:32:d2:df:00:9b:4b:0b:a4:e9:2b:c2:b2:20:d5: aa:c9:f0:49:5f:96:4d:55:ed:09:08:13:5c:bc:5f:5b: 87:ca:f6:8d:e1:18:87:b4:02:ae:4e:29:64:cc:b8:50: 69:3f:68:1e:b9:d9:64:cd:d4:67:a5:12:50:b6:f7:fd: a6:a0:43:d0:22:4b:3f:f9:39:d3:3b:1d:89:1f:3e:67: e6:56:50:9e:9a:48:c7:a4:04:09:a2:20:62:e1:d9:a4: 75:4e:77:86:ae:1c:e2:95:c0:1f:80:49:b8:da:71:e5: 6c:01:d2:91:0e:96:2d:31:85:7e:bd:90:ac:ca:c7:b3: f0:3a:50:46:64:fb:34:1f:68:d2:79:a7:05:18:26:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:b7:da:75:0c:8b:bd:0b:fb:29:61:e0:4b:f9:f7:d7: b2:98:8d:00:b1:ad:ae:99:25:c4:12:ef:e9:e3:f6:5e: 27:84:43:b9:a4:28:d0:9a:7c:a9:22:57:61:cd:65:66: 68:f1:a0:ed:43:24:a7:68:a0:32:2e:c1:24:df:2a:4f: 61:d9:7c:af:44:0a:92:1e:32:e5:3f:e6:cc:56:9c:5a: 49:c4:f4:1f:a8:13:ce:0e:67:82:31:b0:45:39:74:ec: 44:f2:ea:0d:25:06:92:22:a2:e6:55:bb:bf:bf:fd:0d: c4:a1:ec:c9:f2:c4:93:fa:cc:ee:3a:2b:78:5c:60:ec: aa:32:db:82:fc:58:c8:3b:cc:9c:27:84:46:da:1c:de: 68:32:c3:ac:1b:cc:9f:db:1e:19:da:d1:c0:83:92:f2: ff:73:a8:1d:98:56:2f:15:2c:07:4b:77:35:95:4a:bb: 76:54:dc:44:08:da:e3:2a:b4:c4:0a:28:76:19:ea:8b: 27:51:72:7f:c5:13:a7:cc:df:7f:91:24:17:c7:eb:36: 7e:93:4b:b7:70:3b:4f:d1:f4:79:5e:96:47:02:21:2d: 42:1d:36:8d:ea:86:0e:ca:c8:c5:57:de:8f:d7:2f:1d: 88:f0:35:59:f3:24:3c:4a:3e:3b:1b:32:ff:66:69:dc Fingerprint (SHA-256): 88:D3:98:28:3A:61:2B:48:53:1A:7C:A3:F0:F0:B9:83:56:C5:AE:31:16:27:DC:57:33:E0:9D:AF:CF:68:49:64 Fingerprint (SHA1): 10:78:66:1F:CC:C0:C4:12:FA:E4:0B:AA:C8:49:F3:91:AF:09:03:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174322 (0x3cb01b72) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:45:16 2023 Not After : Wed Oct 18 17:45:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8b:f2:29:a1:fe:8b:d3:82:38:52:a1:21:1d:30:f7: 51:b5:b2:11:6d:e6:af:11:21:24:f1:f7:06:c6:77:e3: 97:5d:70:c7:29:62:7e:80:06:9c:83:63:6f:ce:91:48: 1d:23:1b:76:2f:ef:cf:0b:54:71:54:8e:f3:7e:61:18: e8:9d:db:8e:a3:94:ba:d7:9b:aa:c1:c9:3c:7c:10:74: d3:b6:49:70:35:52:c7:18:84:35:96:82:cc:14:49:51: 39:6e:c8:56:4b:c1:b2:bb:63:b3:67:5f:46:2a:84:5d: a9:bd:30:ac:13:ba:8d:48:2f:e5:5f:79:b6:11:a8:5c: f6:ac:c4:c0:1e:d1:f5:6b:0f:53:e5:c9:fe:b4:fb:53: e8:32:24:9e:06:4c:3e:ff:df:b5:00:55:f0:ff:09:23: 96:a3:90:2e:78:79:73:f5:3d:f8:4d:a2:29:23:a7:81: 61:93:4e:38:7a:ea:88:99:de:54:9e:3a:64:e4:15:28: 5e:7c:51:cb:65:98:32:99:4e:7d:f2:6a:cc:82:bc:cf: 50:6b:80:ba:37:76:91:8d:b5:3d:35:1e:76:cf:03:b2: 2d:a2:c0:3f:81:ae:8a:f2:5a:1e:c4:0d:24:02:93:27: 45:ea:28:83:7d:57:74:47:48:5f:58:76:77:34:3d:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:4a:02:e9:5f:8c:c9:4d:7b:19:e3:34:8d:3d:ab:9f: 1e:83:4c:b5:5d:40:20:25:de:48:81:0b:b8:97:fd:51: ea:cb:25:04:6d:80:40:fc:e7:5d:cc:1f:ce:25:f3:0f: 1d:1c:8d:be:2b:e7:b2:cb:cf:aa:d7:6c:f6:1f:25:45: c3:95:51:b0:10:fc:39:b0:3c:08:48:99:ac:e9:e1:ed: 50:da:c8:85:aa:ee:ec:bb:22:3c:68:b3:4c:10:97:19: 16:9f:de:7d:ed:eb:ab:7b:58:77:b0:7b:74:3f:35:70: b6:7a:f0:45:c7:9d:50:44:36:93:2b:25:cc:fc:39:0c: b7:8e:8d:80:98:0a:b4:1b:a7:02:63:e8:e7:fb:5d:b3: 38:2c:7b:42:4e:38:17:85:04:1b:f0:67:40:fa:97:b1: 40:4a:3e:0a:bf:e0:c7:bd:95:c2:02:7d:5a:03:08:86: 7c:d7:5f:14:35:fc:9a:7b:49:3b:0e:08:9b:5d:ab:2a: fc:15:df:8b:be:4c:81:e7:f5:53:b0:50:77:04:a2:73: c7:61:48:aa:c8:95:3d:33:12:ae:08:7a:1c:57:cc:01: 35:7b:7b:2e:3f:f8:e8:b2:e4:77:35:b9:1a:e5:cb:04: 01:1c:94:01:2c:3d:f7:7b:a0:29:a0:69:72:65:bf:01 Fingerprint (SHA-256): 88:EA:08:BA:09:5C:A5:F3:BD:2E:D1:87:13:4C:4F:6A:4E:86:5E:A2:06:18:88:3E:7C:21:34:D1:42:E3:60:09 Fingerprint (SHA1): EF:9E:34:CC:43:0F:EE:90:81:C9:D6:6F:A1:4F:30:98:FD:E6:D1:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174322 (0x3cb01b72) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:45:16 2023 Not After : Wed Oct 18 17:45:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8b:f2:29:a1:fe:8b:d3:82:38:52:a1:21:1d:30:f7: 51:b5:b2:11:6d:e6:af:11:21:24:f1:f7:06:c6:77:e3: 97:5d:70:c7:29:62:7e:80:06:9c:83:63:6f:ce:91:48: 1d:23:1b:76:2f:ef:cf:0b:54:71:54:8e:f3:7e:61:18: e8:9d:db:8e:a3:94:ba:d7:9b:aa:c1:c9:3c:7c:10:74: d3:b6:49:70:35:52:c7:18:84:35:96:82:cc:14:49:51: 39:6e:c8:56:4b:c1:b2:bb:63:b3:67:5f:46:2a:84:5d: a9:bd:30:ac:13:ba:8d:48:2f:e5:5f:79:b6:11:a8:5c: f6:ac:c4:c0:1e:d1:f5:6b:0f:53:e5:c9:fe:b4:fb:53: e8:32:24:9e:06:4c:3e:ff:df:b5:00:55:f0:ff:09:23: 96:a3:90:2e:78:79:73:f5:3d:f8:4d:a2:29:23:a7:81: 61:93:4e:38:7a:ea:88:99:de:54:9e:3a:64:e4:15:28: 5e:7c:51:cb:65:98:32:99:4e:7d:f2:6a:cc:82:bc:cf: 50:6b:80:ba:37:76:91:8d:b5:3d:35:1e:76:cf:03:b2: 2d:a2:c0:3f:81:ae:8a:f2:5a:1e:c4:0d:24:02:93:27: 45:ea:28:83:7d:57:74:47:48:5f:58:76:77:34:3d:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:4a:02:e9:5f:8c:c9:4d:7b:19:e3:34:8d:3d:ab:9f: 1e:83:4c:b5:5d:40:20:25:de:48:81:0b:b8:97:fd:51: ea:cb:25:04:6d:80:40:fc:e7:5d:cc:1f:ce:25:f3:0f: 1d:1c:8d:be:2b:e7:b2:cb:cf:aa:d7:6c:f6:1f:25:45: c3:95:51:b0:10:fc:39:b0:3c:08:48:99:ac:e9:e1:ed: 50:da:c8:85:aa:ee:ec:bb:22:3c:68:b3:4c:10:97:19: 16:9f:de:7d:ed:eb:ab:7b:58:77:b0:7b:74:3f:35:70: b6:7a:f0:45:c7:9d:50:44:36:93:2b:25:cc:fc:39:0c: b7:8e:8d:80:98:0a:b4:1b:a7:02:63:e8:e7:fb:5d:b3: 38:2c:7b:42:4e:38:17:85:04:1b:f0:67:40:fa:97:b1: 40:4a:3e:0a:bf:e0:c7:bd:95:c2:02:7d:5a:03:08:86: 7c:d7:5f:14:35:fc:9a:7b:49:3b:0e:08:9b:5d:ab:2a: fc:15:df:8b:be:4c:81:e7:f5:53:b0:50:77:04:a2:73: c7:61:48:aa:c8:95:3d:33:12:ae:08:7a:1c:57:cc:01: 35:7b:7b:2e:3f:f8:e8:b2:e4:77:35:b9:1a:e5:cb:04: 01:1c:94:01:2c:3d:f7:7b:a0:29:a0:69:72:65:bf:01 Fingerprint (SHA-256): 88:EA:08:BA:09:5C:A5:F3:BD:2E:D1:87:13:4C:4F:6A:4E:86:5E:A2:06:18:88:3E:7C:21:34:D1:42:E3:60:09 Fingerprint (SHA1): EF:9E:34:CC:43:0F:EE:90:81:C9:D6:6F:A1:4F:30:98:FD:E6:D1:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174322 (0x3cb01b72) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:45:16 2023 Not After : Wed Oct 18 17:45:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8b:f2:29:a1:fe:8b:d3:82:38:52:a1:21:1d:30:f7: 51:b5:b2:11:6d:e6:af:11:21:24:f1:f7:06:c6:77:e3: 97:5d:70:c7:29:62:7e:80:06:9c:83:63:6f:ce:91:48: 1d:23:1b:76:2f:ef:cf:0b:54:71:54:8e:f3:7e:61:18: e8:9d:db:8e:a3:94:ba:d7:9b:aa:c1:c9:3c:7c:10:74: d3:b6:49:70:35:52:c7:18:84:35:96:82:cc:14:49:51: 39:6e:c8:56:4b:c1:b2:bb:63:b3:67:5f:46:2a:84:5d: a9:bd:30:ac:13:ba:8d:48:2f:e5:5f:79:b6:11:a8:5c: f6:ac:c4:c0:1e:d1:f5:6b:0f:53:e5:c9:fe:b4:fb:53: e8:32:24:9e:06:4c:3e:ff:df:b5:00:55:f0:ff:09:23: 96:a3:90:2e:78:79:73:f5:3d:f8:4d:a2:29:23:a7:81: 61:93:4e:38:7a:ea:88:99:de:54:9e:3a:64:e4:15:28: 5e:7c:51:cb:65:98:32:99:4e:7d:f2:6a:cc:82:bc:cf: 50:6b:80:ba:37:76:91:8d:b5:3d:35:1e:76:cf:03:b2: 2d:a2:c0:3f:81:ae:8a:f2:5a:1e:c4:0d:24:02:93:27: 45:ea:28:83:7d:57:74:47:48:5f:58:76:77:34:3d:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:4a:02:e9:5f:8c:c9:4d:7b:19:e3:34:8d:3d:ab:9f: 1e:83:4c:b5:5d:40:20:25:de:48:81:0b:b8:97:fd:51: ea:cb:25:04:6d:80:40:fc:e7:5d:cc:1f:ce:25:f3:0f: 1d:1c:8d:be:2b:e7:b2:cb:cf:aa:d7:6c:f6:1f:25:45: c3:95:51:b0:10:fc:39:b0:3c:08:48:99:ac:e9:e1:ed: 50:da:c8:85:aa:ee:ec:bb:22:3c:68:b3:4c:10:97:19: 16:9f:de:7d:ed:eb:ab:7b:58:77:b0:7b:74:3f:35:70: b6:7a:f0:45:c7:9d:50:44:36:93:2b:25:cc:fc:39:0c: b7:8e:8d:80:98:0a:b4:1b:a7:02:63:e8:e7:fb:5d:b3: 38:2c:7b:42:4e:38:17:85:04:1b:f0:67:40:fa:97:b1: 40:4a:3e:0a:bf:e0:c7:bd:95:c2:02:7d:5a:03:08:86: 7c:d7:5f:14:35:fc:9a:7b:49:3b:0e:08:9b:5d:ab:2a: fc:15:df:8b:be:4c:81:e7:f5:53:b0:50:77:04:a2:73: c7:61:48:aa:c8:95:3d:33:12:ae:08:7a:1c:57:cc:01: 35:7b:7b:2e:3f:f8:e8:b2:e4:77:35:b9:1a:e5:cb:04: 01:1c:94:01:2c:3d:f7:7b:a0:29:a0:69:72:65:bf:01 Fingerprint (SHA-256): 88:EA:08:BA:09:5C:A5:F3:BD:2E:D1:87:13:4C:4F:6A:4E:86:5E:A2:06:18:88:3E:7C:21:34:D1:42:E3:60:09 Fingerprint (SHA1): EF:9E:34:CC:43:0F:EE:90:81:C9:D6:6F:A1:4F:30:98:FD:E6:D1:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174321 (0x3cb01b71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:45:15 2023 Not After : Wed Oct 18 17:45:15 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:44:c6:be:63:3f:4f:fe:f8:81:ae:5e:85:0a:96:eb: 7f:92:cb:34:f4:74:7d:42:84:df:c9:a4:66:21:62:d0: 09:30:6a:98:9f:9b:45:3f:95:7c:08:db:bc:61:bf:68: 24:73:e5:8f:55:55:48:8e:28:71:e4:44:72:c6:ba:36: dc:a3:49:fe:95:36:86:ac:0f:3f:91:73:4d:ad:7b:75: 56:fb:00:8f:75:58:7f:f2:ed:b5:5d:c4:b1:0c:0b:dc: 9f:84:9b:9f:f9:e6:4c:ac:a5:a9:68:12:ae:12:b3:b4: 1b:21:32:d2:df:00:9b:4b:0b:a4:e9:2b:c2:b2:20:d5: aa:c9:f0:49:5f:96:4d:55:ed:09:08:13:5c:bc:5f:5b: 87:ca:f6:8d:e1:18:87:b4:02:ae:4e:29:64:cc:b8:50: 69:3f:68:1e:b9:d9:64:cd:d4:67:a5:12:50:b6:f7:fd: a6:a0:43:d0:22:4b:3f:f9:39:d3:3b:1d:89:1f:3e:67: e6:56:50:9e:9a:48:c7:a4:04:09:a2:20:62:e1:d9:a4: 75:4e:77:86:ae:1c:e2:95:c0:1f:80:49:b8:da:71:e5: 6c:01:d2:91:0e:96:2d:31:85:7e:bd:90:ac:ca:c7:b3: f0:3a:50:46:64:fb:34:1f:68:d2:79:a7:05:18:26:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:b7:da:75:0c:8b:bd:0b:fb:29:61:e0:4b:f9:f7:d7: b2:98:8d:00:b1:ad:ae:99:25:c4:12:ef:e9:e3:f6:5e: 27:84:43:b9:a4:28:d0:9a:7c:a9:22:57:61:cd:65:66: 68:f1:a0:ed:43:24:a7:68:a0:32:2e:c1:24:df:2a:4f: 61:d9:7c:af:44:0a:92:1e:32:e5:3f:e6:cc:56:9c:5a: 49:c4:f4:1f:a8:13:ce:0e:67:82:31:b0:45:39:74:ec: 44:f2:ea:0d:25:06:92:22:a2:e6:55:bb:bf:bf:fd:0d: c4:a1:ec:c9:f2:c4:93:fa:cc:ee:3a:2b:78:5c:60:ec: aa:32:db:82:fc:58:c8:3b:cc:9c:27:84:46:da:1c:de: 68:32:c3:ac:1b:cc:9f:db:1e:19:da:d1:c0:83:92:f2: ff:73:a8:1d:98:56:2f:15:2c:07:4b:77:35:95:4a:bb: 76:54:dc:44:08:da:e3:2a:b4:c4:0a:28:76:19:ea:8b: 27:51:72:7f:c5:13:a7:cc:df:7f:91:24:17:c7:eb:36: 7e:93:4b:b7:70:3b:4f:d1:f4:79:5e:96:47:02:21:2d: 42:1d:36:8d:ea:86:0e:ca:c8:c5:57:de:8f:d7:2f:1d: 88:f0:35:59:f3:24:3c:4a:3e:3b:1b:32:ff:66:69:dc Fingerprint (SHA-256): 88:D3:98:28:3A:61:2B:48:53:1A:7C:A3:F0:F0:B9:83:56:C5:AE:31:16:27:DC:57:33:E0:9D:AF:CF:68:49:64 Fingerprint (SHA1): 10:78:66:1F:CC:C0:C4:12:FA:E4:0B:AA:C8:49:F3:91:AF:09:03:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174321 (0x3cb01b71) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:45:15 2023 Not After : Wed Oct 18 17:45:15 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:44:c6:be:63:3f:4f:fe:f8:81:ae:5e:85:0a:96:eb: 7f:92:cb:34:f4:74:7d:42:84:df:c9:a4:66:21:62:d0: 09:30:6a:98:9f:9b:45:3f:95:7c:08:db:bc:61:bf:68: 24:73:e5:8f:55:55:48:8e:28:71:e4:44:72:c6:ba:36: dc:a3:49:fe:95:36:86:ac:0f:3f:91:73:4d:ad:7b:75: 56:fb:00:8f:75:58:7f:f2:ed:b5:5d:c4:b1:0c:0b:dc: 9f:84:9b:9f:f9:e6:4c:ac:a5:a9:68:12:ae:12:b3:b4: 1b:21:32:d2:df:00:9b:4b:0b:a4:e9:2b:c2:b2:20:d5: aa:c9:f0:49:5f:96:4d:55:ed:09:08:13:5c:bc:5f:5b: 87:ca:f6:8d:e1:18:87:b4:02:ae:4e:29:64:cc:b8:50: 69:3f:68:1e:b9:d9:64:cd:d4:67:a5:12:50:b6:f7:fd: a6:a0:43:d0:22:4b:3f:f9:39:d3:3b:1d:89:1f:3e:67: e6:56:50:9e:9a:48:c7:a4:04:09:a2:20:62:e1:d9:a4: 75:4e:77:86:ae:1c:e2:95:c0:1f:80:49:b8:da:71:e5: 6c:01:d2:91:0e:96:2d:31:85:7e:bd:90:ac:ca:c7:b3: f0:3a:50:46:64:fb:34:1f:68:d2:79:a7:05:18:26:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 81:b7:da:75:0c:8b:bd:0b:fb:29:61:e0:4b:f9:f7:d7: b2:98:8d:00:b1:ad:ae:99:25:c4:12:ef:e9:e3:f6:5e: 27:84:43:b9:a4:28:d0:9a:7c:a9:22:57:61:cd:65:66: 68:f1:a0:ed:43:24:a7:68:a0:32:2e:c1:24:df:2a:4f: 61:d9:7c:af:44:0a:92:1e:32:e5:3f:e6:cc:56:9c:5a: 49:c4:f4:1f:a8:13:ce:0e:67:82:31:b0:45:39:74:ec: 44:f2:ea:0d:25:06:92:22:a2:e6:55:bb:bf:bf:fd:0d: c4:a1:ec:c9:f2:c4:93:fa:cc:ee:3a:2b:78:5c:60:ec: aa:32:db:82:fc:58:c8:3b:cc:9c:27:84:46:da:1c:de: 68:32:c3:ac:1b:cc:9f:db:1e:19:da:d1:c0:83:92:f2: ff:73:a8:1d:98:56:2f:15:2c:07:4b:77:35:95:4a:bb: 76:54:dc:44:08:da:e3:2a:b4:c4:0a:28:76:19:ea:8b: 27:51:72:7f:c5:13:a7:cc:df:7f:91:24:17:c7:eb:36: 7e:93:4b:b7:70:3b:4f:d1:f4:79:5e:96:47:02:21:2d: 42:1d:36:8d:ea:86:0e:ca:c8:c5:57:de:8f:d7:2f:1d: 88:f0:35:59:f3:24:3c:4a:3e:3b:1b:32:ff:66:69:dc Fingerprint (SHA-256): 88:D3:98:28:3A:61:2B:48:53:1A:7C:A3:F0:F0:B9:83:56:C5:AE:31:16:27:DC:57:33:E0:9D:AF:CF:68:49:64 Fingerprint (SHA1): 10:78:66:1F:CC:C0:C4:12:FA:E4:0B:AA:C8:49:F3:91:AF:09:03:39 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174326 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174327 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174328 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174329 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174330 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174331 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174332 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174333 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174334 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018174335 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018174336 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018174337 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018174338 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018174339 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018174340 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018174341 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018174342 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018174343 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018174344 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018174345 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018174346 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018174347 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174348 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174326 (0x3cb01b76) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 17:45:31 2023 Not After : Wed Oct 18 17:45:31 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:e8:88:76:1a:cf:55:c2:f6:18:d1:79:43:4a:e5:89: 7e:09:03:05:3d:e5:4c:32:47:39:76:8f:56:b3:1e:56: 44:73:8e:e1:74:6f:70:c2:08:2d:77:f2:16:a2:fd:6f: 99:be:fe:92:ff:40:61:66:4f:0a:2d:28:f6:4c:9f:24: b2:d0:6e:19:a3:ee:e8:cd:77:6a:10:0e:71:fe:37:54: b2:8a:3f:b0:82:14:e0:37:81:2b:ad:b7:7d:23:56:ff: 5c:3e:67:e8:0f:a5:b5:0b:c1:9e:96:6b:13:e7:f4:41: 9e:0c:fd:f4:ac:c0:2d:03:13:ff:4e:67:df:ce:25:43: ba:53:93:33:c7:0e:84:ff:04:b1:d1:f9:6c:55:83:5e: c0:ed:85:2d:28:9b:9a:22:92:e1:82:18:fc:23:2e:d8: d4:d3:f0:13:e1:02:55:d0:00:90:15:80:1f:d9:e5:12: d9:41:47:da:67:6d:21:be:96:83:48:cc:3b:f7:ee:83: 5c:b4:9d:a1:cc:28:3f:97:63:73:c0:25:43:90:e3:9f: bd:bd:78:da:c2:eb:ec:5a:ca:35:21:94:a3:c2:32:4d: 38:36:d9:ea:b3:db:ad:b4:f2:5d:ad:de:ae:d5:c4:8a: 41:4f:f4:49:b0:a5:c4:b2:73:08:af:dd:ac:72:38:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:86:9e:69:3d:66:c4:f0:62:e8:f3:59:c5:0a:34:75: 9f:21:e7:ee:48:f2:b9:83:04:a1:8e:af:87:a1:67:d7: 57:fd:8f:f2:c5:53:ce:b7:a8:1f:6c:39:fb:f0:a8:8f: af:e8:8e:47:ac:8c:1a:29:ee:c2:cd:35:9f:7f:21:10: 64:bc:dc:24:28:73:8d:9d:b2:69:50:bc:da:14:15:9b: d2:62:54:06:8d:51:24:54:b6:d8:0d:09:8d:f8:00:01: f5:0e:18:dd:1b:bb:7b:95:73:ba:94:38:34:d1:20:86: d9:4d:88:5f:71:be:aa:42:95:61:3c:08:4c:63:5b:be: 35:d6:f7:9c:f3:ec:f0:d1:72:26:c4:9a:c0:45:b5:dc: d3:10:ff:3e:c6:39:74:98:50:ee:9d:5f:36:e4:ca:dc: 6a:0a:54:05:be:87:88:54:ab:10:b4:a0:6d:48:84:d2: 89:8f:91:c5:f3:99:95:bc:8b:b9:9d:83:bf:8e:e5:58: ef:9d:13:fe:2b:08:f5:1b:09:1b:89:63:e2:0b:00:89: 42:30:84:f6:ce:4c:b4:e9:bd:f9:56:7a:7a:0d:e0:c4: fe:5b:0b:11:1d:5a:7a:14:9b:3f:4b:39:19:72:f0:af: 83:91:dc:91:c8:63:2f:c5:20:51:f6:3a:f2:19:0f:d3 Fingerprint (SHA-256): 25:EF:62:6B:FA:86:02:5A:D8:6D:7E:EF:5C:35:A0:4A:FB:AF:3B:92:17:63:57:20:80:4D:3A:0E:1C:EE:6C:D1 Fingerprint (SHA1): E7:16:4C:4A:6F:EE:8F:58:6E:45:78:EB:5D:6D:CA:0F:67:4F:7E:D7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174327 (0x3cb01b77) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 17:45:33 2023 Not After : Wed Oct 18 17:45:33 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:09:2d:3e:d6:3f:26:b6:0c:f7:70:2d:ea:5f:d7:37: 6d:93:29:63:76:61:ec:6b:b1:61:40:97:5b:79:53:42: b9:48:41:6b:6b:03:21:69:99:76:93:91:87:24:8f:92: 2d:67:96:af:0a:df:26:7b:13:c2:38:3f:d4:81:46:aa: 14:04:aa:6d:f5:7d:3d:5b:8b:81:f1:c5:2e:fb:f8:4e: 03:3f:17:2d:24:7f:aa:e2:95:61:48:ba:42:0b:cd:c7: ba:1c:24:15:63:60:d2:1f:6a:1f:f5:40:ff:51:60:4a: 32:5e:c6:14:e7:bb:be:87:f5:44:dd:18:94:b0:55:e3: 01:98:c8:d6:a5:7f:16:bd:d3:3a:32:b3:ef:bc:a7:da: 7e:e2:20:74:61:f9:61:75:37:e8:f6:7a:af:0d:6f:93: fc:0c:1e:8c:40:d0:ed:f6:c6:d3:f3:e3:8f:d3:e1:80: 58:dd:ae:89:49:4a:cc:4a:54:05:df:46:c7:66:6e:78: 6a:99:30:e2:89:e1:0a:16:c6:c5:d1:5a:5c:4b:af:9f: 03:31:12:02:1d:05:15:bf:07:59:3b:90:26:f7:39:02: 0c:2f:a9:cd:c8:f6:61:d9:9d:9f:df:2c:97:d9:ae:67: ca:1b:fd:52:c1:93:31:17:e5:88:e5:00:3e:74:d6:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:50:53:75:6a:84:99:56:de:5b:31:65:57:18:65:de: c7:30:ac:0b:a8:37:23:46:a4:64:08:95:44:8f:ae:76: e1:54:79:7a:c2:19:df:a4:b2:fb:b1:ef:bf:16:d9:bb: 9b:b1:7d:3e:36:1a:e7:a5:36:9b:e8:e0:32:fa:7f:a2: ce:eb:bd:29:54:29:85:fb:d5:71:6f:32:72:18:dd:d7: 06:83:8a:a3:a2:85:55:40:eb:da:b8:d8:be:ea:44:f4: ec:39:d7:49:0e:bd:06:7f:d2:ae:79:85:c4:db:cc:64: 60:f8:fd:58:cf:98:46:aa:64:c8:14:8d:f6:14:3a:98: 24:8c:7b:c6:52:3a:50:03:d6:41:6c:15:ea:29:52:62: d9:43:15:bd:23:75:cc:98:96:f5:17:22:2d:a7:fe:54: 67:7c:f4:d9:fb:d5:7f:47:c9:5a:b8:08:4e:3f:f9:1a: d5:bf:ee:cb:5a:c4:3e:8e:00:1e:ee:cf:51:6b:6a:19: 53:8a:61:f2:24:a9:5e:e3:7e:c3:f4:ff:04:d2:39:73: 8b:bf:6e:e6:cb:47:b4:af:f0:3d:93:86:2b:fc:b1:02: 40:23:5b:84:ec:74:5f:4f:a7:4e:68:db:93:a5:0a:0f: b1:60:09:2f:a4:d9:3c:2c:3b:d4:5b:11:30:ef:0e:f7 Fingerprint (SHA-256): 56:D6:7B:25:C1:E4:B2:EB:B1:28:58:7E:7F:82:6F:AD:93:E5:D8:A5:5B:D3:28:8D:49:08:9A:5F:80:56:F4:CA Fingerprint (SHA1): 27:E9:86:1E:AB:99:57:57:37:45:4D:E5:73:B5:51:4B:0D:92:44:42 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174328 (0x3cb01b78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 17:45:35 2023 Not After : Wed Oct 18 17:45:35 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:24:ad:00:42:25:68:47:17:09:dc:c3:25:20:6a:f4: b3:53:ab:3e:70:8f:d2:aa:22:51:06:14:cc:90:47:8a: d5:ca:a2:38:3f:4e:97:27:c7:7d:cd:02:5a:2a:c2:5a: 33:2e:92:38:24:aa:93:8a:d2:1e:b3:df:15:af:8f:24: b7:8f:5c:f7:5e:68:13:ea:98:22:0f:73:8d:b6:70:33: f6:cd:ea:b2:3a:b9:fb:2f:24:55:f5:1b:ee:e1:66:7d: 4b:34:eb:61:49:1e:7a:75:21:ad:0d:cb:d8:9d:ef:f6: d7:7a:bf:60:65:97:a7:a1:46:71:eb:46:33:25:90:31: 9b:5f:96:9a:82:d3:a6:e4:bf:54:fc:8d:c4:bf:d7:4d: af:6d:df:d3:0a:e3:27:1e:cf:d4:22:73:c4:d9:1b:26: fb:86:72:f0:90:57:82:dc:23:45:b8:11:89:93:7c:f1: 06:49:e2:7a:79:4e:3d:c5:26:a1:b9:9a:cf:dd:72:18: de:b7:a9:d5:04:8e:9c:95:64:7d:32:7d:a8:65:e9:8c: d3:cb:de:a2:d0:05:11:9f:66:9a:e2:61:3e:6b:12:9a: e9:96:df:19:ae:93:1f:a3:bc:5e:58:c1:94:e1:3a:4d: 6a:8c:0b:e7:11:eb:d9:17:b9:69:ff:d2:24:b6:13:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:b0:7a:71:81:66:12:da:8c:6b:05:4b:53:f0:fb:49: a6:ea:db:e7:82:b2:c9:bf:2c:00:49:d9:24:bf:d1:5a: 49:e9:a4:c3:d8:be:c6:46:e8:df:29:36:ee:27:28:73: 21:1a:3b:5f:40:40:e2:6c:68:e8:b5:c3:28:ac:64:ea: 07:dd:08:62:4c:cc:42:da:6e:e5:45:30:00:3b:70:94: ad:d3:6c:12:1a:80:79:9d:33:2b:a5:8a:de:c2:0f:4a: 11:5f:09:8c:fb:7c:3b:17:82:4c:70:d7:cd:97:ff:34: 44:33:40:a8:e6:c5:53:78:6a:81:4f:13:1a:63:33:e2: 9a:71:60:ad:c8:b6:cf:c4:87:97:ff:39:a3:12:a4:82: ba:00:13:e7:74:49:4a:ee:9e:d7:37:f4:be:33:12:0b: 23:fd:6f:1d:a2:6c:d7:5d:af:b7:89:d6:03:86:aa:0a: 2e:5e:a7:2e:44:cc:d6:39:3f:d1:92:00:22:05:cf:ed: 94:7a:45:21:c6:1e:b3:c3:2b:39:48:b3:e4:80:1f:b4: 60:93:07:ca:cd:34:0c:80:14:9c:19:c2:db:94:01:42: 2b:e4:62:ad:c2:2b:af:d4:ad:30:13:d3:fe:26:ed:7e: 57:2d:7c:70:11:ce:11:9f:2c:ff:8d:cf:4a:4b:d7:d6 Fingerprint (SHA-256): A6:C0:5A:FF:D6:44:EF:98:3E:7E:43:52:69:14:3B:B6:0E:25:F9:52:91:11:00:C3:93:D3:77:93:47:1A:97:7F Fingerprint (SHA1): 66:EE:B0:45:AA:9B:55:AD:C0:73:E7:11:D4:FD:F9:4D:A9:1C:BD:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174329 (0x3cb01b79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 17:45:37 2023 Not After : Wed Oct 18 17:45:37 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:3f:29:04:9f:1f:b8:7f:b7:d7:71:3d:3e:da:68:c6: 59:87:5d:7d:e2:25:d0:b4:7e:46:a2:7c:b2:e8:3c:19: 3b:c2:2a:97:17:b2:9d:69:5c:02:00:24:ee:0b:2b:37: d1:9f:5d:c9:12:a9:40:92:54:67:bd:55:d7:a1:ac:c1: 12:bb:cf:e1:2f:a0:ea:47:aa:44:29:37:05:3f:36:40: 37:e1:6d:d3:da:37:dd:de:7c:26:d3:01:d7:16:98:13: f8:88:db:b5:2d:1e:bb:06:5c:67:84:ed:e0:8c:32:9d: df:2e:78:72:e0:0a:1a:db:1c:a9:74:33:9e:f1:37:6f: b6:ef:f9:85:92:62:07:f7:a0:cf:48:b9:05:f1:08:85: db:1e:0f:0a:d2:19:d6:4c:14:5b:63:85:4d:53:d7:f5: e8:71:82:ec:41:78:2c:5d:7b:24:b3:69:f4:6c:f3:c4: 07:8a:9e:fa:34:38:e8:d1:f6:cd:3e:46:7a:15:f6:6f: 6c:0c:42:89:a7:16:5b:7b:f6:89:93:11:07:7c:63:e5: f9:22:fa:ba:76:0b:34:a3:e8:e6:63:86:67:23:06:00: a7:3d:23:ee:da:15:62:09:e1:7a:f2:71:66:f7:e8:0b: a1:60:46:ae:ce:fb:77:3f:23:0d:e7:f2:da:d6:1d:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:fd:86:98:45:79:e1:37:bf:f1:c8:3c:18:c6:89:68: ef:de:59:07:d4:96:5c:f6:48:b3:ab:8b:7a:ca:39:12: 7e:99:ae:b6:0d:78:a7:32:9e:71:51:2f:3f:47:23:db: 83:a0:73:e2:6f:ec:f7:dc:e9:be:69:81:7a:16:be:15: 2e:9b:71:06:69:ba:10:9a:37:c7:82:d4:64:25:53:0a: 43:3b:ef:2c:49:0d:ba:c8:f2:e6:75:e8:c1:1e:e7:c3: 8f:8c:f0:e7:10:57:a9:96:d8:82:b5:a0:6f:32:5d:43: f7:ee:a3:a7:d9:3c:08:ce:73:98:36:30:02:e8:1c:bd: 56:6e:99:fa:4a:4b:14:02:d2:bc:49:1c:ba:f5:73:cb: 58:28:7e:9d:db:44:27:ed:a3:a8:41:02:87:ed:63:32: 42:74:01:d5:0f:5b:a6:0d:fa:74:02:d3:8e:c4:b7:06: f2:88:35:0b:18:d0:2c:4e:90:c6:1f:ea:65:09:23:52: e3:a0:9d:95:74:87:00:8c:63:48:1b:61:fd:c1:f6:2e: 8b:99:a1:2e:90:73:48:08:ae:35:41:55:93:ee:fc:fe: f7:4b:6b:74:9f:1f:09:9e:b8:0e:5e:b7:70:c7:4d:c4: a3:11:db:c8:b2:73:5b:91:3b:70:a0:93:75:38:56:bd Fingerprint (SHA-256): CE:0A:25:7E:B6:64:4D:99:D6:47:0B:69:8C:92:C0:CD:FF:CD:36:0E:AD:41:A3:12:D4:46:56:71:B0:7E:30:17 Fingerprint (SHA1): 5A:AF:B4:3B:D3:98:1D:C6:D6:45:A4:3C:70:16:0D:6C:E2:34:30:5F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174330 (0x3cb01b7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 17:45:39 2023 Not After : Wed Oct 18 17:45:39 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:70:8c:cc:2b:b9:c9:7b:75:48:f3:4a:50:40:9b:fa: a5:18:4a:03:69:e8:cb:68:f2:c9:a7:7c:d1:56:c6:fb: d2:40:6f:a7:8d:c7:9e:d5:3c:70:82:2c:eb:dd:b9:bd: 3a:13:c4:7e:a6:81:1d:45:71:76:f5:c4:69:65:a5:bc: e1:c2:31:dc:e8:98:af:f1:38:1f:81:c9:1c:fa:12:ad: 18:9d:03:25:40:9c:2d:a1:94:d1:48:77:6e:30:2c:15: e3:02:57:0f:e3:89:1f:06:95:c3:b2:80:cc:27:84:ca: 36:a3:4c:a0:bf:9d:1d:b8:86:e5:14:c1:91:3a:ab:30: 5b:f8:92:87:2a:4c:41:e5:e0:8e:f0:e0:58:29:b2:a0: e4:7e:b3:ad:c5:f5:17:6e:3d:73:cd:36:e9:91:17:31: 8f:63:1c:5f:db:25:6b:f2:ec:a9:49:ce:d6:34:fc:68: 0d:4b:ec:39:4a:16:77:72:26:a0:e0:88:e0:94:ab:1f: f8:87:0e:0f:0c:1e:18:bd:56:43:7e:de:c9:53:3b:a9: 66:24:3f:d7:b7:08:06:54:68:94:cd:de:e9:c5:87:78: 55:a3:a2:8b:a2:26:e5:65:69:30:81:04:78:77:50:e3: b1:b3:96:8b:a1:b1:a6:39:60:0c:d7:32:ec:bd:20:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:f9:99:ea:f7:75:50:06:37:b7:cd:96:ac:73:d7:a0: f6:5d:fa:c4:1b:31:10:73:ba:82:ef:d5:0b:50:49:57: 75:a9:ae:ec:27:f1:cf:5a:49:db:ef:f9:7c:8b:6d:52: 6a:9b:14:27:f6:4d:ae:ca:93:1d:78:8b:f1:06:67:f2: 6a:69:ef:f5:df:92:9d:41:87:c3:68:37:ab:17:ec:28: be:59:7d:c8:8b:e5:4b:80:50:6a:35:9a:90:17:b5:7e: 71:c9:84:2a:f3:68:4e:74:75:e0:25:45:a4:b6:2f:f1: 8d:39:db:0e:72:b0:ba:52:17:0d:0a:7f:67:a1:55:62: 81:cd:1c:d8:7a:1b:cd:a4:03:36:01:13:ef:63:16:f5: 61:15:85:4e:f4:05:f4:31:7b:89:03:3d:ce:eb:3e:24: 1c:c6:04:69:5a:73:a3:9a:24:52:66:bc:6a:1e:3b:ef: c2:ad:90:49:d4:45:a9:a3:f6:cd:46:fa:6f:7e:98:a2: ad:81:2a:f6:7a:23:19:7b:31:2f:ea:f0:12:45:2e:5c: e9:ff:91:d7:19:db:95:f8:b9:89:ba:99:18:99:fa:a3: 19:e8:f9:48:07:6d:9b:84:40:fd:e6:c1:48:97:22:39: b0:3b:80:28:ba:d0:17:48:a9:9f:e0:d7:26:55:e5:90 Fingerprint (SHA-256): 7B:3A:4C:31:1F:5F:C8:95:94:B8:1A:E2:33:E1:0C:71:BF:4B:7A:40:39:ED:95:82:D5:4C:37:02:5D:80:2B:F6 Fingerprint (SHA1): 9D:17:E3:E8:77:12:3D:C8:81:BA:0B:84:BF:90:98:67:76:0B:A9:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174331 (0x3cb01b7b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 17:45:41 2023 Not After : Wed Oct 18 17:45:41 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:0e:22:4c:70:6b:6b:19:ea:ec:91:6d:37:16:bb:60: cb:c1:81:39:c7:5b:7e:79:37:3f:62:22:cc:54:7c:28: b3:ad:c0:75:6a:c6:3d:3d:c6:84:41:75:49:70:c4:50: 3d:b7:62:58:11:9e:93:7c:12:ec:51:c4:6d:8e:f6:a9: b5:50:c4:2a:f8:e7:79:1d:77:8b:b9:47:0f:ef:45:d6: 2d:fd:96:04:ef:eb:45:a9:df:67:66:31:1a:be:3f:10: 03:50:2b:80:13:e9:f7:04:fb:e9:46:ba:a9:8f:a7:a3: 48:63:53:51:81:64:30:a2:25:de:9c:cc:eb:e6:2c:05: 95:93:10:9c:c5:65:f0:aa:ee:4e:74:00:f3:05:01:32: bc:3b:89:99:5e:a4:c4:b3:33:5e:9a:aa:c1:03:2b:09: 66:cf:7c:f1:12:3b:56:20:d9:d1:0f:2c:fd:3c:0d:c0: f7:85:bf:af:ca:61:18:ea:f3:31:9c:d0:3a:70:6d:fe: 62:cf:a1:2d:ac:19:ca:57:18:ab:63:e6:a7:78:44:8f: 11:85:2e:8a:71:aa:61:45:99:a0:1c:bb:83:5b:88:09: a4:a5:d6:ba:72:9d:69:3b:99:1e:57:84:3b:95:a5:2b: 1b:94:2c:bd:c1:fb:89:fb:76:e8:8d:ed:f1:55:1e:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 78:3b:1a:6a:ae:fe:a9:95:3d:ac:c0:78:30:89:85:1e: 8e:60:87:88:4a:4a:1c:3e:2e:c3:46:5c:e2:4c:98:63: 45:70:c0:a4:91:72:17:67:f4:01:c6:04:67:f0:29:ed: 07:ce:09:08:e5:12:55:9f:a7:83:c1:f3:a9:14:37:5e: ff:8f:78:21:75:7d:7d:4f:65:1c:4e:88:bd:a6:34:c8: 1c:a8:6e:95:ac:fe:61:b6:15:7c:75:ff:3b:15:f2:0e: 2d:d8:e0:1e:a0:f9:68:d1:01:8a:97:bc:a2:c1:68:42: 26:8b:61:7a:e8:15:9e:bb:62:53:5c:a0:0e:49:c1:0d: 9e:49:6d:68:9c:71:01:0c:51:d5:19:95:b7:ba:d1:8e: a2:c1:fd:b9:2f:aa:6f:1a:25:70:28:90:ab:ef:0d:04: e4:05:9f:5d:0d:d4:6f:8d:7f:c5:da:0d:fb:4b:57:62: 84:01:a2:a9:8b:ad:ab:3e:46:a1:7c:2c:9c:b4:61:5b: 05:e2:4e:15:9b:d5:74:fe:c8:54:25:94:38:5b:cc:90: 9b:b3:60:25:c2:e4:4b:93:5b:96:76:3f:64:ce:85:15: 1a:a5:f4:de:3f:ab:55:52:80:1f:bb:7d:1d:44:58:32: 95:d6:ef:cd:cf:62:eb:26:ad:00:df:84:19:90:61:ef Fingerprint (SHA-256): 4B:2C:C2:F0:4C:44:EC:73:57:5A:C3:29:44:A7:16:DA:85:E8:4F:A9:E6:72:A7:02:B1:99:27:41:EB:B8:CF:67 Fingerprint (SHA1): CC:DB:59:E0:0D:DE:C4:1A:2D:0B:42:19:C8:E2:11:8F:49:1D:99:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174332 (0x3cb01b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 17:45:43 2023 Not After : Wed Oct 18 17:45:43 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:20:a4:d4:2f:dc:85:20:3f:87:82:f1:25:07:16:20: 99:4c:8a:5c:fb:41:11:2a:b4:08:50:0d:8c:6a:43:54: 0e:2e:9a:8f:16:01:ce:01:5b:d6:f7:f7:0a:ac:5e:1c: 9b:be:97:bd:6e:26:22:a4:12:ce:4c:f4:ca:ec:02:30: ba:45:28:ad:d1:25:11:d4:90:81:84:0e:59:f9:03:03: 72:ad:83:76:ea:39:3d:c8:cb:43:3e:69:fb:7b:5c:10: c4:5a:79:68:88:cb:10:d5:dc:b3:d0:d2:65:26:b5:33: 87:b5:32:de:ab:e0:84:76:90:eb:3d:e7:60:66:6f:b8: 98:11:1f:79:a2:3c:29:c5:a1:c7:41:ca:5b:9e:ee:e9: 50:16:71:19:70:1f:02:2a:1d:0c:eb:20:30:57:1d:bb: 33:9e:88:9d:66:6f:06:01:f7:2a:b7:6f:37:06:d9:61: fd:b6:dc:92:50:06:27:07:7c:bd:f4:41:45:4d:f3:d3: 61:e5:fd:b3:c9:f2:b9:62:19:35:d8:8c:bc:25:57:76: 26:aa:e4:73:3c:3b:e6:7e:a8:a6:bf:01:29:47:a3:7c: 0e:2b:d3:d6:e1:65:61:21:ec:a2:5c:b4:91:cb:a4:bc: ea:ae:25:70:d0:5c:16:4c:fe:e2:6d:17:29:9b:2b:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:e0:86:82:d9:c6:dd:3e:9d:8c:b1:4f:36:85:14:67: 20:b7:16:f7:59:ca:f9:11:67:a3:f3:3c:0a:44:48:72: df:9c:76:32:97:47:56:0f:fe:e5:df:f5:8b:90:6b:9e: 9e:d3:cd:26:d7:2c:82:41:1b:c1:38:90:68:89:ec:f5: 35:64:56:93:5d:2e:e3:58:1a:65:1e:84:28:f7:93:22: cf:ea:87:11:11:5c:50:a4:7b:6e:ad:34:9c:52:97:e6: 55:41:19:40:38:f5:4d:b6:33:af:ff:39:5f:f6:09:e0: a6:d9:24:23:25:7a:be:a5:e2:41:c1:8c:90:be:25:50: d3:91:fd:85:65:b1:07:58:21:59:b2:23:2d:68:20:cf: 4c:70:96:85:be:2f:32:90:5a:67:14:ae:6b:6a:92:b1: 67:47:d8:19:c2:19:70:73:03:bd:05:d5:83:a4:37:67: 2b:60:44:04:b7:49:1e:6d:d7:62:5b:2a:32:6e:f1:ef: d0:f7:99:cf:bd:78:c3:d4:ae:60:74:93:10:e8:eb:d5: 3a:31:ec:2c:22:56:df:27:bd:55:da:f3:10:62:5d:56: 31:b9:76:fe:50:b3:2c:57:e6:3e:6c:e9:ad:97:7c:dc: ed:f0:6e:b7:33:6c:30:68:8d:1b:fa:90:f9:a2:f0:0a Fingerprint (SHA-256): 0E:6D:BA:CB:29:AE:13:2C:46:E9:D8:B2:B6:03:0D:39:1D:B2:A0:DA:1C:07:DC:4C:CD:E1:2C:CB:B5:33:FD:D1 Fingerprint (SHA1): 67:A9:DD:B0:A3:D3:98:09:1D:EC:D0:E6:1F:1E:01:19:87:17:40:5A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174333 (0x3cb01b7d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 17:45:45 2023 Not After : Wed Oct 18 17:45:45 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:3f:48:07:f1:fb:84:56:bc:03:39:30:bf:93:00:05: 43:2d:56:b3:0f:17:64:f6:cd:b0:8e:70:6d:04:77:1c: ac:00:8e:ae:b0:e8:20:e8:99:09:7f:1d:04:dc:7a:cb: 93:90:a1:20:8d:3f:4f:10:eb:cd:44:ef:15:78:44:7c: d8:af:80:35:08:95:c1:6d:9f:13:d4:64:4f:44:7d:99: 72:90:3d:4f:f1:00:ec:b4:29:41:37:f3:3c:ac:83:ba: 3e:23:4b:e4:47:2f:2e:24:ef:23:ff:d7:f4:c0:bf:58: 12:57:d1:47:3a:4d:43:54:18:7e:db:f9:ae:5e:9b:c9: 7c:31:f0:c4:6f:68:c9:af:6b:58:63:e2:03:b5:d7:bd: 1b:1d:bc:70:3b:35:15:9d:4b:a2:4c:0c:c7:eb:3b:c4: 1f:39:28:b9:7a:28:fe:a5:4f:31:06:2a:49:36:c4:34: 6b:50:8b:41:31:83:ee:e0:51:80:4a:58:1d:da:b0:a9: e7:5d:da:c5:cc:60:a2:03:6d:73:65:4e:ad:be:3a:a3: 60:19:a8:62:ba:ea:df:fa:e2:3e:52:44:58:18:fa:d3: 9f:58:c7:96:17:b6:98:6a:4e:5f:5d:63:4f:3f:2d:75: 10:d2:3a:ae:14:63:c0:7b:d0:96:fa:9e:f9:15:96:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:7a:99:4a:18:8f:64:5f:cd:ac:da:c5:e5:cc:2c:5a: 7c:ad:c1:da:51:23:7c:53:ae:fc:a5:39:44:6d:f6:f0: 1d:56:6d:de:7f:10:82:d9:0c:a1:77:c7:4c:51:9c:cf: ee:13:e9:c1:36:15:de:92:9b:f4:f7:cc:6d:15:1b:64: e6:e1:f6:1b:b8:32:3b:ab:c2:c9:5f:10:5d:49:8c:c9: 05:88:96:b0:32:74:95:c3:4e:63:af:1e:38:17:87:02: 53:75:cf:6d:a7:fd:46:84:d1:13:3f:b5:f7:5a:24:97: 2a:73:1b:a5:2c:54:f2:55:a6:41:55:51:0a:bc:4d:2c: 33:93:e7:b4:fa:60:94:08:49:bb:0c:d0:4f:1f:b5:a4: a8:0c:93:8c:27:06:35:80:ea:92:77:41:85:cf:5a:60: b6:ad:71:0a:ff:5e:76:70:a7:b7:5e:32:68:ce:96:55: 0a:3f:5d:6f:51:58:e8:40:4d:82:7b:eb:36:60:4f:e8: 1b:d2:b5:6c:b3:20:45:aa:33:57:15:88:ef:2d:40:03: d8:32:9f:63:30:d3:e4:63:dc:53:91:19:1a:35:16:8c: 8a:d3:bf:1f:9e:ec:52:0a:59:03:cb:92:b7:4c:0c:a7: 74:eb:66:e5:89:67:a1:39:7a:1d:37:ae:72:87:19:f0 Fingerprint (SHA-256): 3D:41:4A:75:80:E6:DA:2B:1B:EA:F3:55:F3:CA:6D:2E:BE:26:DC:68:EF:82:DE:FF:20:40:31:4C:46:A2:37:57 Fingerprint (SHA1): 47:B9:AF:C2:4E:FA:9C:F9:F4:4B:7E:3E:19:2E:28:EA:7F:12:98:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174334 (0x3cb01b7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 17:45:47 2023 Not After : Wed Oct 18 17:45:47 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:50:a6:20:2c:1f:ca:32:dd:fa:db:f6:62:34:73:6b: 24:2d:b5:fe:4d:97:e7:c4:67:7e:07:89:ce:6b:8f:22: 33:90:9c:14:a1:ef:c1:78:22:cc:cc:54:17:fe:98:b0: 63:1e:43:d2:65:a8:81:eb:85:8e:1b:9a:99:d2:6c:f0: af:90:2c:66:92:df:24:bb:50:33:a1:7e:80:d2:0b:dd: 4e:a3:b5:9a:fb:48:b8:e9:f8:a8:70:9a:cf:e4:2e:0e: bc:48:c8:6e:71:64:de:83:b0:07:7a:83:7a:38:6b:d6: 97:11:93:72:e2:b7:ff:60:65:ef:93:0e:67:29:eb:55: a2:6e:7d:d9:1d:4b:e9:8d:85:59:a7:62:16:59:6f:07: 2c:fb:cc:dc:f7:b6:4f:2f:16:22:17:fb:31:4b:f6:02: 19:16:12:1e:16:c4:13:0b:44:7e:c0:6b:f1:70:6e:95: 9a:ea:79:dd:ac:5d:7c:9c:79:34:7a:8c:aa:2b:3b:ad: 89:63:a7:a2:ad:94:be:7a:d6:7a:2e:48:0a:5d:3a:a6: 45:07:26:d2:92:2e:25:fd:d8:b7:07:7e:ac:43:0a:74: 24:6f:9b:a0:b7:99:2b:66:ce:0e:89:52:e0:d7:43:ba: 55:c4:16:6d:f5:4e:96:44:9f:23:16:09:17:37:42:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:fc:e9:6d:16:dd:1f:e3:dc:bc:7b:54:84:9e:b1:70: 3b:82:83:a3:ec:93:33:34:0e:1d:37:06:ae:a1:df:69: 74:07:55:ca:fb:ac:66:6c:8f:c8:09:ee:d4:b9:d3:e6: 76:23:48:3f:94:f8:4b:89:68:b7:0c:3e:40:dc:41:d6: fc:87:b9:24:71:9a:35:b2:af:cb:b3:40:cb:a4:d8:be: 7e:9b:d0:97:55:d5:cb:b3:e4:bd:e9:b6:cf:8a:9c:3e: 99:3a:38:f6:c5:7e:14:b8:e6:7f:e8:cf:f1:34:e9:d1: 9b:4f:c7:79:67:e7:b4:6e:f7:bf:5c:2e:6f:16:cc:35: 51:ac:09:99:14:dc:85:84:03:57:f7:bf:d1:72:1a:8e: de:65:31:be:fa:eb:5e:30:73:79:e3:a2:96:15:a8:bf: 8b:f1:a8:82:e1:f9:3a:25:43:26:19:0e:e0:e6:d0:aa: d2:9d:d3:bc:b4:c0:65:a2:cc:38:82:6e:37:a0:97:1b: 56:d8:3f:d4:fb:2e:41:2e:a6:95:58:d0:a0:1b:b0:67: 43:04:96:79:af:9f:d3:23:f2:f6:8c:75:b5:2c:4c:74: 58:22:fd:41:05:09:15:96:cd:37:ea:61:ab:e3:60:86: 24:5e:2f:26:1f:b0:ca:34:95:5d:7d:d4:a4:4d:7e:e7 Fingerprint (SHA-256): 94:0D:6B:75:E3:9F:50:A5:16:5C:FA:B8:DA:F1:C8:0A:39:C9:FB:88:D3:0F:34:BA:61:C9:02:8A:80:DC:62:EE Fingerprint (SHA1): BD:F3:68:65:83:3D:E1:EC:7E:0F:EB:6A:38:BC:7E:E6:C8:4F:D3:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174349 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174350 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174351 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174352 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174349 (0x3cb01b8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:14 2023 Not After : Wed Oct 18 17:46:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:11:cf:39:e7:67:1b:58:87:ad:96:15:78:b5:06:87: 6b:2d:7c:58:d7:db:46:8a:fc:ff:44:90:a4:95:a2:a5: 52:be:72:db:4b:56:e6:c8:c9:5d:a7:d3:39:85:cc:71: 26:2b:fd:a9:3a:b1:f6:d7:d3:07:ba:2b:d2:2d:d7:34: 07:7a:15:fb:c5:01:ac:37:f9:f4:7e:2b:0e:a1:ab:19: bd:d3:a1:e5:ea:04:a9:1f:90:ae:b1:a7:2b:af:31:ab: 34:4f:4a:5e:48:13:69:94:f3:7c:c0:de:94:89:3c:a5: 74:8b:2d:a1:ed:b5:da:b5:4c:a0:04:8d:11:4b:81:38: 0c:8c:b8:d5:90:4f:f7:24:c7:55:1e:ed:bf:71:da:3a: f5:42:18:6f:45:66:d3:61:26:c9:eb:c0:cc:e9:6e:e1: 82:ac:3e:63:2a:74:c2:0b:f8:35:0a:29:bd:4d:e8:b2: 22:02:c4:02:e4:38:8b:85:d7:32:f8:db:40:31:3a:81: c4:07:3a:20:28:7b:60:0f:89:e3:a2:6f:f0:17:7f:96: 03:7b:bb:f2:f1:49:23:a0:85:18:b2:bc:13:ac:9b:5c: 6c:c3:05:31:6f:89:ef:c5:b1:67:a9:d8:ef:fd:93:61: da:e1:fe:87:ba:c9:a6:17:de:a5:26:83:75:f1:46:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:c0:f2:d9:7b:96:26:25:c3:97:66:64:96:58:bd:a3: 0e:6c:78:87:84:1e:a2:fa:2c:d5:9b:60:f0:26:90:e7: d5:8c:86:de:9d:a5:66:6f:f7:b5:9c:85:ff:c6:08:86: e3:ee:03:8f:29:56:16:e4:14:b9:76:c7:82:24:46:6b: 6b:73:63:bd:3e:40:89:83:9f:e4:71:c9:c9:68:2b:b7: 23:24:07:c6:e1:00:de:85:d0:7e:bc:86:a4:9b:9e:8e: f7:bb:b6:44:25:a3:66:b8:23:84:c3:03:b4:b7:ff:d9: 9c:8b:c0:e0:42:de:72:9f:21:2d:0f:bc:62:1e:d2:30: e3:f8:ba:1c:72:6f:5e:65:36:d9:2c:5a:e6:ba:32:00: ac:d6:a0:d8:25:6b:e9:52:d7:bb:9b:8d:39:fd:62:29: c1:7c:3d:b7:4c:e3:0a:52:6d:00:91:4f:f1:6d:59:3f: cd:ce:1c:a4:86:e8:95:9d:ba:fd:9d:f9:2f:34:35:cd: d6:23:b2:f2:b4:d7:02:6b:41:bf:f9:15:60:8f:8d:27: 61:2a:ec:c0:5b:b9:0d:3c:7a:f0:0f:4b:e4:b6:68:a6: 3a:55:ae:ac:13:d6:d0:b5:be:42:71:74:ee:7f:37:ad: 7a:75:24:04:47:6f:bb:46:3d:a6:25:2b:97:86:62:5b Fingerprint (SHA-256): 1F:AB:71:DE:2C:F5:A8:72:B7:63:29:BE:5F:9A:96:2B:E9:D7:B5:91:DA:F6:2B:7E:CB:21:66:93:95:CC:2A:0C Fingerprint (SHA1): 3D:06:66:F1:AD:AA:79:8A:9F:6F:15:91:5B:07:D6:82:45:17:0C:B9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174350 (0x3cb01b8e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:17 2023 Not After : Wed Oct 18 17:46:17 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f5:a4:9c:13:c8:90:f3:ee:f2:f0:85:b4:6b:a7:4b: e1:82:8d:ef:18:21:88:51:6a:e1:dc:96:1b:86:7d:de: d5:fd:ab:7e:a5:03:f1:b2:9b:56:94:38:f1:55:31:94: d3:b5:71:63:3c:a4:5e:64:f2:2f:ef:34:8c:fe:06:d8: 25:aa:b8:90:c6:d0:e9:10:aa:b9:f8:96:01:8e:c9:59: ea:eb:70:f1:fc:54:3d:c2:cd:a4:c3:fc:08:18:39:84: 2e:7a:be:45:07:8e:58:6d:cb:ba:77:ab:25:b1:3a:6c: 52:9d:4d:cf:ff:9a:e1:11:16:c0:8e:d7:20:8e:22:ea: 14:19:4b:d7:78:16:69:28:36:85:46:e7:90:a7:9b:c7: e3:a3:6b:58:9f:dc:aa:ba:73:03:fa:17:42:b6:10:9c: 9c:1a:f6:64:8b:f4:ce:61:be:f7:56:1e:47:0d:c5:23: ea:a5:e2:44:4b:03:54:43:01:5f:21:97:8f:ad:95:2d: 6c:4b:85:bc:f6:61:62:26:42:23:4c:ed:98:58:44:7c: 3a:48:47:7e:e4:31:7e:83:1e:2b:16:ce:94:b7:35:ab: a8:f1:04:87:e3:a7:e7:ea:82:ff:98:ee:ff:32:69:54: ec:6e:a6:f4:78:8f:c9:e9:56:0c:51:fa:d9:98:c0:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:4d:91:26:4a:a4:13:b0:08:21:5e:61:a1:e1:a8:03: 06:58:a5:86:9c:79:99:ae:e8:7a:48:39:e4:7e:de:6f: 7f:02:38:75:3c:f2:f1:2a:ab:4b:d1:93:6a:d9:eb:17: 9b:94:54:ca:b9:26:40:50:d3:2a:d9:34:e6:1a:ac:87: 43:81:31:06:1a:87:b5:61:1a:de:e6:3c:ae:16:d7:bc: ed:26:e4:71:f6:a1:29:9e:44:cc:2e:dd:39:2c:74:dc: 55:42:76:77:12:04:3f:75:7e:b6:c3:2d:7c:38:c2:14: 7e:97:70:ad:bd:0b:55:6f:60:7b:7c:65:84:a6:ce:4b: e2:01:d2:49:64:ba:c6:9d:c7:8b:75:68:80:27:d8:06: b4:f6:9a:a8:51:80:03:b1:4b:b8:76:34:bc:4b:1d:45: 3a:0f:89:60:aa:d8:c9:76:c4:af:63:53:b9:b3:a7:89: b5:01:0b:36:6e:89:48:17:d7:4b:38:3f:c0:02:be:df: 5d:aa:bc:a9:39:b1:6b:92:04:95:dd:bb:f2:ea:3a:db: d3:c8:3d:16:0b:57:c0:c1:3b:27:d5:b9:92:2c:8f:5d: c1:94:d0:0a:97:a3:30:9f:79:20:6b:b9:38:b0:dc:f2: 13:83:4b:dc:1a:a0:21:16:2e:3a:e8:85:70:a5:b1:b1 Fingerprint (SHA-256): 5D:71:AA:42:9D:B2:51:B4:B3:62:A0:D1:AC:AD:17:57:DB:DF:D9:8E:EF:B8:88:97:E1:61:20:04:09:38:0C:15 Fingerprint (SHA1): 71:95:84:6A:74:D2:02:FA:D8:C4:6B:F0:B0:48:01:15:29:F8:AB:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174351 (0x3cb01b8f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:19 2023 Not After : Wed Oct 18 17:46:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:13:6c:86:a3:6c:25:55:80:a6:68:44:9b:74:a2:58: 55:1a:3e:9d:3b:50:f8:97:9c:db:b4:b6:78:17:18:53: 5a:b1:5e:3d:b9:eb:3d:08:d6:6d:37:ad:cb:ef:de:61: e1:dc:4f:bb:0d:68:a8:60:ee:5d:95:07:1d:f2:de:b9: 7e:44:46:cd:29:8c:db:34:03:02:55:6f:0c:f1:72:56: 02:e6:4b:cb:a4:62:49:bf:ba:5a:5e:bc:0f:3c:f4:1b: b4:2e:2e:47:df:02:5d:d1:8c:36:a3:18:f6:d2:a2:97: 21:25:ad:3d:ab:83:dc:6a:26:de:b9:ce:5c:aa:1b:2e: 43:f0:60:03:bb:0e:44:5b:ff:70:d2:5e:48:96:26:05: 78:39:b5:1e:06:28:56:7f:d4:1f:b3:5f:d8:90:1a:92: 16:cb:f5:e8:78:4c:14:78:54:cf:29:34:c5:1e:05:99: 0b:52:10:b8:18:72:ec:24:8a:0a:85:21:38:42:5c:12: f0:d2:e0:f1:4d:ef:0b:12:c7:60:6c:c5:0c:af:ee:c7: 2b:c4:36:7d:e2:19:76:20:37:ab:65:0b:9a:ab:86:83: ce:6d:86:d6:66:77:fa:34:82:22:3c:9b:26:c1:9f:74: ff:7e:ee:d1:1c:58:66:2b:c4:cb:7d:c8:b6:f0:1c:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:29:6e:e3:5c:41:3e:28:a8:cb:f8:40:11:a0:31:0d: 34:f6:49:cb:82:0a:ff:30:2d:2e:fa:3b:1b:1a:6e:b3: b9:7a:1b:5e:d8:93:b1:59:39:2d:96:fc:89:50:85:03: ec:90:da:80:61:41:ee:89:60:8e:54:b5:4a:d1:71:6d: 31:bc:a0:8c:9d:4a:d3:fe:05:0f:71:d6:bf:0c:4e:45: b6:55:09:28:59:99:5a:6e:50:cd:1d:79:32:1a:de:7b: d4:79:04:53:16:06:ba:4b:d9:8d:99:a3:66:7b:f4:5e: d9:8f:a9:ea:d8:12:63:0f:84:fa:25:6d:89:cd:4b:b1: ba:83:83:5c:a8:1d:2e:1b:82:0f:50:79:53:41:a1:68: a2:c3:6c:2e:72:3e:3d:29:be:c5:7b:7a:12:64:d4:52: 30:24:da:b6:a3:3a:0c:4d:a6:80:8c:97:04:98:ca:24: f0:56:1a:cc:43:d7:69:62:99:ab:20:5c:60:cf:35:9e: 4d:24:57:e5:71:d1:3e:5e:e1:2b:03:e6:f9:6c:09:32: 49:0b:d3:d5:93:56:ba:55:f9:da:5d:9f:98:fe:08:d1: 5c:f9:d4:fc:8f:d8:ec:ff:be:98:8c:d2:f6:7e:52:89: 61:70:67:bd:bf:a5:de:f9:ea:20:c6:b6:94:ce:6d:4f Fingerprint (SHA-256): 3F:51:11:0F:0A:9B:6F:C1:AE:3D:2D:7D:AA:31:E8:38:D2:4D:BC:00:A9:3D:C5:76:E7:FD:2F:3C:9C:5D:02:18 Fingerprint (SHA1): 83:FC:45:7A:13:24:9E:35:D3:FB:71:26:01:8B:61:80:E7:7F:39:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174349 (0x3cb01b8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:14 2023 Not After : Wed Oct 18 17:46:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:11:cf:39:e7:67:1b:58:87:ad:96:15:78:b5:06:87: 6b:2d:7c:58:d7:db:46:8a:fc:ff:44:90:a4:95:a2:a5: 52:be:72:db:4b:56:e6:c8:c9:5d:a7:d3:39:85:cc:71: 26:2b:fd:a9:3a:b1:f6:d7:d3:07:ba:2b:d2:2d:d7:34: 07:7a:15:fb:c5:01:ac:37:f9:f4:7e:2b:0e:a1:ab:19: bd:d3:a1:e5:ea:04:a9:1f:90:ae:b1:a7:2b:af:31:ab: 34:4f:4a:5e:48:13:69:94:f3:7c:c0:de:94:89:3c:a5: 74:8b:2d:a1:ed:b5:da:b5:4c:a0:04:8d:11:4b:81:38: 0c:8c:b8:d5:90:4f:f7:24:c7:55:1e:ed:bf:71:da:3a: f5:42:18:6f:45:66:d3:61:26:c9:eb:c0:cc:e9:6e:e1: 82:ac:3e:63:2a:74:c2:0b:f8:35:0a:29:bd:4d:e8:b2: 22:02:c4:02:e4:38:8b:85:d7:32:f8:db:40:31:3a:81: c4:07:3a:20:28:7b:60:0f:89:e3:a2:6f:f0:17:7f:96: 03:7b:bb:f2:f1:49:23:a0:85:18:b2:bc:13:ac:9b:5c: 6c:c3:05:31:6f:89:ef:c5:b1:67:a9:d8:ef:fd:93:61: da:e1:fe:87:ba:c9:a6:17:de:a5:26:83:75:f1:46:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:c0:f2:d9:7b:96:26:25:c3:97:66:64:96:58:bd:a3: 0e:6c:78:87:84:1e:a2:fa:2c:d5:9b:60:f0:26:90:e7: d5:8c:86:de:9d:a5:66:6f:f7:b5:9c:85:ff:c6:08:86: e3:ee:03:8f:29:56:16:e4:14:b9:76:c7:82:24:46:6b: 6b:73:63:bd:3e:40:89:83:9f:e4:71:c9:c9:68:2b:b7: 23:24:07:c6:e1:00:de:85:d0:7e:bc:86:a4:9b:9e:8e: f7:bb:b6:44:25:a3:66:b8:23:84:c3:03:b4:b7:ff:d9: 9c:8b:c0:e0:42:de:72:9f:21:2d:0f:bc:62:1e:d2:30: e3:f8:ba:1c:72:6f:5e:65:36:d9:2c:5a:e6:ba:32:00: ac:d6:a0:d8:25:6b:e9:52:d7:bb:9b:8d:39:fd:62:29: c1:7c:3d:b7:4c:e3:0a:52:6d:00:91:4f:f1:6d:59:3f: cd:ce:1c:a4:86:e8:95:9d:ba:fd:9d:f9:2f:34:35:cd: d6:23:b2:f2:b4:d7:02:6b:41:bf:f9:15:60:8f:8d:27: 61:2a:ec:c0:5b:b9:0d:3c:7a:f0:0f:4b:e4:b6:68:a6: 3a:55:ae:ac:13:d6:d0:b5:be:42:71:74:ee:7f:37:ad: 7a:75:24:04:47:6f:bb:46:3d:a6:25:2b:97:86:62:5b Fingerprint (SHA-256): 1F:AB:71:DE:2C:F5:A8:72:B7:63:29:BE:5F:9A:96:2B:E9:D7:B5:91:DA:F6:2B:7E:CB:21:66:93:95:CC:2A:0C Fingerprint (SHA1): 3D:06:66:F1:AD:AA:79:8A:9F:6F:15:91:5B:07:D6:82:45:17:0C:B9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174350 (0x3cb01b8e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:17 2023 Not After : Wed Oct 18 17:46:17 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:f5:a4:9c:13:c8:90:f3:ee:f2:f0:85:b4:6b:a7:4b: e1:82:8d:ef:18:21:88:51:6a:e1:dc:96:1b:86:7d:de: d5:fd:ab:7e:a5:03:f1:b2:9b:56:94:38:f1:55:31:94: d3:b5:71:63:3c:a4:5e:64:f2:2f:ef:34:8c:fe:06:d8: 25:aa:b8:90:c6:d0:e9:10:aa:b9:f8:96:01:8e:c9:59: ea:eb:70:f1:fc:54:3d:c2:cd:a4:c3:fc:08:18:39:84: 2e:7a:be:45:07:8e:58:6d:cb:ba:77:ab:25:b1:3a:6c: 52:9d:4d:cf:ff:9a:e1:11:16:c0:8e:d7:20:8e:22:ea: 14:19:4b:d7:78:16:69:28:36:85:46:e7:90:a7:9b:c7: e3:a3:6b:58:9f:dc:aa:ba:73:03:fa:17:42:b6:10:9c: 9c:1a:f6:64:8b:f4:ce:61:be:f7:56:1e:47:0d:c5:23: ea:a5:e2:44:4b:03:54:43:01:5f:21:97:8f:ad:95:2d: 6c:4b:85:bc:f6:61:62:26:42:23:4c:ed:98:58:44:7c: 3a:48:47:7e:e4:31:7e:83:1e:2b:16:ce:94:b7:35:ab: a8:f1:04:87:e3:a7:e7:ea:82:ff:98:ee:ff:32:69:54: ec:6e:a6:f4:78:8f:c9:e9:56:0c:51:fa:d9:98:c0:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:4d:91:26:4a:a4:13:b0:08:21:5e:61:a1:e1:a8:03: 06:58:a5:86:9c:79:99:ae:e8:7a:48:39:e4:7e:de:6f: 7f:02:38:75:3c:f2:f1:2a:ab:4b:d1:93:6a:d9:eb:17: 9b:94:54:ca:b9:26:40:50:d3:2a:d9:34:e6:1a:ac:87: 43:81:31:06:1a:87:b5:61:1a:de:e6:3c:ae:16:d7:bc: ed:26:e4:71:f6:a1:29:9e:44:cc:2e:dd:39:2c:74:dc: 55:42:76:77:12:04:3f:75:7e:b6:c3:2d:7c:38:c2:14: 7e:97:70:ad:bd:0b:55:6f:60:7b:7c:65:84:a6:ce:4b: e2:01:d2:49:64:ba:c6:9d:c7:8b:75:68:80:27:d8:06: b4:f6:9a:a8:51:80:03:b1:4b:b8:76:34:bc:4b:1d:45: 3a:0f:89:60:aa:d8:c9:76:c4:af:63:53:b9:b3:a7:89: b5:01:0b:36:6e:89:48:17:d7:4b:38:3f:c0:02:be:df: 5d:aa:bc:a9:39:b1:6b:92:04:95:dd:bb:f2:ea:3a:db: d3:c8:3d:16:0b:57:c0:c1:3b:27:d5:b9:92:2c:8f:5d: c1:94:d0:0a:97:a3:30:9f:79:20:6b:b9:38:b0:dc:f2: 13:83:4b:dc:1a:a0:21:16:2e:3a:e8:85:70:a5:b1:b1 Fingerprint (SHA-256): 5D:71:AA:42:9D:B2:51:B4:B3:62:A0:D1:AC:AD:17:57:DB:DF:D9:8E:EF:B8:88:97:E1:61:20:04:09:38:0C:15 Fingerprint (SHA1): 71:95:84:6A:74:D2:02:FA:D8:C4:6B:F0:B0:48:01:15:29:F8:AB:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174351 (0x3cb01b8f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:19 2023 Not After : Wed Oct 18 17:46:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:13:6c:86:a3:6c:25:55:80:a6:68:44:9b:74:a2:58: 55:1a:3e:9d:3b:50:f8:97:9c:db:b4:b6:78:17:18:53: 5a:b1:5e:3d:b9:eb:3d:08:d6:6d:37:ad:cb:ef:de:61: e1:dc:4f:bb:0d:68:a8:60:ee:5d:95:07:1d:f2:de:b9: 7e:44:46:cd:29:8c:db:34:03:02:55:6f:0c:f1:72:56: 02:e6:4b:cb:a4:62:49:bf:ba:5a:5e:bc:0f:3c:f4:1b: b4:2e:2e:47:df:02:5d:d1:8c:36:a3:18:f6:d2:a2:97: 21:25:ad:3d:ab:83:dc:6a:26:de:b9:ce:5c:aa:1b:2e: 43:f0:60:03:bb:0e:44:5b:ff:70:d2:5e:48:96:26:05: 78:39:b5:1e:06:28:56:7f:d4:1f:b3:5f:d8:90:1a:92: 16:cb:f5:e8:78:4c:14:78:54:cf:29:34:c5:1e:05:99: 0b:52:10:b8:18:72:ec:24:8a:0a:85:21:38:42:5c:12: f0:d2:e0:f1:4d:ef:0b:12:c7:60:6c:c5:0c:af:ee:c7: 2b:c4:36:7d:e2:19:76:20:37:ab:65:0b:9a:ab:86:83: ce:6d:86:d6:66:77:fa:34:82:22:3c:9b:26:c1:9f:74: ff:7e:ee:d1:1c:58:66:2b:c4:cb:7d:c8:b6:f0:1c:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:29:6e:e3:5c:41:3e:28:a8:cb:f8:40:11:a0:31:0d: 34:f6:49:cb:82:0a:ff:30:2d:2e:fa:3b:1b:1a:6e:b3: b9:7a:1b:5e:d8:93:b1:59:39:2d:96:fc:89:50:85:03: ec:90:da:80:61:41:ee:89:60:8e:54:b5:4a:d1:71:6d: 31:bc:a0:8c:9d:4a:d3:fe:05:0f:71:d6:bf:0c:4e:45: b6:55:09:28:59:99:5a:6e:50:cd:1d:79:32:1a:de:7b: d4:79:04:53:16:06:ba:4b:d9:8d:99:a3:66:7b:f4:5e: d9:8f:a9:ea:d8:12:63:0f:84:fa:25:6d:89:cd:4b:b1: ba:83:83:5c:a8:1d:2e:1b:82:0f:50:79:53:41:a1:68: a2:c3:6c:2e:72:3e:3d:29:be:c5:7b:7a:12:64:d4:52: 30:24:da:b6:a3:3a:0c:4d:a6:80:8c:97:04:98:ca:24: f0:56:1a:cc:43:d7:69:62:99:ab:20:5c:60:cf:35:9e: 4d:24:57:e5:71:d1:3e:5e:e1:2b:03:e6:f9:6c:09:32: 49:0b:d3:d5:93:56:ba:55:f9:da:5d:9f:98:fe:08:d1: 5c:f9:d4:fc:8f:d8:ec:ff:be:98:8c:d2:f6:7e:52:89: 61:70:67:bd:bf:a5:de:f9:ea:20:c6:b6:94:ce:6d:4f Fingerprint (SHA-256): 3F:51:11:0F:0A:9B:6F:C1:AE:3D:2D:7D:AA:31:E8:38:D2:4D:BC:00:A9:3D:C5:76:E7:FD:2F:3C:9C:5D:02:18 Fingerprint (SHA1): 83:FC:45:7A:13:24:9E:35:D3:FB:71:26:01:8B:61:80:E7:7F:39:75 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174353 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174354 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174355 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018174356 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018174357 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174353 (0x3cb01b91) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:29 2023 Not After : Wed Oct 18 17:46:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a6:a4:2c:79:f7:fa:f7:63:e9:5a:dc:5c:be:3b:a8: f6:f9:0c:b9:7f:e8:61:f7:67:47:00:c5:6b:30:38:79: 95:2e:8b:6e:1d:0c:e9:8a:b4:1b:82:44:e9:97:29:7c: 3b:a5:07:c4:21:d4:77:30:d8:db:65:28:c0:b9:25:e7: 54:f6:47:65:b0:1c:d2:06:a4:6e:21:a7:2b:aa:b7:55: 3a:c4:8a:55:93:8c:e0:fc:2e:c4:e1:75:d3:b6:0f:8f: d9:05:66:4d:ce:e4:69:db:0b:0a:4b:4a:e8:fa:c5:2b: 23:95:67:74:a7:8a:29:3a:f2:9d:0a:0d:77:3a:d2:95: dc:d5:a1:d9:0c:90:9f:ee:76:48:4d:fe:2b:39:0e:46: 0d:7a:39:d2:bb:f9:3e:f6:42:ad:8f:70:cc:bf:ed:ec: 1a:8e:6a:a2:74:c1:2a:39:3d:a3:a1:3e:0d:c6:d9:49: c7:ba:3f:07:3d:60:c5:df:6c:5a:fd:d5:71:3d:aa:42: c8:f0:b6:29:f4:0a:5e:62:52:ad:6a:e7:b7:b0:d0:05: b3:d0:83:cc:48:cb:86:d3:2f:80:7d:f8:7b:cd:fb:c8: f6:13:45:b7:70:a9:2d:2b:98:24:e4:10:5e:b8:df:22: ed:24:8e:c4:9d:b7:54:ed:d8:bb:e7:cf:fb:1c:c2:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:fd:52:cf:e2:d8:19:5c:b3:34:a5:f8:5b:f4:09:85: b4:2a:cd:b6:f0:e9:7f:ad:f4:85:88:90:50:fc:d2:08: 3c:c0:52:d7:65:15:f3:cb:91:c3:62:ba:a2:fa:33:e4: 19:80:5b:04:c9:6e:80:31:04:42:59:c5:f2:e0:b2:e6: 33:9b:ef:1c:24:a9:85:ec:69:86:9f:e4:97:27:09:26: 40:d0:b7:f5:15:58:ab:bb:ca:3c:b3:42:99:e1:d6:dc: 38:61:97:0c:bc:9d:cf:d0:34:e6:cb:ec:54:ac:19:39: ec:da:a4:9e:59:f6:5d:0a:fb:59:38:41:ec:95:3b:91: 70:14:c4:1e:5d:a8:0d:aa:f1:35:ba:bb:45:d2:f5:a1: 21:db:6e:8f:c1:2f:25:d4:b1:5a:f7:1c:8a:f3:ec:aa: 0b:d7:82:b6:0e:ce:ef:25:0f:4b:32:29:f7:41:7e:95: dd:49:bc:6f:91:67:4e:a1:b1:26:5c:06:b2:d5:bc:35: e7:5a:09:32:8e:7c:b9:9c:e0:97:2e:d4:98:71:f4:15: 1c:d8:c7:8c:da:0e:8b:a7:3e:67:ab:69:19:10:59:18: 50:a0:31:e6:b1:e3:7f:51:b9:17:81:a3:7d:51:09:0d: 2c:b1:89:d7:17:df:7f:13:5e:44:67:23:81:94:f4:1c Fingerprint (SHA-256): D4:7A:A0:F2:C4:00:D5:EB:8F:F1:32:1C:8C:63:E0:58:43:8C:D5:15:86:28:10:44:FA:12:21:3A:11:DA:CA:02 Fingerprint (SHA1): 21:A7:26:A8:0E:10:1E:58:C1:E7:1F:15:A3:5A:6F:FE:71:FD:6D:77 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174354 (0x3cb01b92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:31 2023 Not After : Wed Oct 18 17:46:31 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:bc:f0:62:84:c0:a9:1c:85:70:eb:7b:83:44:54:41: b9:d4:a4:1e:08:95:96:ca:9f:f5:b3:74:01:cf:3a:46: 56:96:a6:1b:62:25:e0:fc:eb:8e:97:78:e0:ea:65:67: 15:1e:8f:5f:08:9c:eb:bb:f8:3f:78:35:09:61:3e:d5: 46:22:ef:f2:92:e2:ef:8a:ca:2f:8f:c3:43:56:f8:a7: c6:ba:f8:79:c2:5c:a3:af:bc:cf:e5:f6:84:0d:fb:25: 0c:1c:35:e8:48:95:09:36:19:3b:18:aa:89:f1:68:35: 37:99:3a:98:f0:cf:e5:b5:40:db:57:1e:bf:7b:7d:5d: 26:3e:aa:46:7b:4e:e8:17:39:c1:6f:bc:92:5e:ce:5e: b5:5f:2d:7f:77:a3:72:f9:17:64:26:ea:17:8d:be:79: e9:7e:5e:2b:0d:17:c4:3a:54:99:ca:2a:8f:e0:9e:a8: f6:2c:7d:45:75:c7:c5:f4:37:ff:c7:75:8b:2d:dd:2b: eb:19:27:45:d0:f7:92:3d:12:e6:3a:4d:7b:d2:c1:44: 88:23:c8:ef:24:cb:91:13:df:90:39:fc:1d:ad:8b:59: e7:2f:03:3a:07:d2:d2:d0:a8:3d:84:ef:07:3f:6d:e6: fe:51:8b:d4:0c:74:c2:55:40:a5:cd:8e:a5:3c:d7:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:b8:25:58:ef:44:18:77:dc:b4:d7:fa:21:ee:c6:13: ea:b5:ee:04:e8:71:b1:24:d7:18:45:b0:13:d5:eb:53: 3b:3f:6f:74:6a:9e:db:4b:38:68:69:c9:6c:a6:81:99: 64:ad:f6:a6:7f:c5:29:e0:c2:7b:04:82:89:1b:2b:3a: d1:93:9e:9b:e8:a0:23:d0:3e:52:83:01:8a:aa:72:22: 22:ed:73:63:a7:c7:6a:c9:7a:6c:25:99:34:12:51:86: aa:2f:c3:ce:a5:c5:97:bc:5a:60:c1:4e:8f:f9:b5:b9: 8e:36:70:97:06:71:80:b9:56:2f:ad:7a:71:7f:22:3c: de:9a:41:8c:38:16:7b:12:e7:00:d5:26:89:45:a4:53: c0:09:81:76:dc:17:57:54:57:07:f7:46:2b:5a:ff:de: 41:3a:d8:17:37:d0:39:b0:c9:53:64:c6:5b:64:32:4d: 87:9e:ca:7c:28:6b:12:b3:00:e9:f2:42:c5:84:69:47: 8f:0b:6e:f7:2f:da:be:5d:8f:d8:a6:e1:84:9a:29:35: 5d:35:31:89:f3:b1:42:c5:22:a6:04:ad:c5:a8:e2:91: 40:0d:37:2b:b5:6d:79:89:c4:77:bc:4f:8c:ee:32:9b: 74:f5:f0:14:ec:a5:ed:59:1a:24:22:9f:e3:98:e4:2c Fingerprint (SHA-256): 0D:BC:91:FD:AB:60:B2:CE:96:AB:50:FF:D5:FC:84:BF:77:9A:B8:5C:D4:78:CE:72:C8:29:71:F4:E3:E7:09:E8 Fingerprint (SHA1): B3:C4:52:3B:B1:0F:4B:BA:53:98:D9:EA:87:BC:FC:C4:D8:63:ED:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174355 (0x3cb01b93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:34 2023 Not After : Wed Oct 18 17:46:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:1a:de:c2:45:32:e4:20:83:3e:6a:2f:cc:87:2e:4c: b6:6b:03:66:81:52:5f:98:63:61:4a:c6:5e:1b:28:12: 58:ca:33:e1:d8:03:54:ec:19:a9:21:42:68:58:ee:07: a9:5d:18:ff:2a:e9:40:06:9d:f9:98:3b:b1:8c:4e:6e: 36:5f:3d:d0:a4:14:68:55:51:6c:85:dc:5f:28:cf:e9: ea:9b:24:c3:36:1b:71:e8:71:80:38:87:09:42:0d:ef: 2f:6b:e7:53:61:b0:e1:c8:96:a1:1c:ae:d2:1c:ea:8d: ea:2c:f9:04:da:86:26:56:44:f3:f9:a7:b0:c4:0f:cb: 06:d7:f9:de:f5:a3:8e:35:90:cd:f4:00:9d:54:88:9c: e1:0e:c6:ea:22:8a:a9:34:87:b3:33:8b:f1:47:34:06: f5:23:65:fa:2d:e1:72:4d:22:f5:10:da:f4:f3:1c:a5: 65:44:cf:0b:3b:9d:ed:38:0d:97:ec:ae:12:f7:1f:33: 1e:c7:6d:b5:0c:03:fa:15:1e:98:52:fc:74:45:41:93: 4c:7a:73:e4:49:58:55:ed:b1:5f:b3:48:41:0f:b3:5c: 4b:82:7f:d6:ea:7d:bb:11:e3:30:5f:73:6e:a2:0c:66: 37:8c:21:b0:93:25:17:8d:06:87:6b:4f:1c:7f:a5:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:b8:03:6b:64:57:6c:b2:9e:74:fa:b1:3d:85:d8:69: 00:69:7f:3b:a8:65:1d:e6:f9:b2:6a:d4:ee:3d:62:24: d8:66:4d:8b:25:3d:1a:60:e9:ad:bf:ab:af:0f:06:04: 87:58:1d:3e:78:7c:e8:1a:93:39:8c:60:0a:30:1d:fb: 59:eb:4f:e4:e6:bf:b6:61:b5:b2:a1:95:c9:4f:ad:5a: bd:53:e8:88:37:4e:af:38:7b:ed:0d:26:d2:85:ca:7e: ba:9f:90:69:f3:39:ea:06:8d:6b:0f:7c:03:f6:84:56: 13:54:5a:91:1b:59:d6:99:98:89:a4:77:d4:10:ca:0c: 01:83:0a:6b:7c:4d:95:a1:8b:3b:6e:41:8c:d6:70:bd: 18:5a:49:b3:2c:2d:c9:e2:61:0f:d2:0b:93:a7:4e:0c: aa:4c:a7:5f:89:01:99:ab:86:8d:91:bf:54:9b:89:ed: c1:1b:aa:ff:69:de:28:be:15:ab:09:94:aa:3a:ab:6a: c6:0c:f7:1c:b6:73:71:4e:d0:96:8e:ee:7f:16:18:b7: b6:3e:90:c6:a1:a3:7c:57:33:35:a9:2e:56:7c:59:05: 7f:35:7e:25:7f:d1:78:06:38:6a:ae:98:e4:31:33:e7: 9a:a9:4c:4d:f0:bb:4c:9f:74:f0:47:a4:1e:28:69:71 Fingerprint (SHA-256): 3E:47:F6:10:9E:8C:BD:2D:2E:0E:30:18:F5:D0:76:69:7F:CF:35:AF:7D:54:24:57:1B:E6:26:AE:E1:73:FC:E1 Fingerprint (SHA1): C8:90:F8:9B:A1:31:C3:C6:D6:E5:E8:6F:52:F8:DC:D5:52:B7:4A:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174353 (0x3cb01b91) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:29 2023 Not After : Wed Oct 18 17:46:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a6:a4:2c:79:f7:fa:f7:63:e9:5a:dc:5c:be:3b:a8: f6:f9:0c:b9:7f:e8:61:f7:67:47:00:c5:6b:30:38:79: 95:2e:8b:6e:1d:0c:e9:8a:b4:1b:82:44:e9:97:29:7c: 3b:a5:07:c4:21:d4:77:30:d8:db:65:28:c0:b9:25:e7: 54:f6:47:65:b0:1c:d2:06:a4:6e:21:a7:2b:aa:b7:55: 3a:c4:8a:55:93:8c:e0:fc:2e:c4:e1:75:d3:b6:0f:8f: d9:05:66:4d:ce:e4:69:db:0b:0a:4b:4a:e8:fa:c5:2b: 23:95:67:74:a7:8a:29:3a:f2:9d:0a:0d:77:3a:d2:95: dc:d5:a1:d9:0c:90:9f:ee:76:48:4d:fe:2b:39:0e:46: 0d:7a:39:d2:bb:f9:3e:f6:42:ad:8f:70:cc:bf:ed:ec: 1a:8e:6a:a2:74:c1:2a:39:3d:a3:a1:3e:0d:c6:d9:49: c7:ba:3f:07:3d:60:c5:df:6c:5a:fd:d5:71:3d:aa:42: c8:f0:b6:29:f4:0a:5e:62:52:ad:6a:e7:b7:b0:d0:05: b3:d0:83:cc:48:cb:86:d3:2f:80:7d:f8:7b:cd:fb:c8: f6:13:45:b7:70:a9:2d:2b:98:24:e4:10:5e:b8:df:22: ed:24:8e:c4:9d:b7:54:ed:d8:bb:e7:cf:fb:1c:c2:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:fd:52:cf:e2:d8:19:5c:b3:34:a5:f8:5b:f4:09:85: b4:2a:cd:b6:f0:e9:7f:ad:f4:85:88:90:50:fc:d2:08: 3c:c0:52:d7:65:15:f3:cb:91:c3:62:ba:a2:fa:33:e4: 19:80:5b:04:c9:6e:80:31:04:42:59:c5:f2:e0:b2:e6: 33:9b:ef:1c:24:a9:85:ec:69:86:9f:e4:97:27:09:26: 40:d0:b7:f5:15:58:ab:bb:ca:3c:b3:42:99:e1:d6:dc: 38:61:97:0c:bc:9d:cf:d0:34:e6:cb:ec:54:ac:19:39: ec:da:a4:9e:59:f6:5d:0a:fb:59:38:41:ec:95:3b:91: 70:14:c4:1e:5d:a8:0d:aa:f1:35:ba:bb:45:d2:f5:a1: 21:db:6e:8f:c1:2f:25:d4:b1:5a:f7:1c:8a:f3:ec:aa: 0b:d7:82:b6:0e:ce:ef:25:0f:4b:32:29:f7:41:7e:95: dd:49:bc:6f:91:67:4e:a1:b1:26:5c:06:b2:d5:bc:35: e7:5a:09:32:8e:7c:b9:9c:e0:97:2e:d4:98:71:f4:15: 1c:d8:c7:8c:da:0e:8b:a7:3e:67:ab:69:19:10:59:18: 50:a0:31:e6:b1:e3:7f:51:b9:17:81:a3:7d:51:09:0d: 2c:b1:89:d7:17:df:7f:13:5e:44:67:23:81:94:f4:1c Fingerprint (SHA-256): D4:7A:A0:F2:C4:00:D5:EB:8F:F1:32:1C:8C:63:E0:58:43:8C:D5:15:86:28:10:44:FA:12:21:3A:11:DA:CA:02 Fingerprint (SHA1): 21:A7:26:A8:0E:10:1E:58:C1:E7:1F:15:A3:5A:6F:FE:71:FD:6D:77 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174354 (0x3cb01b92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:31 2023 Not After : Wed Oct 18 17:46:31 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:bc:f0:62:84:c0:a9:1c:85:70:eb:7b:83:44:54:41: b9:d4:a4:1e:08:95:96:ca:9f:f5:b3:74:01:cf:3a:46: 56:96:a6:1b:62:25:e0:fc:eb:8e:97:78:e0:ea:65:67: 15:1e:8f:5f:08:9c:eb:bb:f8:3f:78:35:09:61:3e:d5: 46:22:ef:f2:92:e2:ef:8a:ca:2f:8f:c3:43:56:f8:a7: c6:ba:f8:79:c2:5c:a3:af:bc:cf:e5:f6:84:0d:fb:25: 0c:1c:35:e8:48:95:09:36:19:3b:18:aa:89:f1:68:35: 37:99:3a:98:f0:cf:e5:b5:40:db:57:1e:bf:7b:7d:5d: 26:3e:aa:46:7b:4e:e8:17:39:c1:6f:bc:92:5e:ce:5e: b5:5f:2d:7f:77:a3:72:f9:17:64:26:ea:17:8d:be:79: e9:7e:5e:2b:0d:17:c4:3a:54:99:ca:2a:8f:e0:9e:a8: f6:2c:7d:45:75:c7:c5:f4:37:ff:c7:75:8b:2d:dd:2b: eb:19:27:45:d0:f7:92:3d:12:e6:3a:4d:7b:d2:c1:44: 88:23:c8:ef:24:cb:91:13:df:90:39:fc:1d:ad:8b:59: e7:2f:03:3a:07:d2:d2:d0:a8:3d:84:ef:07:3f:6d:e6: fe:51:8b:d4:0c:74:c2:55:40:a5:cd:8e:a5:3c:d7:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:b8:25:58:ef:44:18:77:dc:b4:d7:fa:21:ee:c6:13: ea:b5:ee:04:e8:71:b1:24:d7:18:45:b0:13:d5:eb:53: 3b:3f:6f:74:6a:9e:db:4b:38:68:69:c9:6c:a6:81:99: 64:ad:f6:a6:7f:c5:29:e0:c2:7b:04:82:89:1b:2b:3a: d1:93:9e:9b:e8:a0:23:d0:3e:52:83:01:8a:aa:72:22: 22:ed:73:63:a7:c7:6a:c9:7a:6c:25:99:34:12:51:86: aa:2f:c3:ce:a5:c5:97:bc:5a:60:c1:4e:8f:f9:b5:b9: 8e:36:70:97:06:71:80:b9:56:2f:ad:7a:71:7f:22:3c: de:9a:41:8c:38:16:7b:12:e7:00:d5:26:89:45:a4:53: c0:09:81:76:dc:17:57:54:57:07:f7:46:2b:5a:ff:de: 41:3a:d8:17:37:d0:39:b0:c9:53:64:c6:5b:64:32:4d: 87:9e:ca:7c:28:6b:12:b3:00:e9:f2:42:c5:84:69:47: 8f:0b:6e:f7:2f:da:be:5d:8f:d8:a6:e1:84:9a:29:35: 5d:35:31:89:f3:b1:42:c5:22:a6:04:ad:c5:a8:e2:91: 40:0d:37:2b:b5:6d:79:89:c4:77:bc:4f:8c:ee:32:9b: 74:f5:f0:14:ec:a5:ed:59:1a:24:22:9f:e3:98:e4:2c Fingerprint (SHA-256): 0D:BC:91:FD:AB:60:B2:CE:96:AB:50:FF:D5:FC:84:BF:77:9A:B8:5C:D4:78:CE:72:C8:29:71:F4:E3:E7:09:E8 Fingerprint (SHA1): B3:C4:52:3B:B1:0F:4B:BA:53:98:D9:EA:87:BC:FC:C4:D8:63:ED:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174355 (0x3cb01b93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:34 2023 Not After : Wed Oct 18 17:46:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:1a:de:c2:45:32:e4:20:83:3e:6a:2f:cc:87:2e:4c: b6:6b:03:66:81:52:5f:98:63:61:4a:c6:5e:1b:28:12: 58:ca:33:e1:d8:03:54:ec:19:a9:21:42:68:58:ee:07: a9:5d:18:ff:2a:e9:40:06:9d:f9:98:3b:b1:8c:4e:6e: 36:5f:3d:d0:a4:14:68:55:51:6c:85:dc:5f:28:cf:e9: ea:9b:24:c3:36:1b:71:e8:71:80:38:87:09:42:0d:ef: 2f:6b:e7:53:61:b0:e1:c8:96:a1:1c:ae:d2:1c:ea:8d: ea:2c:f9:04:da:86:26:56:44:f3:f9:a7:b0:c4:0f:cb: 06:d7:f9:de:f5:a3:8e:35:90:cd:f4:00:9d:54:88:9c: e1:0e:c6:ea:22:8a:a9:34:87:b3:33:8b:f1:47:34:06: f5:23:65:fa:2d:e1:72:4d:22:f5:10:da:f4:f3:1c:a5: 65:44:cf:0b:3b:9d:ed:38:0d:97:ec:ae:12:f7:1f:33: 1e:c7:6d:b5:0c:03:fa:15:1e:98:52:fc:74:45:41:93: 4c:7a:73:e4:49:58:55:ed:b1:5f:b3:48:41:0f:b3:5c: 4b:82:7f:d6:ea:7d:bb:11:e3:30:5f:73:6e:a2:0c:66: 37:8c:21:b0:93:25:17:8d:06:87:6b:4f:1c:7f:a5:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:b8:03:6b:64:57:6c:b2:9e:74:fa:b1:3d:85:d8:69: 00:69:7f:3b:a8:65:1d:e6:f9:b2:6a:d4:ee:3d:62:24: d8:66:4d:8b:25:3d:1a:60:e9:ad:bf:ab:af:0f:06:04: 87:58:1d:3e:78:7c:e8:1a:93:39:8c:60:0a:30:1d:fb: 59:eb:4f:e4:e6:bf:b6:61:b5:b2:a1:95:c9:4f:ad:5a: bd:53:e8:88:37:4e:af:38:7b:ed:0d:26:d2:85:ca:7e: ba:9f:90:69:f3:39:ea:06:8d:6b:0f:7c:03:f6:84:56: 13:54:5a:91:1b:59:d6:99:98:89:a4:77:d4:10:ca:0c: 01:83:0a:6b:7c:4d:95:a1:8b:3b:6e:41:8c:d6:70:bd: 18:5a:49:b3:2c:2d:c9:e2:61:0f:d2:0b:93:a7:4e:0c: aa:4c:a7:5f:89:01:99:ab:86:8d:91:bf:54:9b:89:ed: c1:1b:aa:ff:69:de:28:be:15:ab:09:94:aa:3a:ab:6a: c6:0c:f7:1c:b6:73:71:4e:d0:96:8e:ee:7f:16:18:b7: b6:3e:90:c6:a1:a3:7c:57:33:35:a9:2e:56:7c:59:05: 7f:35:7e:25:7f:d1:78:06:38:6a:ae:98:e4:31:33:e7: 9a:a9:4c:4d:f0:bb:4c:9f:74:f0:47:a4:1e:28:69:71 Fingerprint (SHA-256): 3E:47:F6:10:9E:8C:BD:2D:2E:0E:30:18:F5:D0:76:69:7F:CF:35:AF:7D:54:24:57:1B:E6:26:AE:E1:73:FC:E1 Fingerprint (SHA1): C8:90:F8:9B:A1:31:C3:C6:D6:E5:E8:6F:52:F8:DC:D5:52:B7:4A:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174353 (0x3cb01b91) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:29 2023 Not After : Wed Oct 18 17:46:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a6:a4:2c:79:f7:fa:f7:63:e9:5a:dc:5c:be:3b:a8: f6:f9:0c:b9:7f:e8:61:f7:67:47:00:c5:6b:30:38:79: 95:2e:8b:6e:1d:0c:e9:8a:b4:1b:82:44:e9:97:29:7c: 3b:a5:07:c4:21:d4:77:30:d8:db:65:28:c0:b9:25:e7: 54:f6:47:65:b0:1c:d2:06:a4:6e:21:a7:2b:aa:b7:55: 3a:c4:8a:55:93:8c:e0:fc:2e:c4:e1:75:d3:b6:0f:8f: d9:05:66:4d:ce:e4:69:db:0b:0a:4b:4a:e8:fa:c5:2b: 23:95:67:74:a7:8a:29:3a:f2:9d:0a:0d:77:3a:d2:95: dc:d5:a1:d9:0c:90:9f:ee:76:48:4d:fe:2b:39:0e:46: 0d:7a:39:d2:bb:f9:3e:f6:42:ad:8f:70:cc:bf:ed:ec: 1a:8e:6a:a2:74:c1:2a:39:3d:a3:a1:3e:0d:c6:d9:49: c7:ba:3f:07:3d:60:c5:df:6c:5a:fd:d5:71:3d:aa:42: c8:f0:b6:29:f4:0a:5e:62:52:ad:6a:e7:b7:b0:d0:05: b3:d0:83:cc:48:cb:86:d3:2f:80:7d:f8:7b:cd:fb:c8: f6:13:45:b7:70:a9:2d:2b:98:24:e4:10:5e:b8:df:22: ed:24:8e:c4:9d:b7:54:ed:d8:bb:e7:cf:fb:1c:c2:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:fd:52:cf:e2:d8:19:5c:b3:34:a5:f8:5b:f4:09:85: b4:2a:cd:b6:f0:e9:7f:ad:f4:85:88:90:50:fc:d2:08: 3c:c0:52:d7:65:15:f3:cb:91:c3:62:ba:a2:fa:33:e4: 19:80:5b:04:c9:6e:80:31:04:42:59:c5:f2:e0:b2:e6: 33:9b:ef:1c:24:a9:85:ec:69:86:9f:e4:97:27:09:26: 40:d0:b7:f5:15:58:ab:bb:ca:3c:b3:42:99:e1:d6:dc: 38:61:97:0c:bc:9d:cf:d0:34:e6:cb:ec:54:ac:19:39: ec:da:a4:9e:59:f6:5d:0a:fb:59:38:41:ec:95:3b:91: 70:14:c4:1e:5d:a8:0d:aa:f1:35:ba:bb:45:d2:f5:a1: 21:db:6e:8f:c1:2f:25:d4:b1:5a:f7:1c:8a:f3:ec:aa: 0b:d7:82:b6:0e:ce:ef:25:0f:4b:32:29:f7:41:7e:95: dd:49:bc:6f:91:67:4e:a1:b1:26:5c:06:b2:d5:bc:35: e7:5a:09:32:8e:7c:b9:9c:e0:97:2e:d4:98:71:f4:15: 1c:d8:c7:8c:da:0e:8b:a7:3e:67:ab:69:19:10:59:18: 50:a0:31:e6:b1:e3:7f:51:b9:17:81:a3:7d:51:09:0d: 2c:b1:89:d7:17:df:7f:13:5e:44:67:23:81:94:f4:1c Fingerprint (SHA-256): D4:7A:A0:F2:C4:00:D5:EB:8F:F1:32:1C:8C:63:E0:58:43:8C:D5:15:86:28:10:44:FA:12:21:3A:11:DA:CA:02 Fingerprint (SHA1): 21:A7:26:A8:0E:10:1E:58:C1:E7:1F:15:A3:5A:6F:FE:71:FD:6D:77 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174353 (0x3cb01b91) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:29 2023 Not After : Wed Oct 18 17:46:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a6:a4:2c:79:f7:fa:f7:63:e9:5a:dc:5c:be:3b:a8: f6:f9:0c:b9:7f:e8:61:f7:67:47:00:c5:6b:30:38:79: 95:2e:8b:6e:1d:0c:e9:8a:b4:1b:82:44:e9:97:29:7c: 3b:a5:07:c4:21:d4:77:30:d8:db:65:28:c0:b9:25:e7: 54:f6:47:65:b0:1c:d2:06:a4:6e:21:a7:2b:aa:b7:55: 3a:c4:8a:55:93:8c:e0:fc:2e:c4:e1:75:d3:b6:0f:8f: d9:05:66:4d:ce:e4:69:db:0b:0a:4b:4a:e8:fa:c5:2b: 23:95:67:74:a7:8a:29:3a:f2:9d:0a:0d:77:3a:d2:95: dc:d5:a1:d9:0c:90:9f:ee:76:48:4d:fe:2b:39:0e:46: 0d:7a:39:d2:bb:f9:3e:f6:42:ad:8f:70:cc:bf:ed:ec: 1a:8e:6a:a2:74:c1:2a:39:3d:a3:a1:3e:0d:c6:d9:49: c7:ba:3f:07:3d:60:c5:df:6c:5a:fd:d5:71:3d:aa:42: c8:f0:b6:29:f4:0a:5e:62:52:ad:6a:e7:b7:b0:d0:05: b3:d0:83:cc:48:cb:86:d3:2f:80:7d:f8:7b:cd:fb:c8: f6:13:45:b7:70:a9:2d:2b:98:24:e4:10:5e:b8:df:22: ed:24:8e:c4:9d:b7:54:ed:d8:bb:e7:cf:fb:1c:c2:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:fd:52:cf:e2:d8:19:5c:b3:34:a5:f8:5b:f4:09:85: b4:2a:cd:b6:f0:e9:7f:ad:f4:85:88:90:50:fc:d2:08: 3c:c0:52:d7:65:15:f3:cb:91:c3:62:ba:a2:fa:33:e4: 19:80:5b:04:c9:6e:80:31:04:42:59:c5:f2:e0:b2:e6: 33:9b:ef:1c:24:a9:85:ec:69:86:9f:e4:97:27:09:26: 40:d0:b7:f5:15:58:ab:bb:ca:3c:b3:42:99:e1:d6:dc: 38:61:97:0c:bc:9d:cf:d0:34:e6:cb:ec:54:ac:19:39: ec:da:a4:9e:59:f6:5d:0a:fb:59:38:41:ec:95:3b:91: 70:14:c4:1e:5d:a8:0d:aa:f1:35:ba:bb:45:d2:f5:a1: 21:db:6e:8f:c1:2f:25:d4:b1:5a:f7:1c:8a:f3:ec:aa: 0b:d7:82:b6:0e:ce:ef:25:0f:4b:32:29:f7:41:7e:95: dd:49:bc:6f:91:67:4e:a1:b1:26:5c:06:b2:d5:bc:35: e7:5a:09:32:8e:7c:b9:9c:e0:97:2e:d4:98:71:f4:15: 1c:d8:c7:8c:da:0e:8b:a7:3e:67:ab:69:19:10:59:18: 50:a0:31:e6:b1:e3:7f:51:b9:17:81:a3:7d:51:09:0d: 2c:b1:89:d7:17:df:7f:13:5e:44:67:23:81:94:f4:1c Fingerprint (SHA-256): D4:7A:A0:F2:C4:00:D5:EB:8F:F1:32:1C:8C:63:E0:58:43:8C:D5:15:86:28:10:44:FA:12:21:3A:11:DA:CA:02 Fingerprint (SHA1): 21:A7:26:A8:0E:10:1E:58:C1:E7:1F:15:A3:5A:6F:FE:71:FD:6D:77 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174354 (0x3cb01b92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:31 2023 Not After : Wed Oct 18 17:46:31 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:bc:f0:62:84:c0:a9:1c:85:70:eb:7b:83:44:54:41: b9:d4:a4:1e:08:95:96:ca:9f:f5:b3:74:01:cf:3a:46: 56:96:a6:1b:62:25:e0:fc:eb:8e:97:78:e0:ea:65:67: 15:1e:8f:5f:08:9c:eb:bb:f8:3f:78:35:09:61:3e:d5: 46:22:ef:f2:92:e2:ef:8a:ca:2f:8f:c3:43:56:f8:a7: c6:ba:f8:79:c2:5c:a3:af:bc:cf:e5:f6:84:0d:fb:25: 0c:1c:35:e8:48:95:09:36:19:3b:18:aa:89:f1:68:35: 37:99:3a:98:f0:cf:e5:b5:40:db:57:1e:bf:7b:7d:5d: 26:3e:aa:46:7b:4e:e8:17:39:c1:6f:bc:92:5e:ce:5e: b5:5f:2d:7f:77:a3:72:f9:17:64:26:ea:17:8d:be:79: e9:7e:5e:2b:0d:17:c4:3a:54:99:ca:2a:8f:e0:9e:a8: f6:2c:7d:45:75:c7:c5:f4:37:ff:c7:75:8b:2d:dd:2b: eb:19:27:45:d0:f7:92:3d:12:e6:3a:4d:7b:d2:c1:44: 88:23:c8:ef:24:cb:91:13:df:90:39:fc:1d:ad:8b:59: e7:2f:03:3a:07:d2:d2:d0:a8:3d:84:ef:07:3f:6d:e6: fe:51:8b:d4:0c:74:c2:55:40:a5:cd:8e:a5:3c:d7:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:b8:25:58:ef:44:18:77:dc:b4:d7:fa:21:ee:c6:13: ea:b5:ee:04:e8:71:b1:24:d7:18:45:b0:13:d5:eb:53: 3b:3f:6f:74:6a:9e:db:4b:38:68:69:c9:6c:a6:81:99: 64:ad:f6:a6:7f:c5:29:e0:c2:7b:04:82:89:1b:2b:3a: d1:93:9e:9b:e8:a0:23:d0:3e:52:83:01:8a:aa:72:22: 22:ed:73:63:a7:c7:6a:c9:7a:6c:25:99:34:12:51:86: aa:2f:c3:ce:a5:c5:97:bc:5a:60:c1:4e:8f:f9:b5:b9: 8e:36:70:97:06:71:80:b9:56:2f:ad:7a:71:7f:22:3c: de:9a:41:8c:38:16:7b:12:e7:00:d5:26:89:45:a4:53: c0:09:81:76:dc:17:57:54:57:07:f7:46:2b:5a:ff:de: 41:3a:d8:17:37:d0:39:b0:c9:53:64:c6:5b:64:32:4d: 87:9e:ca:7c:28:6b:12:b3:00:e9:f2:42:c5:84:69:47: 8f:0b:6e:f7:2f:da:be:5d:8f:d8:a6:e1:84:9a:29:35: 5d:35:31:89:f3:b1:42:c5:22:a6:04:ad:c5:a8:e2:91: 40:0d:37:2b:b5:6d:79:89:c4:77:bc:4f:8c:ee:32:9b: 74:f5:f0:14:ec:a5:ed:59:1a:24:22:9f:e3:98:e4:2c Fingerprint (SHA-256): 0D:BC:91:FD:AB:60:B2:CE:96:AB:50:FF:D5:FC:84:BF:77:9A:B8:5C:D4:78:CE:72:C8:29:71:F4:E3:E7:09:E8 Fingerprint (SHA1): B3:C4:52:3B:B1:0F:4B:BA:53:98:D9:EA:87:BC:FC:C4:D8:63:ED:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174354 (0x3cb01b92) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:46:31 2023 Not After : Wed Oct 18 17:46:31 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:bc:f0:62:84:c0:a9:1c:85:70:eb:7b:83:44:54:41: b9:d4:a4:1e:08:95:96:ca:9f:f5:b3:74:01:cf:3a:46: 56:96:a6:1b:62:25:e0:fc:eb:8e:97:78:e0:ea:65:67: 15:1e:8f:5f:08:9c:eb:bb:f8:3f:78:35:09:61:3e:d5: 46:22:ef:f2:92:e2:ef:8a:ca:2f:8f:c3:43:56:f8:a7: c6:ba:f8:79:c2:5c:a3:af:bc:cf:e5:f6:84:0d:fb:25: 0c:1c:35:e8:48:95:09:36:19:3b:18:aa:89:f1:68:35: 37:99:3a:98:f0:cf:e5:b5:40:db:57:1e:bf:7b:7d:5d: 26:3e:aa:46:7b:4e:e8:17:39:c1:6f:bc:92:5e:ce:5e: b5:5f:2d:7f:77:a3:72:f9:17:64:26:ea:17:8d:be:79: e9:7e:5e:2b:0d:17:c4:3a:54:99:ca:2a:8f:e0:9e:a8: f6:2c:7d:45:75:c7:c5:f4:37:ff:c7:75:8b:2d:dd:2b: eb:19:27:45:d0:f7:92:3d:12:e6:3a:4d:7b:d2:c1:44: 88:23:c8:ef:24:cb:91:13:df:90:39:fc:1d:ad:8b:59: e7:2f:03:3a:07:d2:d2:d0:a8:3d:84:ef:07:3f:6d:e6: fe:51:8b:d4:0c:74:c2:55:40:a5:cd:8e:a5:3c:d7:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:b8:25:58:ef:44:18:77:dc:b4:d7:fa:21:ee:c6:13: ea:b5:ee:04:e8:71:b1:24:d7:18:45:b0:13:d5:eb:53: 3b:3f:6f:74:6a:9e:db:4b:38:68:69:c9:6c:a6:81:99: 64:ad:f6:a6:7f:c5:29:e0:c2:7b:04:82:89:1b:2b:3a: d1:93:9e:9b:e8:a0:23:d0:3e:52:83:01:8a:aa:72:22: 22:ed:73:63:a7:c7:6a:c9:7a:6c:25:99:34:12:51:86: aa:2f:c3:ce:a5:c5:97:bc:5a:60:c1:4e:8f:f9:b5:b9: 8e:36:70:97:06:71:80:b9:56:2f:ad:7a:71:7f:22:3c: de:9a:41:8c:38:16:7b:12:e7:00:d5:26:89:45:a4:53: c0:09:81:76:dc:17:57:54:57:07:f7:46:2b:5a:ff:de: 41:3a:d8:17:37:d0:39:b0:c9:53:64:c6:5b:64:32:4d: 87:9e:ca:7c:28:6b:12:b3:00:e9:f2:42:c5:84:69:47: 8f:0b:6e:f7:2f:da:be:5d:8f:d8:a6:e1:84:9a:29:35: 5d:35:31:89:f3:b1:42:c5:22:a6:04:ad:c5:a8:e2:91: 40:0d:37:2b:b5:6d:79:89:c4:77:bc:4f:8c:ee:32:9b: 74:f5:f0:14:ec:a5:ed:59:1a:24:22:9f:e3:98:e4:2c Fingerprint (SHA-256): 0D:BC:91:FD:AB:60:B2:CE:96:AB:50:FF:D5:FC:84:BF:77:9A:B8:5C:D4:78:CE:72:C8:29:71:F4:E3:E7:09:E8 Fingerprint (SHA1): B3:C4:52:3B:B1:0F:4B:BA:53:98:D9:EA:87:BC:FC:C4:D8:63:ED:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174355 (0x3cb01b93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:34 2023 Not After : Wed Oct 18 17:46:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:1a:de:c2:45:32:e4:20:83:3e:6a:2f:cc:87:2e:4c: b6:6b:03:66:81:52:5f:98:63:61:4a:c6:5e:1b:28:12: 58:ca:33:e1:d8:03:54:ec:19:a9:21:42:68:58:ee:07: a9:5d:18:ff:2a:e9:40:06:9d:f9:98:3b:b1:8c:4e:6e: 36:5f:3d:d0:a4:14:68:55:51:6c:85:dc:5f:28:cf:e9: ea:9b:24:c3:36:1b:71:e8:71:80:38:87:09:42:0d:ef: 2f:6b:e7:53:61:b0:e1:c8:96:a1:1c:ae:d2:1c:ea:8d: ea:2c:f9:04:da:86:26:56:44:f3:f9:a7:b0:c4:0f:cb: 06:d7:f9:de:f5:a3:8e:35:90:cd:f4:00:9d:54:88:9c: e1:0e:c6:ea:22:8a:a9:34:87:b3:33:8b:f1:47:34:06: f5:23:65:fa:2d:e1:72:4d:22:f5:10:da:f4:f3:1c:a5: 65:44:cf:0b:3b:9d:ed:38:0d:97:ec:ae:12:f7:1f:33: 1e:c7:6d:b5:0c:03:fa:15:1e:98:52:fc:74:45:41:93: 4c:7a:73:e4:49:58:55:ed:b1:5f:b3:48:41:0f:b3:5c: 4b:82:7f:d6:ea:7d:bb:11:e3:30:5f:73:6e:a2:0c:66: 37:8c:21:b0:93:25:17:8d:06:87:6b:4f:1c:7f:a5:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:b8:03:6b:64:57:6c:b2:9e:74:fa:b1:3d:85:d8:69: 00:69:7f:3b:a8:65:1d:e6:f9:b2:6a:d4:ee:3d:62:24: d8:66:4d:8b:25:3d:1a:60:e9:ad:bf:ab:af:0f:06:04: 87:58:1d:3e:78:7c:e8:1a:93:39:8c:60:0a:30:1d:fb: 59:eb:4f:e4:e6:bf:b6:61:b5:b2:a1:95:c9:4f:ad:5a: bd:53:e8:88:37:4e:af:38:7b:ed:0d:26:d2:85:ca:7e: ba:9f:90:69:f3:39:ea:06:8d:6b:0f:7c:03:f6:84:56: 13:54:5a:91:1b:59:d6:99:98:89:a4:77:d4:10:ca:0c: 01:83:0a:6b:7c:4d:95:a1:8b:3b:6e:41:8c:d6:70:bd: 18:5a:49:b3:2c:2d:c9:e2:61:0f:d2:0b:93:a7:4e:0c: aa:4c:a7:5f:89:01:99:ab:86:8d:91:bf:54:9b:89:ed: c1:1b:aa:ff:69:de:28:be:15:ab:09:94:aa:3a:ab:6a: c6:0c:f7:1c:b6:73:71:4e:d0:96:8e:ee:7f:16:18:b7: b6:3e:90:c6:a1:a3:7c:57:33:35:a9:2e:56:7c:59:05: 7f:35:7e:25:7f:d1:78:06:38:6a:ae:98:e4:31:33:e7: 9a:a9:4c:4d:f0:bb:4c:9f:74:f0:47:a4:1e:28:69:71 Fingerprint (SHA-256): 3E:47:F6:10:9E:8C:BD:2D:2E:0E:30:18:F5:D0:76:69:7F:CF:35:AF:7D:54:24:57:1B:E6:26:AE:E1:73:FC:E1 Fingerprint (SHA1): C8:90:F8:9B:A1:31:C3:C6:D6:E5:E8:6F:52:F8:DC:D5:52:B7:4A:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174355 (0x3cb01b93) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:46:34 2023 Not After : Wed Oct 18 17:46:34 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:1a:de:c2:45:32:e4:20:83:3e:6a:2f:cc:87:2e:4c: b6:6b:03:66:81:52:5f:98:63:61:4a:c6:5e:1b:28:12: 58:ca:33:e1:d8:03:54:ec:19:a9:21:42:68:58:ee:07: a9:5d:18:ff:2a:e9:40:06:9d:f9:98:3b:b1:8c:4e:6e: 36:5f:3d:d0:a4:14:68:55:51:6c:85:dc:5f:28:cf:e9: ea:9b:24:c3:36:1b:71:e8:71:80:38:87:09:42:0d:ef: 2f:6b:e7:53:61:b0:e1:c8:96:a1:1c:ae:d2:1c:ea:8d: ea:2c:f9:04:da:86:26:56:44:f3:f9:a7:b0:c4:0f:cb: 06:d7:f9:de:f5:a3:8e:35:90:cd:f4:00:9d:54:88:9c: e1:0e:c6:ea:22:8a:a9:34:87:b3:33:8b:f1:47:34:06: f5:23:65:fa:2d:e1:72:4d:22:f5:10:da:f4:f3:1c:a5: 65:44:cf:0b:3b:9d:ed:38:0d:97:ec:ae:12:f7:1f:33: 1e:c7:6d:b5:0c:03:fa:15:1e:98:52:fc:74:45:41:93: 4c:7a:73:e4:49:58:55:ed:b1:5f:b3:48:41:0f:b3:5c: 4b:82:7f:d6:ea:7d:bb:11:e3:30:5f:73:6e:a2:0c:66: 37:8c:21:b0:93:25:17:8d:06:87:6b:4f:1c:7f:a5:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:b8:03:6b:64:57:6c:b2:9e:74:fa:b1:3d:85:d8:69: 00:69:7f:3b:a8:65:1d:e6:f9:b2:6a:d4:ee:3d:62:24: d8:66:4d:8b:25:3d:1a:60:e9:ad:bf:ab:af:0f:06:04: 87:58:1d:3e:78:7c:e8:1a:93:39:8c:60:0a:30:1d:fb: 59:eb:4f:e4:e6:bf:b6:61:b5:b2:a1:95:c9:4f:ad:5a: bd:53:e8:88:37:4e:af:38:7b:ed:0d:26:d2:85:ca:7e: ba:9f:90:69:f3:39:ea:06:8d:6b:0f:7c:03:f6:84:56: 13:54:5a:91:1b:59:d6:99:98:89:a4:77:d4:10:ca:0c: 01:83:0a:6b:7c:4d:95:a1:8b:3b:6e:41:8c:d6:70:bd: 18:5a:49:b3:2c:2d:c9:e2:61:0f:d2:0b:93:a7:4e:0c: aa:4c:a7:5f:89:01:99:ab:86:8d:91:bf:54:9b:89:ed: c1:1b:aa:ff:69:de:28:be:15:ab:09:94:aa:3a:ab:6a: c6:0c:f7:1c:b6:73:71:4e:d0:96:8e:ee:7f:16:18:b7: b6:3e:90:c6:a1:a3:7c:57:33:35:a9:2e:56:7c:59:05: 7f:35:7e:25:7f:d1:78:06:38:6a:ae:98:e4:31:33:e7: 9a:a9:4c:4d:f0:bb:4c:9f:74:f0:47:a4:1e:28:69:71 Fingerprint (SHA-256): 3E:47:F6:10:9E:8C:BD:2D:2E:0E:30:18:F5:D0:76:69:7F:CF:35:AF:7D:54:24:57:1B:E6:26:AE:E1:73:FC:E1 Fingerprint (SHA1): C8:90:F8:9B:A1:31:C3:C6:D6:E5:E8:6F:52:F8:DC:D5:52:B7:4A:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174358 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174359 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174360 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018174361 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018174362 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018174363 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018174364 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174358 (0x3cb01b96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:46:47 2023 Not After : Wed Oct 18 17:46:47 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:db:1d:dc:e8:74:50:ee:9d:a8:3c:56:4a:e5:27:9d: 27:7f:70:49:d1:19:a5:60:23:98:29:f1:06:23:41:77: d6:73:8b:14:41:e2:3d:bf:5a:d8:4b:e3:cf:4b:23:f2: 79:d5:49:e2:7e:91:a4:57:f3:b2:f5:c1:0d:70:95:9a: 8f:0f:bc:2d:df:36:3e:6e:2b:a4:59:cb:11:39:e0:d6: 45:d9:1a:f3:88:a5:44:2d:86:22:2a:e9:ed:11:4c:12: a6:d7:58:c5:20:a7:f8:e4:55:2c:32:97:a4:77:5a:b5: a9:2a:d6:c8:86:12:42:6b:0c:37:99:7e:e4:ac:c9:16: dc:21:e8:88:d0:21:4a:d7:87:bc:29:f5:fe:6f:e7:5e: 7f:cf:8a:da:f2:c1:d0:f1:4c:5f:fb:e8:34:0e:3a:3e: 10:46:ab:fd:e3:52:b9:db:96:52:84:4f:c5:e2:ff:ec: 25:bd:b3:d1:8b:c5:d5:96:f1:b9:77:34:e6:59:2a:12: d8:47:14:5d:67:d0:96:c6:b1:14:f9:ac:6c:1d:3b:65: a7:73:66:6b:a5:7d:fa:52:12:9c:12:7e:24:f9:c5:d6: 94:b2:26:98:df:4f:32:7a:9a:aa:7f:1d:70:76:2b:d9: 87:ae:09:a6:b0:63:ab:dd:05:13:f4:eb:42:65:89:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:64:30:ac:dc:44:a5:36:ed:17:16:d6:8d:f0:3c:9e: dc:ef:35:2b:54:75:c0:12:1a:f3:aa:d4:20:84:ee:1a: 65:77:69:5e:cb:28:42:65:dd:50:ef:f3:cf:de:f3:64: 22:b1:63:ab:82:26:63:f7:bf:43:dc:f0:5c:39:fd:a6: 72:cb:a1:73:45:a6:39:1c:09:0f:ff:15:95:50:bc:f7: b2:e7:87:83:2d:a9:a3:88:df:7e:7b:c0:a5:43:25:42: 18:fb:99:3a:5b:39:d3:aa:a6:70:b9:25:ae:ab:a5:13: c3:ac:30:7d:f2:d6:55:75:47:f4:87:4c:53:6c:48:8b: 97:d8:e4:ef:23:7a:94:c4:33:e6:19:be:6c:ff:34:97: ec:95:18:2f:46:9d:3a:48:49:66:31:70:8c:49:39:0d: 4e:2c:91:95:4f:f8:a3:b1:41:ce:1e:1d:d9:a6:e0:8d: 17:d2:a5:93:ee:cc:1a:3c:e1:0b:56:db:bd:48:d9:1a: 96:3b:8e:da:1a:98:08:6a:77:b8:aa:ab:5e:5b:24:dc: c9:f6:5f:d6:69:3c:b6:ec:6a:04:51:fd:13:30:ba:15: 29:cc:33:fb:8f:df:81:ff:03:c2:61:fa:9b:29:7d:41: e9:4e:4b:3f:cb:22:c4:45:3c:f7:09:d4:7f:f3:8f:a5 Fingerprint (SHA-256): 8B:7E:A7:98:2B:B2:6B:88:CE:AB:45:F3:CC:E9:90:6B:53:B4:0D:C6:57:C3:DD:8E:41:5B:23:02:3E:3D:49:91 Fingerprint (SHA1): 35:D6:03:ED:25:65:56:07:50:EF:50:7D:89:2F:28:30:16:08:F3:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174358 (0x3cb01b96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:46:47 2023 Not After : Wed Oct 18 17:46:47 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:db:1d:dc:e8:74:50:ee:9d:a8:3c:56:4a:e5:27:9d: 27:7f:70:49:d1:19:a5:60:23:98:29:f1:06:23:41:77: d6:73:8b:14:41:e2:3d:bf:5a:d8:4b:e3:cf:4b:23:f2: 79:d5:49:e2:7e:91:a4:57:f3:b2:f5:c1:0d:70:95:9a: 8f:0f:bc:2d:df:36:3e:6e:2b:a4:59:cb:11:39:e0:d6: 45:d9:1a:f3:88:a5:44:2d:86:22:2a:e9:ed:11:4c:12: a6:d7:58:c5:20:a7:f8:e4:55:2c:32:97:a4:77:5a:b5: a9:2a:d6:c8:86:12:42:6b:0c:37:99:7e:e4:ac:c9:16: dc:21:e8:88:d0:21:4a:d7:87:bc:29:f5:fe:6f:e7:5e: 7f:cf:8a:da:f2:c1:d0:f1:4c:5f:fb:e8:34:0e:3a:3e: 10:46:ab:fd:e3:52:b9:db:96:52:84:4f:c5:e2:ff:ec: 25:bd:b3:d1:8b:c5:d5:96:f1:b9:77:34:e6:59:2a:12: d8:47:14:5d:67:d0:96:c6:b1:14:f9:ac:6c:1d:3b:65: a7:73:66:6b:a5:7d:fa:52:12:9c:12:7e:24:f9:c5:d6: 94:b2:26:98:df:4f:32:7a:9a:aa:7f:1d:70:76:2b:d9: 87:ae:09:a6:b0:63:ab:dd:05:13:f4:eb:42:65:89:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:64:30:ac:dc:44:a5:36:ed:17:16:d6:8d:f0:3c:9e: dc:ef:35:2b:54:75:c0:12:1a:f3:aa:d4:20:84:ee:1a: 65:77:69:5e:cb:28:42:65:dd:50:ef:f3:cf:de:f3:64: 22:b1:63:ab:82:26:63:f7:bf:43:dc:f0:5c:39:fd:a6: 72:cb:a1:73:45:a6:39:1c:09:0f:ff:15:95:50:bc:f7: b2:e7:87:83:2d:a9:a3:88:df:7e:7b:c0:a5:43:25:42: 18:fb:99:3a:5b:39:d3:aa:a6:70:b9:25:ae:ab:a5:13: c3:ac:30:7d:f2:d6:55:75:47:f4:87:4c:53:6c:48:8b: 97:d8:e4:ef:23:7a:94:c4:33:e6:19:be:6c:ff:34:97: ec:95:18:2f:46:9d:3a:48:49:66:31:70:8c:49:39:0d: 4e:2c:91:95:4f:f8:a3:b1:41:ce:1e:1d:d9:a6:e0:8d: 17:d2:a5:93:ee:cc:1a:3c:e1:0b:56:db:bd:48:d9:1a: 96:3b:8e:da:1a:98:08:6a:77:b8:aa:ab:5e:5b:24:dc: c9:f6:5f:d6:69:3c:b6:ec:6a:04:51:fd:13:30:ba:15: 29:cc:33:fb:8f:df:81:ff:03:c2:61:fa:9b:29:7d:41: e9:4e:4b:3f:cb:22:c4:45:3c:f7:09:d4:7f:f3:8f:a5 Fingerprint (SHA-256): 8B:7E:A7:98:2B:B2:6B:88:CE:AB:45:F3:CC:E9:90:6B:53:B4:0D:C6:57:C3:DD:8E:41:5B:23:02:3E:3D:49:91 Fingerprint (SHA1): 35:D6:03:ED:25:65:56:07:50:EF:50:7D:89:2F:28:30:16:08:F3:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174365 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174366 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018174367 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018174368 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018174369 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018174370 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018174371 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018174372 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018174373 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018174374 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018174375 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018174376 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018174377 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018174378 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018174379 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018174380 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018174381 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018174382 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018174383 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018174384 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018174385 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018174386 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018174387 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018174388 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018174389 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018174390 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018174391 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018174392 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018174393 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018174394 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174365 (0x3cb01b9d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:47:08 2023 Not After : Wed Oct 18 17:47:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4c:a7:cd:4c:19:a3:0d:cb:ac:8d:b7:bb:db:e0:97: 25:59:33:a0:c1:13:da:3a:88:65:4b:7a:d5:dc:5a:3f: 7e:62:cc:f9:8f:59:10:e0:ec:08:f5:ca:59:3f:de:f9: d3:8e:89:ce:6e:87:e4:80:c8:84:22:c1:67:3b:4f:ff: 16:2a:82:77:5c:fe:cf:e8:58:a5:e5:f5:f1:45:41:9a: 17:44:41:bf:0e:b4:c6:34:e9:ec:83:fe:28:53:5d:f8: 30:ce:b1:79:d9:03:5a:b1:7e:5b:0e:26:74:bd:85:2c: 10:29:e1:b4:db:e0:68:74:c6:ac:b1:16:e1:3e:d4:f4: 25:46:ad:3c:c0:be:ee:19:c2:4e:cb:d4:d8:0e:4d:a4: 81:3a:d4:cb:be:55:b1:2f:e9:e2:3f:1e:98:68:b6:5a: 66:44:91:62:f3:19:01:e2:67:21:24:2e:33:11:3c:03: 2f:7e:8f:df:6c:b8:6e:e3:6e:c4:c2:7b:f3:ba:2f:46: ac:44:53:f2:88:0f:4e:70:b6:25:2c:3c:8c:bd:65:ca: 26:26:77:19:5f:cb:79:1b:e0:d4:ef:31:0b:f2:d8:f4: 72:e9:0a:95:71:95:d0:0a:ad:c7:04:cd:f1:fd:d9:c4: 7e:ba:80:9f:f0:1e:6a:a1:8c:a2:ea:1c:d0:d7:e9:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:92:bc:31:20:7b:83:88:79:7b:75:38:3a:ad:f3:17: 5a:39:bf:c6:b1:4d:af:1a:dd:14:91:1e:f0:31:aa:61: c9:f9:6b:09:1c:be:f8:47:c9:ee:f8:db:88:53:ad:49: 7b:1a:94:eb:f2:be:29:8b:ab:f3:7c:98:70:7d:73:3f: 3a:ba:09:da:dc:9b:46:29:8d:ec:57:51:64:59:a6:e9: 8f:2e:d9:80:74:20:7f:08:a6:a2:7c:19:05:64:0b:98: 5c:77:38:28:dc:7a:89:ff:3a:b2:39:cf:7c:ee:9a:f2: 1f:03:47:99:a6:fa:30:12:0a:42:9c:e0:dd:42:b6:7a: 0c:28:c7:fb:e3:71:d9:e2:33:fc:b5:65:a9:d0:eb:0d: cc:30:23:ca:53:2d:aa:7f:cd:66:e0:e9:96:7a:d2:c9: c7:3d:07:8d:3a:dd:11:3d:d6:f2:49:c8:4e:52:d2:86: 0b:1b:02:e9:07:41:2b:8d:ff:cd:d3:ec:c1:7b:ad:ac: 20:28:15:01:cf:71:6d:d2:a5:1c:40:1d:0e:d0:7c:32: a4:f7:8c:33:26:b6:48:94:6d:d8:d3:ca:9b:b9:96:87: df:17:93:17:2e:0a:81:e5:57:78:67:5e:70:50:09:33: 09:4d:0d:cd:31:19:b1:11:c3:f5:e4:9d:ec:f2:16:c3 Fingerprint (SHA-256): A2:EC:4E:16:D9:93:2C:32:EB:B3:34:1C:B9:BC:02:86:F2:98:5A:3F:07:C8:07:C8:F3:6C:EA:55:2F:2C:C7:5F Fingerprint (SHA1): FC:CD:2E:BF:AC:30:87:50:D6:CC:7E:EE:7A:05:D1:B0:55:6E:F5:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174395 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018174396 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018174397 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018174398 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018174399 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018174400 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018174401 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174395 (0x3cb01bbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:48:32 2023 Not After : Wed Oct 18 17:48:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:30:02:c4:c0:dd:7b:15:e0:76:43:df:9f:91:62:4f: 51:7c:c5:8c:09:8f:3b:90:54:6c:87:55:cf:6b:4f:2f: 98:f5:fd:d9:24:48:8f:1d:a2:54:ef:fb:54:96:ab:3a: 7c:4d:1b:22:43:59:7f:c1:d3:4f:39:a7:bd:71:6e:64: d8:56:22:e1:25:79:af:90:8e:96:01:13:4f:93:2c:dc: aa:15:e2:d4:1a:bc:9f:b0:25:10:1a:9d:0b:5d:81:73: 4b:c4:a9:f3:d2:9b:15:1a:b6:ec:59:1c:96:17:a1:d0: 04:7d:5b:a5:ef:a6:d8:03:42:0e:5e:7a:5d:f3:ab:6d: 05:cd:12:ca:21:1a:25:82:ab:c7:f2:cd:6b:58:8d:98: 41:87:47:95:25:61:ab:79:19:e4:f3:d3:08:1b:b3:3d: a3:7b:64:aa:58:fd:de:86:80:cb:23:e2:7a:cf:1d:dd: e0:93:44:7a:de:c3:d2:13:f0:22:14:64:c3:5e:19:65: 57:88:f7:7a:30:bd:5b:a1:c9:8b:0a:b5:7d:f2:a6:63: b7:80:8a:6b:1d:d6:1b:e3:f3:27:07:5c:9b:ff:cd:3d: 34:03:fe:c0:03:f5:86:8e:a1:7b:8c:0e:20:fa:bd:86: f0:ac:74:24:3e:56:ba:95:6a:db:95:62:3d:5f:25:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:9c:5f:0d:ae:31:0c:0d:db:c2:65:8b:3b:d7:cb:fe: 15:f0:04:07:cd:17:f7:9a:a7:41:24:d6:f8:f4:fc:73: 93:3f:3c:85:2d:7c:46:d6:03:70:48:39:c7:48:3f:0b: c5:d7:03:e9:a1:9e:f4:e6:1f:c8:96:51:21:37:1c:4d: 34:48:a5:79:6f:cb:04:41:82:57:d2:fd:a4:0a:d1:2f: b5:ac:06:e4:c4:25:21:72:2f:28:71:f3:bb:81:80:af: 1b:e2:50:e0:e2:28:0f:f8:5f:86:39:8c:ab:0d:2c:ab: 19:79:23:f4:73:13:4b:b3:25:04:ca:94:27:c8:2d:65: a7:02:0e:46:c8:4c:e2:dd:41:48:34:af:cd:f8:7d:0a: 3b:9c:20:a4:0e:60:28:2a:81:ee:37:ee:dd:81:8d:3a: 9b:a0:06:63:50:dd:68:c3:70:68:e3:f0:b1:59:16:ac: 24:e2:db:30:4d:cf:c0:e0:87:e9:3d:55:f5:03:f1:f4: 12:f5:63:4e:47:53:db:3a:55:52:e1:14:6f:d8:9d:35: 0c:7e:16:bc:fe:90:73:e3:17:65:67:43:f3:5e:6d:44: 9f:8d:49:c5:57:19:d3:9f:33:a5:d4:73:0d:56:92:5c: 49:83:fd:12:71:d5:68:28:89:58:42:e5:1c:8d:de:49 Fingerprint (SHA-256): AC:10:3C:91:18:6B:BB:8E:50:AE:7E:C0:D6:59:20:1F:B5:C8:A0:FC:AB:63:A1:FC:D1:F0:A4:1E:01:A4:75:EE Fingerprint (SHA1): 28:5C:99:F1:76:2F:8D:C2:9F:FA:E8:26:D8:34:11:E5:F5:E6:A6:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174395 (0x3cb01bbb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:48:32 2023 Not After : Wed Oct 18 17:48:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:30:02:c4:c0:dd:7b:15:e0:76:43:df:9f:91:62:4f: 51:7c:c5:8c:09:8f:3b:90:54:6c:87:55:cf:6b:4f:2f: 98:f5:fd:d9:24:48:8f:1d:a2:54:ef:fb:54:96:ab:3a: 7c:4d:1b:22:43:59:7f:c1:d3:4f:39:a7:bd:71:6e:64: d8:56:22:e1:25:79:af:90:8e:96:01:13:4f:93:2c:dc: aa:15:e2:d4:1a:bc:9f:b0:25:10:1a:9d:0b:5d:81:73: 4b:c4:a9:f3:d2:9b:15:1a:b6:ec:59:1c:96:17:a1:d0: 04:7d:5b:a5:ef:a6:d8:03:42:0e:5e:7a:5d:f3:ab:6d: 05:cd:12:ca:21:1a:25:82:ab:c7:f2:cd:6b:58:8d:98: 41:87:47:95:25:61:ab:79:19:e4:f3:d3:08:1b:b3:3d: a3:7b:64:aa:58:fd:de:86:80:cb:23:e2:7a:cf:1d:dd: e0:93:44:7a:de:c3:d2:13:f0:22:14:64:c3:5e:19:65: 57:88:f7:7a:30:bd:5b:a1:c9:8b:0a:b5:7d:f2:a6:63: b7:80:8a:6b:1d:d6:1b:e3:f3:27:07:5c:9b:ff:cd:3d: 34:03:fe:c0:03:f5:86:8e:a1:7b:8c:0e:20:fa:bd:86: f0:ac:74:24:3e:56:ba:95:6a:db:95:62:3d:5f:25:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:9c:5f:0d:ae:31:0c:0d:db:c2:65:8b:3b:d7:cb:fe: 15:f0:04:07:cd:17:f7:9a:a7:41:24:d6:f8:f4:fc:73: 93:3f:3c:85:2d:7c:46:d6:03:70:48:39:c7:48:3f:0b: c5:d7:03:e9:a1:9e:f4:e6:1f:c8:96:51:21:37:1c:4d: 34:48:a5:79:6f:cb:04:41:82:57:d2:fd:a4:0a:d1:2f: b5:ac:06:e4:c4:25:21:72:2f:28:71:f3:bb:81:80:af: 1b:e2:50:e0:e2:28:0f:f8:5f:86:39:8c:ab:0d:2c:ab: 19:79:23:f4:73:13:4b:b3:25:04:ca:94:27:c8:2d:65: a7:02:0e:46:c8:4c:e2:dd:41:48:34:af:cd:f8:7d:0a: 3b:9c:20:a4:0e:60:28:2a:81:ee:37:ee:dd:81:8d:3a: 9b:a0:06:63:50:dd:68:c3:70:68:e3:f0:b1:59:16:ac: 24:e2:db:30:4d:cf:c0:e0:87:e9:3d:55:f5:03:f1:f4: 12:f5:63:4e:47:53:db:3a:55:52:e1:14:6f:d8:9d:35: 0c:7e:16:bc:fe:90:73:e3:17:65:67:43:f3:5e:6d:44: 9f:8d:49:c5:57:19:d3:9f:33:a5:d4:73:0d:56:92:5c: 49:83:fd:12:71:d5:68:28:89:58:42:e5:1c:8d:de:49 Fingerprint (SHA-256): AC:10:3C:91:18:6B:BB:8E:50:AE:7E:C0:D6:59:20:1F:B5:C8:A0:FC:AB:63:A1:FC:D1:F0:A4:1E:01:A4:75:EE Fingerprint (SHA1): 28:5C:99:F1:76:2F:8D:C2:9F:FA:E8:26:D8:34:11:E5:F5:E6:A6:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174402 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174403 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174404 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174405 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174402 (0x3cb01bc2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:48:53 2023 Not After : Wed Oct 18 17:48:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:f8:99:ba:ce:ec:27:b7:f2:8b:f7:66:c0:b8:e7:59: 61:5f:d1:a5:12:53:1f:95:f6:cd:57:f9:80:e1:60:97: 4f:b4:65:3b:58:bf:46:3c:8e:9b:cb:36:ad:1e:61:20: a8:bc:51:34:57:dd:b8:52:10:22:20:dc:93:84:52:3d: 96:6c:f0:75:b9:e4:8b:43:9d:d9:d9:7d:e4:8f:3a:c3: dd:d6:57:53:44:20:dd:8a:1e:21:ed:ae:aa:8c:57:0f: a4:3b:64:1f:e2:fc:4d:1f:3c:0b:77:3e:7a:d0:69:c9: 33:35:f3:1c:ee:91:a7:90:03:2e:bb:a2:2b:e6:f0:4c: 1b:f0:4b:9e:8c:91:f0:af:fd:aa:b2:70:33:b8:dd:f4: df:39:99:ca:4a:b9:e6:fd:8f:e7:8e:6e:80:5c:a3:8b: a4:df:5a:1c:b7:56:56:f7:a6:7e:19:2b:97:64:3b:03: f2:17:0d:e8:af:82:50:1e:8d:61:6d:9a:7f:bb:29:fd: 1b:a6:07:55:a1:3f:46:15:7b:b4:09:e0:d9:fb:0c:a8: 8c:ae:dd:bc:55:d1:ea:49:87:a7:8e:87:05:84:7d:aa: 0f:41:6c:b4:9b:dd:45:53:d2:fa:9c:6c:75:d1:c0:77: 1e:75:c3:22:1b:03:db:93:d6:60:2a:99:27:50:a6:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:b1:47:3d:99:9d:b5:e0:46:f1:49:17:b3:ff:e2:a9: aa:f2:48:e1:ca:c8:94:b5:ec:32:37:a3:a7:47:9e:0f: 0a:21:3b:cc:35:b8:ff:d8:88:4b:de:0a:2d:93:56:d7: 9b:54:65:81:61:41:c0:3b:00:9b:a5:db:b9:55:e8:3c: 1a:d9:eb:08:07:5c:72:2f:a2:b7:65:03:28:10:5a:8f: a7:1c:cb:97:82:25:79:97:5f:57:4b:6a:f2:d2:da:d5: c6:ef:d2:e7:67:56:7b:95:d9:0e:f4:7e:71:00:df:29: a2:40:56:03:e0:82:63:66:58:d2:5c:8c:c4:22:44:81: b6:a4:13:7c:16:f8:73:fb:a6:04:97:04:7a:33:5c:c7: e1:3d:69:d9:24:90:25:f7:c2:27:e8:aa:16:fd:1f:60: 7d:d1:35:1d:01:53:17:b0:7a:d8:3b:10:d1:64:83:87: 51:cb:6d:11:e3:54:01:2e:f5:4c:69:cb:cd:d5:dc:99: a0:bb:c8:7e:32:a7:f9:99:e8:d6:f1:fe:2c:bf:57:6e: bd:53:f2:09:92:e7:b4:f2:08:e2:ba:89:3e:f3:de:d5: a8:5a:ac:b8:bc:1e:8b:4e:ce:74:4f:65:35:ce:a6:c6: ec:75:73:be:3d:7b:09:c4:c2:dd:b2:31:75:f3:90:53 Fingerprint (SHA-256): 15:51:CF:0D:E9:25:7A:DD:EB:F3:89:2C:94:8F:CB:DD:48:7E:51:F8:CD:28:05:BF:17:8C:EE:16:55:4B:A2:ED Fingerprint (SHA1): 00:C3:5C:AA:12:12:53:7B:1D:1B:0B:A9:F7:1C:A0:36:92:96:6E:3D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174403 (0x3cb01bc3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:48:55 2023 Not After : Wed Oct 18 17:48:55 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:cc:96:86:88:cb:f2:f5:94:53:69:5f:4d:45:ca:80: 27:3a:54:4b:2d:9e:76:3d:f4:0e:78:37:b2:f3:ac:a4: a4:24:e8:d3:0a:0e:65:f3:04:15:5e:02:a1:4f:6f:0c: 70:e3:53:8b:07:bc:7a:bf:3c:6a:1b:c1:9b:33:5a:a2: c9:86:8e:0d:c0:d6:34:f7:6f:1b:2b:88:6b:15:37:c2: 8e:27:c0:62:a6:a4:53:69:f8:3b:84:3e:58:65:61:37: 2a:6f:cc:88:20:34:74:c8:47:6f:4e:71:b3:ad:2b:f5: f9:1d:47:a9:4f:cf:16:51:72:0a:18:4b:2d:48:59:94: 92:98:84:45:54:f6:06:77:53:ae:5b:fc:6e:c6:14:91: 37:ef:24:4c:e8:ee:d1:0b:3f:7e:70:9e:5a:11:d8:6a: 0c:e5:12:8b:b9:ff:d8:3b:b3:d2:12:ff:af:c3:d5:e5: 58:37:e5:ba:11:a3:27:92:af:6b:30:b9:e5:b7:cd:fb: 58:52:b3:60:7e:11:80:ce:62:05:a8:fb:95:50:be:79: c7:bb:b1:16:cd:e1:f6:90:d3:ae:0f:30:8a:13:45:32: e3:1b:4a:b3:c4:dc:f0:83:fb:d2:4f:8c:9b:74:c8:24: 86:8e:9a:44:50:f0:6f:f9:bd:a4:0c:d1:40:fc:15:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:28:25:03:98:20:48:e5:f7:42:e4:58:52:d9:45:70: 52:24:68:3e:c2:6c:80:3c:73:a8:4b:fa:16:68:2f:1e: 3e:4b:0d:ea:eb:6c:2a:e8:38:a3:71:0d:1b:68:66:18: 63:be:d3:23:ad:c3:ba:cc:c8:7a:7f:97:24:6f:4b:2a: 8d:be:4b:2b:fa:00:9a:8c:e4:8f:8c:b9:07:21:49:eb: d1:72:dc:cd:ad:19:e9:ee:09:ac:73:c9:15:cb:1c:5f: d6:da:12:a7:7b:84:4e:a3:a2:b1:61:9c:b3:07:e0:e3: 69:8a:a9:b3:93:f4:d0:a2:99:25:91:8a:96:3c:43:1d: c1:43:03:cb:9f:a7:40:ab:93:50:c4:ea:9f:44:26:4c: 76:35:3e:8d:e9:1f:b7:0b:ab:14:78:bc:5f:d1:ec:4b: 97:b4:48:3c:75:ea:88:c1:07:99:fd:11:d6:bd:fa:e9: a9:c1:a1:ff:82:ab:f1:94:f9:03:69:03:23:4c:ea:26: 72:13:01:0d:b4:6b:54:26:ed:93:6c:3a:e2:4b:68:48: ab:da:da:2b:45:63:da:22:02:49:cc:9a:d8:97:c2:02: 1d:69:7b:79:ea:92:f9:89:b6:8b:3f:d0:13:ed:a7:10: 5f:22:3a:24:b5:12:05:05:e4:f3:74:57:33:a5:f7:04 Fingerprint (SHA-256): 7B:04:D0:E7:FA:73:14:11:04:E3:06:AF:7A:8F:A8:C0:B1:EC:FB:02:ED:E6:E5:38:DE:16:D6:82:8A:A0:D7:A7 Fingerprint (SHA1): D0:8B:D1:0C:61:EA:99:8B:D7:61:BF:7E:09:DA:57:84:83:F1:4F:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174404 (0x3cb01bc4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:48:57 2023 Not After : Wed Oct 18 17:48:57 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:90:83:48:0b:87:41:66:4e:21:7e:c3:d5:3c:4c:5d: 4d:9f:ca:03:1d:bd:e9:25:91:2b:15:cf:86:4c:4a:3e: e8:1a:ee:ac:39:02:7a:b2:ef:a8:c5:1d:44:bc:ce:97: 92:3c:76:a8:91:a3:8d:13:82:ee:67:70:de:00:2f:77: fd:e8:a9:5e:73:84:72:8e:40:40:00:6d:c0:aa:32:c6: f9:ab:e8:52:2e:41:3c:7e:b8:7d:9d:85:e0:b5:b1:73: 8a:df:63:e4:37:75:f6:17:1c:76:dc:19:30:72:aa:3b: cb:61:dd:ec:14:1b:dc:a7:e7:02:15:4e:52:83:4d:24: a7:bb:4b:db:09:3c:4b:0d:a8:38:53:21:1c:47:9a:74: d2:a1:2a:a9:a9:2c:d7:ae:58:99:de:85:ee:86:39:63: c7:f0:8a:23:ab:69:6c:7d:e0:f1:e6:41:d8:24:57:64: 53:1f:dd:a1:5c:a6:4d:68:2f:09:79:bc:ad:4f:85:dc: ad:fe:79:f0:0c:f9:ac:b4:a8:e1:bc:72:65:ed:06:75: 1d:87:0a:6a:a5:dd:ff:ff:95:20:7d:2d:4b:58:11:d3: 50:da:45:be:71:99:5c:45:cc:09:ce:75:d8:ff:1e:8c: bc:e5:56:79:95:61:5d:88:29:8d:2c:dd:37:e7:9e:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:ab:56:cc:30:7f:f8:c6:44:ee:94:79:86:b1:6d:6f: e1:46:65:5d:da:4a:86:f9:f9:30:fa:0c:0d:12:91:a2: b6:fd:d4:c8:e8:ab:f0:d0:fe:23:41:9c:fb:2a:0b:76: d3:47:7f:8d:19:33:90:6d:d2:54:e0:eb:fd:9a:41:bd: e1:5c:40:7b:84:15:ed:5d:d6:31:4e:40:b7:e2:0e:86: a5:ff:3a:15:ed:6a:82:79:68:d8:cf:78:6f:56:75:d4: 3c:5e:68:88:e7:96:23:c3:13:1e:f9:1c:57:6f:76:c9: 3c:7f:e1:e4:fb:d3:a1:62:c2:69:b7:e8:74:4c:3a:4e: eb:11:dd:85:06:d4:d6:98:13:e7:2e:50:33:f5:7a:a7: 3e:1a:6a:6b:1d:23:ad:7e:6b:5e:ad:94:79:e4:54:0a: 60:37:d8:30:05:18:97:5e:e5:e2:90:de:2f:6b:6f:38: 6d:ac:7a:ca:90:49:8e:b0:07:94:c1:bd:e0:4b:d0:bc: 26:c2:0e:5c:3a:9b:a2:8e:4b:2f:f0:b4:27:e1:b7:bf: ce:4f:62:a1:48:c4:a2:3a:4b:fa:b3:d3:1b:5b:39:9c: a4:53:bd:f4:c2:ea:8b:7d:ac:18:d6:0e:13:b0:54:0a: c4:f1:3a:7d:4f:98:e6:14:ee:25:93:8e:02:6d:84:46 Fingerprint (SHA-256): 16:A4:DF:C1:64:AA:DA:06:D2:55:DF:8B:B3:1E:61:27:8B:98:35:AF:CB:94:10:08:2D:6D:A1:67:12:1B:68:FB Fingerprint (SHA1): 40:7B:5C:AC:94:A3:46:FB:06:CB:A6:82:BA:9C:BD:93:AD:74:85:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174406 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174407 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174408 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018174409 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018174410 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174406 (0x3cb01bc6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:49:05 2023 Not After : Wed Oct 18 17:49:05 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:ca:87:a4:08:d6:fa:0d:f2:84:a3:7b:64:80:b4:70: 9b:79:b9:4c:21:8a:de:57:75:00:b9:6b:a5:dc:a6:91: 56:fa:99:63:e5:42:4d:c9:92:f1:16:e6:bc:1e:c2:98: 90:98:48:fb:a9:14:90:c1:cf:56:72:95:ea:53:39:43: 56:ad:1a:47:4b:9c:23:79:b9:cf:01:8d:9c:39:a4:12: 32:cd:2f:1c:ad:95:56:48:de:90:0d:82:9e:c3:85:a2: ea:dd:0f:01:4b:67:f4:08:f6:46:57:a4:c5:83:33:fe: 8b:52:f8:c6:7b:8e:ac:d7:84:c4:00:12:fd:43:f9:96: 90:3b:24:0f:41:ea:b8:68:0a:60:34:da:ec:29:37:c5: 09:6b:25:44:3a:4a:91:0d:d8:df:66:52:39:d5:4c:b2: 20:f6:0a:a7:2c:85:d9:0a:19:09:ae:02:b0:3c:4c:73: f6:cd:ac:fe:9f:0b:0f:62:b2:3c:ed:70:3d:5d:a1:7c: 3d:7c:3f:28:1f:c1:d6:9b:aa:fd:67:07:41:42:a6:1a: 1e:d8:82:59:e4:ff:f2:b1:a4:94:02:12:c8:2f:45:bb: 38:0a:1c:bc:f0:7a:03:5e:37:13:d6:84:74:ef:b4:76: 25:60:0b:b4:b5:89:5a:c9:f2:91:08:db:2a:b6:99:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:b1:c5:bd:c7:e2:97:3a:f9:2e:bf:7d:46:ed:95:7c: 8a:f7:25:dc:f2:59:dc:74:36:38:9b:e5:38:95:e2:9a: 73:7a:d5:ab:5e:e4:da:a1:11:ce:82:64:b5:85:d8:b0: 7b:1f:06:69:d6:dc:3d:a1:f3:ae:b7:fb:94:b1:22:7a: a5:bd:9b:23:33:27:0f:d0:a1:d5:0c:df:8d:42:21:4f: 81:61:6a:d5:64:f4:c2:3c:d2:8a:2a:c3:ea:ed:34:8d: b5:ed:b3:36:4e:5c:8a:a3:ab:6e:b4:ca:5f:5c:41:6e: 10:a7:d8:9f:b5:0e:d7:19:3d:02:d5:1f:4b:bb:ed:fa: 34:c1:67:e7:de:58:38:1d:20:98:b1:44:73:7c:9f:0d: 4e:56:86:29:28:55:b4:93:0a:9b:05:d9:6f:dd:9e:59: 9e:9b:93:92:de:ce:c7:a9:12:0c:c9:ca:64:6d:30:9e: ec:69:e7:68:a6:92:35:1a:02:e2:15:c8:89:90:03:47: 4a:51:b4:8c:16:f3:9c:b9:08:b7:ca:9b:a4:4d:be:12: 6d:b7:17:74:6c:0d:e6:fa:ba:98:63:f9:cb:7a:c5:ca: aa:10:bd:ac:e8:e8:ba:0e:9e:17:ed:c1:1c:eb:59:0a: 2a:00:b3:e5:4f:52:25:e2:d0:a3:5e:c4:58:43:8e:de Fingerprint (SHA-256): 69:F2:7B:50:CB:5C:28:F2:D8:9D:FB:89:DB:20:84:FE:55:7F:14:A3:EE:E3:E3:55:65:1C:FA:BE:40:D2:8F:C1 Fingerprint (SHA1): 54:B7:E9:8C:4F:2D:23:4E:5E:6D:AA:3B:A1:DB:B8:E4:DB:BE:BE:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174407 (0x3cb01bc7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:49:07 2023 Not After : Wed Oct 18 17:49:07 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:31:74:a3:7e:37:c2:67:ec:5f:c8:50:38:92:1e:c3: b5:eb:7e:8e:21:22:b4:bf:70:3b:8c:fe:43:2e:fd:a3: d7:60:5a:79:a4:20:09:36:e1:2b:76:8e:70:55:44:7d: 8e:cb:00:6d:a9:ac:92:a1:96:d7:15:95:4a:2b:94:d1: 2d:53:cd:bd:79:a8:b1:28:76:c1:1f:fa:e0:5c:3e:b6: f2:2b:32:f4:15:ec:c5:68:29:92:ff:72:a5:7d:76:dc: 51:56:fa:9e:a9:67:e5:77:89:db:52:92:fd:b4:82:c6: 83:f6:63:c7:35:6e:d6:a6:a1:15:bb:73:93:5b:fa:7a: 2d:db:87:9a:c3:d7:04:cf:15:b0:cf:e8:7f:41:db:bf: bd:42:a8:17:53:fa:5d:95:cc:74:39:ca:c8:22:52:f0: 27:f7:a5:4e:f5:02:28:c6:e9:42:50:d2:95:df:1c:05: 52:90:ab:9c:c8:76:09:38:fc:fc:7c:d1:5e:2b:f2:4b: 2a:1a:3e:d8:01:ff:f3:5b:41:b8:8a:46:81:99:31:7a: 4f:f3:d3:16:db:ba:7d:48:05:81:b8:28:6c:7d:e9:da: 4d:01:c0:11:58:4b:32:3b:93:5e:66:57:dd:42:4a:9d: 80:98:2c:67:b5:7d:eb:d2:f4:f4:7d:a6:b9:65:f5:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: da:4f:36:f9:c5:9c:83:60:26:86:58:0c:cb:d9:15:20: ec:0d:1c:87:51:7e:29:0d:76:52:f0:e4:c6:0e:c3:2d: 91:fe:fb:e8:9b:8e:29:ba:af:a3:62:4b:06:35:cf:a0: 24:3d:cd:e4:bb:6f:a1:b8:e8:39:c0:35:b0:57:3a:fd: 76:bd:26:fd:8e:47:7a:40:a7:41:40:6e:5c:97:4c:5a: 84:9d:54:e9:e3:64:43:c5:d7:8e:b4:0c:31:e9:6d:11: 8a:86:19:9b:20:60:93:1e:cf:3e:db:8b:b5:e1:51:c2: f0:2b:04:c1:1d:c6:47:30:83:f2:93:a8:98:a8:e5:e4: db:31:0e:65:28:6f:84:27:26:42:f6:e9:08:6b:fe:35: 11:b1:49:0e:4f:7c:55:f1:f5:4e:12:bd:85:1f:03:63: ca:aa:65:ae:ea:15:7e:1a:c6:fb:ac:96:15:ed:a1:79: d7:ae:de:6e:a4:21:bd:9c:3e:54:c8:5e:58:d6:39:c2: d2:43:98:1f:65:c3:29:09:fd:34:eb:31:a0:cc:79:ae: 84:c9:9b:8b:09:95:0d:fd:7b:ba:7e:e5:d6:e8:03:1e: d1:11:3e:2d:02:e7:72:61:b8:2a:87:1a:32:ec:b9:a9: 1a:93:4c:1f:27:2d:39:05:bc:bb:d7:27:c1:1f:f0:48 Fingerprint (SHA-256): E9:E0:77:66:09:10:D4:4B:D2:3D:C8:EF:90:ED:A9:74:91:F0:DD:9C:FF:61:A9:F7:AC:FE:12:BD:12:5E:6B:E3 Fingerprint (SHA1): A0:ED:E7:4A:BB:9C:F1:E5:86:66:03:ED:0E:4B:A5:56:BD:AB:CB:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174408 (0x3cb01bc8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:49:10 2023 Not After : Wed Oct 18 17:49:10 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:7c:7f:70:ba:23:9e:1a:9f:05:b6:de:35:49:eb:94: 88:3f:32:8e:ca:a4:84:51:a2:83:7d:55:4a:e4:20:a7: c5:72:e3:1f:0e:64:70:89:dd:b2:38:14:2a:56:e6:1b: 11:fb:c8:9c:51:f5:56:65:6f:fc:77:2a:9d:42:5d:03: 3b:27:14:f7:65:47:da:b6:18:d9:dd:69:b4:ed:15:9b: 2a:7e:3f:87:dc:23:dd:c5:39:d0:d7:0b:aa:87:8d:16: 1a:30:3b:3c:b5:00:3c:4b:99:50:57:68:a2:c5:4a:a9: ba:c8:d1:7f:f5:13:79:50:1e:73:da:21:96:f1:0a:47: 9e:fe:70:87:7a:b5:ab:37:96:2b:5d:0f:cc:ce:63:c3: 9b:8f:c5:7d:c8:13:5b:05:29:4c:f6:22:7f:f0:ff:a9: f0:bc:50:00:84:d4:db:a4:68:94:71:3f:84:1c:ec:e4: 39:c0:da:4f:e0:1d:65:f9:cb:6d:7c:f1:52:fc:e5:73: 4a:1f:d1:28:7f:ed:26:31:37:e3:9e:c3:db:b0:13:4e: d2:aa:00:42:c7:8d:9b:3c:9c:46:4b:6d:64:b7:67:15: 6f:04:03:73:07:6a:dc:f7:96:d1:88:90:63:a5:46:28: 3c:b1:b3:94:7a:f2:9b:3c:3d:36:73:c0:35:ef:75:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:02:52:7d:a2:b9:51:c3:9b:f0:3a:78:bd:c1:35:32: 1c:73:08:07:33:1f:2d:de:06:a0:6b:6d:d8:10:71:01: 4c:c6:87:2e:51:ff:80:a6:45:32:43:c8:74:28:05:dd: ec:db:93:75:15:a2:1d:ec:84:2e:68:3f:d4:05:01:d6: 63:ef:c1:4d:77:13:47:7c:2c:ce:83:4f:ef:f1:ec:d9: 68:c2:11:71:4f:91:df:df:44:2b:88:d0:b7:79:5e:8d: 30:8a:43:cb:9b:5b:a9:be:b8:15:a6:ee:81:f4:a7:b5: d3:5b:d5:89:77:d0:fc:e7:97:0c:4b:b4:8d:5d:2f:53: fd:26:8c:37:0f:41:bb:4f:57:1a:a1:16:5f:3b:59:61: 8b:06:cc:4e:49:aa:34:ef:68:01:ed:12:5c:6d:9b:7a: 43:08:0b:5c:eb:51:4e:71:76:3e:c4:12:38:94:f7:0c: 37:e4:8a:18:2e:d6:a0:46:3d:22:c2:c6:3a:0e:6e:95: d5:a4:e3:19:1d:f7:46:31:a8:ff:05:28:86:93:5a:ee: 26:08:66:ca:b5:cb:6b:ba:b1:50:cb:61:4f:d9:59:ac: d2:9d:e2:f6:ea:81:be:53:0a:8c:e5:9c:f1:88:1a:f8: 81:9d:e7:ca:35:92:7a:ef:78:34:b1:ed:29:4e:c3:88 Fingerprint (SHA-256): 33:2C:7C:3B:93:75:0D:F0:F7:0E:B0:ED:4A:A7:36:53:E2:4D:62:BD:C7:97:34:C4:2F:12:5A:72:1C:89:00:63 Fingerprint (SHA1): 94:DF:63:CC:6C:41:9D:20:83:E6:D1:16:A2:7F:94:EA:A9:86:B3:48 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174411 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174412 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174413 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018174304.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174414 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174411 (0x3cb01bcb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:49:20 2023 Not After : Wed Oct 18 17:49:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:a2:40:72:0c:26:66:e8:00:d5:65:3b:25:bc:62:d0: a0:f5:88:9e:0a:04:d5:f6:3f:26:dc:52:a1:05:a5:c6: 76:56:63:a0:f6:ce:05:bd:21:0c:ef:ac:40:2b:25:92: b8:6a:fe:52:8b:28:1a:06:04:34:91:04:99:16:2b:37: eb:14:37:ad:a9:dc:b7:4f:f9:59:58:7f:f0:a0:42:fa: 92:cc:ea:09:42:b5:2b:cf:41:c9:75:fd:6d:b5:c2:19: bb:c6:d7:73:97:c8:8e:ef:51:1a:b3:c8:19:e8:3d:c9: 36:35:66:46:08:88:e0:53:79:23:9b:fa:ad:9b:4e:77: 53:40:38:9e:28:b7:0a:36:30:07:42:f5:2a:70:1f:35: 8d:0b:cd:21:83:f4:fc:80:13:10:b3:09:f2:c8:ec:05: bc:56:42:4a:4f:6b:5c:bd:cd:43:97:40:56:8a:7b:53: 5c:a7:cc:7e:6f:25:a1:4f:2d:18:50:5b:d0:1b:c4:88: 70:ea:b9:13:9d:45:0f:24:fc:82:68:53:5d:14:93:81: 94:db:28:1b:44:f8:82:6c:74:54:f2:31:e5:43:0e:8b: 46:07:52:b6:a2:2f:5e:e0:60:9e:19:ae:4a:72:52:25: 26:a5:f9:0a:68:fe:95:50:46:84:95:1b:fd:4f:1b:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ab:37:a5:05:48:b9:34:85:4d:22:52:38:4d:25:ad:a4: 09:6c:16:f6:48:87:99:89:f2:2c:b6:4e:74:a5:b1:59: 18:8d:87:3e:75:8b:0c:f3:78:df:92:1e:e7:e8:50:c2: ef:0d:75:18:6e:24:23:1a:44:97:6a:11:7d:2b:14:92: a3:0c:f0:65:c8:60:98:62:94:77:16:f7:e2:57:8b:d5: d9:2b:5e:8a:5f:db:ad:87:f8:8d:f4:b9:31:ce:92:55: f3:a4:10:c2:85:e4:1a:fe:42:82:cd:9a:8a:02:7b:ce: a2:a8:bd:2c:8c:29:52:86:a6:b3:81:99:fe:a0:ef:cb: b8:8e:63:fb:4a:a9:e2:1f:7e:61:86:f6:80:5f:59:a8: 16:9c:72:8b:49:97:6d:19:60:b7:19:3c:d3:5d:ee:7b: 8d:6e:0a:c4:ab:45:9f:19:ea:ba:0d:4d:a6:d8:58:59: c9:46:3f:dd:6a:3d:9d:1e:c3:a6:8a:0e:21:75:51:97: 2f:25:2b:76:d9:76:fb:ac:98:f5:f1:37:b9:a3:0d:c3: 32:b7:ae:05:85:d6:01:c8:48:65:05:5e:29:88:c1:93: ab:68:18:51:b0:49:16:0a:93:76:f8:07:28:94:ae:75: 71:b2:04:7b:0a:37:1d:14:c6:d1:65:d9:f5:04:1c:22 Fingerprint (SHA-256): CF:A4:21:F7:00:97:B7:C1:00:68:C1:03:6D:00:2D:2E:57:1D:20:4D:89:4B:F2:5A:61:64:6E:AE:EB:F7:74:93 Fingerprint (SHA1): 7C:15:3F:3D:14:A0:3B:02:DF:FD:DF:F0:D3:F9:86:9D:1D:96:3F:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174415 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174416 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174417 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174418 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174419 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018174305.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174420 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174415 (0x3cb01bcf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:49:30 2023 Not After : Wed Oct 18 17:49:30 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:99:45:a3:e4:22:f1:a8:a3:54:d9:2d:47:68:fd:72: db:c4:3d:29:01:a1:3f:5b:3a:84:19:ab:5e:fa:0f:9f: d2:95:04:9c:52:f7:48:8a:aa:3c:99:13:f1:cd:48:d0: 14:f4:a9:eb:bf:05:1f:12:bf:49:79:74:c1:da:2d:c5: bd:1d:8a:3d:ad:0e:f7:db:e9:60:5b:51:ad:e0:6e:90: 78:5f:ea:78:aa:da:ef:39:02:48:d8:b0:66:76:ba:2f: 8d:dc:6b:e0:ad:c7:f5:ca:cd:a1:17:58:fc:da:04:2e: 45:fe:27:39:f6:b7:59:00:5f:e4:a8:23:0c:b0:9f:22: 4d:3c:14:2f:c2:2e:6b:4c:88:84:c2:0a:d3:28:ec:db: b5:ce:b3:a2:ff:62:f2:75:bb:f9:ca:82:57:57:8d:36: 97:e8:3f:68:5c:b8:09:a1:17:36:aa:51:cd:66:70:4b: de:6b:85:8f:51:c9:72:5a:36:cf:2e:70:d9:d6:29:79: bc:6b:f8:72:03:23:00:a5:45:c8:95:7e:82:09:d9:f8: f7:53:0d:6c:65:07:bd:42:30:e3:27:ab:f5:b5:75:96: df:6e:54:c4:a8:84:45:3d:0e:bd:08:96:bd:5a:56:e2: 98:ca:37:d3:03:af:7a:d4:ba:9c:9c:a8:77:eb:8a:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:49:00:49:27:0c:09:16:19:5c:7e:e1:ab:3a:a2:6b: 75:e6:3b:61:39:53:7a:65:5d:1c:eb:97:ef:36:61:37: 1b:3e:f6:d9:6e:a5:a8:eb:af:bc:65:97:53:6a:da:23: 1c:3a:2b:a4:1d:39:e9:48:3e:9f:4d:e5:f6:3d:bc:72: 0e:74:e0:e8:65:cd:19:0a:7d:e0:ef:ad:f3:cf:35:c7: ba:bb:77:f1:31:71:07:fa:6c:72:41:dd:e5:38:cf:1d: a8:ef:7f:30:19:f0:52:76:8a:c6:76:f1:12:3c:30:c7: b6:e1:45:ff:75:2a:90:91:d5:cb:c2:46:ca:a1:da:7d: 3f:06:2e:2b:86:ba:d3:69:23:f3:a7:12:4c:26:17:dd: 28:bb:cc:62:45:64:62:5d:43:03:66:7d:f8:fe:65:60: 87:56:1e:da:35:0a:b2:dd:94:7d:65:6e:ce:20:4a:9b: 88:47:ce:f5:47:70:ff:ca:cb:4e:5c:10:80:2e:c7:8b: 0d:23:9e:93:9b:94:8d:d2:b8:ca:8d:31:4d:3f:fd:fd: cc:34:67:11:33:a4:64:0e:f0:87:11:1a:d2:f0:35:3b: 6f:29:01:42:2f:cc:56:e4:8e:0e:42:c7:44:a6:bd:bd: 9e:e5:3b:aa:67:f7:5e:3c:70:17:f1:34:03:61:fb:ae Fingerprint (SHA-256): 37:DC:33:02:86:62:03:5C:0B:2C:6F:1B:DE:8C:46:15:A7:AD:63:F4:ED:AC:66:D4:7E:B9:CA:14:7E:22:EA:68 Fingerprint (SHA1): E2:55:60:F9:4D:B7:3F:94:92:F6:5F:0C:0B:F7:8A:F2:F8:48:E1:76 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174416 (0x3cb01bd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:32 2023 Not After : Wed Oct 18 17:49:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:81:72:be:52:0e:41:d9:cd:d1:8e:54:09:bf:39:7e: a7:63:ff:cb:5f:ab:ae:44:36:1f:c1:0b:e2:a6:37:34: 92:38:b5:b9:b6:b6:c4:3a:c9:35:1a:af:d0:b2:a4:42: 40:eb:f7:ce:00:9e:1c:72:16:95:88:5b:79:0a:10:99: 0b:45:e2:cd:15:65:b7:0c:4b:5c:b3:73:a0:7c:d2:27: fd:96:bd:83:da:ac:b9:b9:5b:8e:7d:48:8a:c8:b1:2b: d7:76:e0:1b:55:d9:51:6a:aa:91:fb:d6:2a:1a:55:2e: 1b:10:e9:cb:5c:6a:83:0f:30:19:9b:53:f8:89:64:34: 9d:5c:f7:49:d4:c4:d6:0a:ac:6b:2c:8b:99:30:09:ba: f6:a2:8c:d2:45:fe:f0:68:6f:18:f8:68:ba:9d:06:7a: a0:2d:b9:b6:48:96:e1:25:f9:cc:9d:e7:3c:fd:3f:72: bc:49:3c:7d:43:d6:a6:1c:32:f7:b5:25:69:eb:c0:2c: d8:10:9b:c1:99:0a:8b:4e:f6:d2:e7:74:58:af:a3:ff: ab:f4:7c:35:f7:50:7a:f2:46:cd:db:32:39:7e:29:24: 15:45:15:40:13:65:3f:f2:75:9d:3a:71:b2:0e:a0:e8: 20:05:3c:94:25:45:e0:0a:31:6a:79:b0:94:a5:f4:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c7:0a:e1:9a:9b:81:1c:b7:f4:9c:44:0f:36:f6:6c: 48:2f:b1:84:b1:43:a4:aa:99:1a:cd:a4:c1:18:0a:bc: 76:c1:70:91:8f:ce:ee:5c:d1:15:f5:82:5a:21:a8:08: a2:33:f2:7f:74:85:30:52:a4:0b:bf:f5:5d:62:db:39: 7a:2c:8e:f7:01:96:21:c6:08:43:66:34:01:40:9b:de: a5:37:b6:2d:fd:19:7b:a5:d8:d5:69:96:23:a9:3b:a5: e1:42:fa:ea:2b:c7:62:90:06:d3:c2:ea:1b:60:a6:6f: d6:6b:0c:6e:12:51:d9:06:c5:50:07:f5:9a:b4:d1:97: 28:c7:3f:8a:65:35:81:5a:49:e3:be:36:be:b4:76:2a: 43:f2:de:04:06:6a:b3:a9:9d:cf:82:2f:5b:d7:b5:28: 0e:fa:97:d4:a9:b5:a8:95:95:b9:19:eb:f7:a1:7b:cb: f4:b4:8a:33:c2:24:59:19:17:5b:77:db:db:62:75:28: fc:b4:98:fd:ac:bd:c8:5b:f3:31:fc:93:56:b8:56:ce: 15:95:e8:ba:65:8d:aa:a3:42:8d:82:5f:ab:a9:cd:d6: fe:8a:93:3c:28:15:d4:1c:8e:36:a7:0d:ce:38:a2:e1: d8:c1:a5:0c:ff:56:36:ea:9a:f0:91:af:38:6f:03:78 Fingerprint (SHA-256): 93:CC:80:E8:58:7A:92:B8:A4:D5:78:CC:6F:F2:4B:39:B6:0C:CE:65:FC:CE:88:BE:F8:F9:FD:07:5D:A4:80:20 Fingerprint (SHA1): F3:3D:0F:B5:86:7E:06:08:44:23:0C:85:E8:57:23:ED:72:54:32:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174416 (0x3cb01bd0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:32 2023 Not After : Wed Oct 18 17:49:32 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:81:72:be:52:0e:41:d9:cd:d1:8e:54:09:bf:39:7e: a7:63:ff:cb:5f:ab:ae:44:36:1f:c1:0b:e2:a6:37:34: 92:38:b5:b9:b6:b6:c4:3a:c9:35:1a:af:d0:b2:a4:42: 40:eb:f7:ce:00:9e:1c:72:16:95:88:5b:79:0a:10:99: 0b:45:e2:cd:15:65:b7:0c:4b:5c:b3:73:a0:7c:d2:27: fd:96:bd:83:da:ac:b9:b9:5b:8e:7d:48:8a:c8:b1:2b: d7:76:e0:1b:55:d9:51:6a:aa:91:fb:d6:2a:1a:55:2e: 1b:10:e9:cb:5c:6a:83:0f:30:19:9b:53:f8:89:64:34: 9d:5c:f7:49:d4:c4:d6:0a:ac:6b:2c:8b:99:30:09:ba: f6:a2:8c:d2:45:fe:f0:68:6f:18:f8:68:ba:9d:06:7a: a0:2d:b9:b6:48:96:e1:25:f9:cc:9d:e7:3c:fd:3f:72: bc:49:3c:7d:43:d6:a6:1c:32:f7:b5:25:69:eb:c0:2c: d8:10:9b:c1:99:0a:8b:4e:f6:d2:e7:74:58:af:a3:ff: ab:f4:7c:35:f7:50:7a:f2:46:cd:db:32:39:7e:29:24: 15:45:15:40:13:65:3f:f2:75:9d:3a:71:b2:0e:a0:e8: 20:05:3c:94:25:45:e0:0a:31:6a:79:b0:94:a5:f4:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c7:0a:e1:9a:9b:81:1c:b7:f4:9c:44:0f:36:f6:6c: 48:2f:b1:84:b1:43:a4:aa:99:1a:cd:a4:c1:18:0a:bc: 76:c1:70:91:8f:ce:ee:5c:d1:15:f5:82:5a:21:a8:08: a2:33:f2:7f:74:85:30:52:a4:0b:bf:f5:5d:62:db:39: 7a:2c:8e:f7:01:96:21:c6:08:43:66:34:01:40:9b:de: a5:37:b6:2d:fd:19:7b:a5:d8:d5:69:96:23:a9:3b:a5: e1:42:fa:ea:2b:c7:62:90:06:d3:c2:ea:1b:60:a6:6f: d6:6b:0c:6e:12:51:d9:06:c5:50:07:f5:9a:b4:d1:97: 28:c7:3f:8a:65:35:81:5a:49:e3:be:36:be:b4:76:2a: 43:f2:de:04:06:6a:b3:a9:9d:cf:82:2f:5b:d7:b5:28: 0e:fa:97:d4:a9:b5:a8:95:95:b9:19:eb:f7:a1:7b:cb: f4:b4:8a:33:c2:24:59:19:17:5b:77:db:db:62:75:28: fc:b4:98:fd:ac:bd:c8:5b:f3:31:fc:93:56:b8:56:ce: 15:95:e8:ba:65:8d:aa:a3:42:8d:82:5f:ab:a9:cd:d6: fe:8a:93:3c:28:15:d4:1c:8e:36:a7:0d:ce:38:a2:e1: d8:c1:a5:0c:ff:56:36:ea:9a:f0:91:af:38:6f:03:78 Fingerprint (SHA-256): 93:CC:80:E8:58:7A:92:B8:A4:D5:78:CC:6F:F2:4B:39:B6:0C:CE:65:FC:CE:88:BE:F8:F9:FD:07:5D:A4:80:20 Fingerprint (SHA1): F3:3D:0F:B5:86:7E:06:08:44:23:0C:85:E8:57:23:ED:72:54:32:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174421 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174422 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174423 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174424 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174425 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018174306.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174426 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018174427 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018174307.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174428 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174421 (0x3cb01bd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:49:43 2023 Not After : Wed Oct 18 17:49:43 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:88:67:19:99:40:31:43:0a:d3:3c:8b:f1:d7:51:60: 56:2b:8e:9a:d4:9a:e2:b8:e8:a1:6c:ed:9f:12:fb:17: 80:17:ff:5b:34:ee:d2:df:79:7c:17:bc:52:d6:16:aa: bf:49:df:a0:1c:ad:d7:39:66:f2:e3:c5:66:ae:ff:75: cf:c7:b7:3c:5b:3d:83:0d:17:60:93:07:ab:6a:a3:0a: e1:8c:69:c8:9b:8a:c5:35:30:b5:6b:1f:c1:87:c8:99: 5a:e3:12:b4:c2:c6:5c:65:1f:6d:27:6d:90:4e:0c:43: c9:17:a0:f1:15:ba:72:5e:79:9f:c0:d9:e5:14:e6:e1: 92:ba:2e:12:4b:c4:fd:f7:d9:dd:16:bb:20:1d:09:fc: 4b:f9:28:c0:85:e3:c0:fc:60:e3:c9:51:b8:99:44:f0: 9a:35:3e:d6:39:c1:46:64:52:49:e3:d2:33:c0:26:5d: dd:de:24:30:26:f7:55:e3:fa:ac:22:3e:ab:d3:87:00: 6b:9d:d0:25:1b:61:46:17:37:f0:6f:17:e1:2e:c5:41: 17:b7:c1:47:00:cc:4e:c6:80:3a:f2:e3:cf:8e:b7:c9: d1:14:fb:23:8d:2c:af:ae:f7:04:49:d9:47:66:33:a9: f6:d9:73:ac:04:39:d9:1f:0f:e2:bf:37:fb:d9:8b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:b6:7e:f0:e9:f9:51:2a:5b:2f:98:19:95:46:1e:37: 53:52:af:45:60:c9:d6:26:58:7c:22:1e:69:45:25:99: 31:73:3d:e6:dd:ac:62:e8:2b:1e:c3:3e:73:b3:03:3d: b1:ee:a6:c5:ad:c2:a8:0b:d2:a1:5d:6f:5f:72:ae:2e: a1:82:b5:97:69:e9:ae:b5:49:8e:5d:1e:9c:8c:32:c3: e0:b4:bf:2d:a2:1d:e1:fa:9c:25:9c:93:21:76:7e:b2: 59:fb:7a:ef:7c:f1:b1:dc:27:b7:8a:d8:70:c1:46:73: ea:df:03:d5:60:28:50:0c:25:71:3b:96:c4:0a:a4:a7: 08:2b:4d:48:63:cf:e2:40:4d:a0:ec:fb:57:5c:fd:5e: e3:33:8f:44:a9:f0:6a:10:62:e3:19:6f:8f:99:5d:f8: 27:96:96:aa:6d:93:b0:c3:a0:7b:b6:fc:aa:bd:09:25: 97:94:e9:1c:23:6b:1e:99:13:09:f8:2f:61:1a:33:a7: ca:ac:0f:63:42:fe:a2:b8:d0:c5:e0:19:cd:c5:32:71: 9a:4d:4e:cb:05:69:6b:56:0a:18:c7:fc:43:a0:48:9e: a5:fa:52:b9:7e:0e:b7:89:b0:b8:93:de:a6:b5:66:e9: 94:f6:e5:56:01:dd:b8:49:72:99:94:01:f2:2b:10:b2 Fingerprint (SHA-256): A3:36:85:DE:FB:AE:0B:D9:08:B8:F6:D0:61:91:0B:C4:8E:7D:BE:A6:63:1D:B5:E9:57:F7:81:A1:72:EF:0B:5B Fingerprint (SHA1): C9:86:47:F6:B8:77:C6:DF:30:3A:8D:C8:1D:1C:59:61:24:61:CF:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174422 (0x3cb01bd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:45 2023 Not After : Wed Oct 18 17:49:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:00:6b:81:74:dc:41:d6:cd:35:7c:83:f3:bf:cf:bb: ed:c2:43:4f:5c:80:a6:19:21:c5:ce:09:d8:07:65:30: 36:f0:d1:11:e6:24:a0:f5:19:e9:be:d3:e0:ed:37:c1: 39:09:4c:2b:65:4b:d9:d0:92:2a:bc:89:a2:c9:85:12: f1:a9:37:ae:0e:67:6b:39:6e:27:e9:ee:8d:40:e5:89: 98:51:62:2b:25:4a:71:03:ff:d2:f0:b2:80:2e:b7:3c: 3c:6c:82:00:79:94:2b:15:a7:bb:a9:bf:3a:e8:1b:3a: ca:f8:cb:d6:52:8d:3f:a8:98:d2:ef:b6:13:00:a4:12: e1:f9:a2:0f:8d:35:b4:41:fa:db:70:8b:70:c5:37:0a: c1:2e:2b:07:74:5f:6d:81:3f:23:20:96:37:b9:e6:a9: 6e:3d:5f:59:04:f5:75:76:d3:ec:82:90:03:2d:b7:84: 89:a2:1a:40:0d:41:69:a3:66:5c:cd:e2:6b:85:4a:cc: 34:6f:b9:2a:b5:74:05:6d:0d:1c:7c:9a:04:28:e6:ba: 97:fd:6a:40:82:2e:8b:77:aa:ee:dd:f2:16:a1:b0:e3: c3:35:55:79:4c:1c:ec:dd:e3:6c:41:4a:fc:70:59:ef: 7b:ee:eb:e8:92:25:9e:54:6b:f0:48:65:fe:bd:ce:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:cb:5b:75:82:47:b0:35:7c:2d:1c:ef:28:87:ff:3c: 10:22:19:49:86:8b:6b:a4:5e:e2:e0:e3:55:b8:9b:d7: 5f:c5:7b:cf:32:bd:33:ab:63:ee:62:70:9c:a4:5a:0f: 4e:3a:0a:cc:c4:9a:ef:9c:14:15:51:9c:f0:79:0e:23: ae:65:fd:7c:c5:59:73:58:ed:25:96:de:d6:14:ed:bb: 72:34:b1:57:d8:8a:fc:e1:73:95:f1:90:3b:0e:1a:10: 26:d3:be:c3:9b:46:b5:9b:41:ff:40:15:db:50:c7:7a: 5c:79:c2:4a:d2:b8:0b:51:22:13:99:b4:9a:00:14:4c: 6e:6b:dc:0e:32:bc:24:4b:88:12:c1:58:5f:04:f8:26: ae:94:c1:59:bf:0e:4a:9e:70:8c:a3:44:a5:a2:7e:8b: 28:12:60:27:2d:a3:51:dd:71:2e:9a:b3:0e:f8:11:b7: 9e:b5:8c:1e:a0:34:96:3b:f4:1c:a0:a3:3a:4d:b4:71: dc:57:ff:99:11:86:15:f4:0f:ff:46:32:5a:56:a5:be: a7:49:d9:f3:b9:e6:aa:07:b1:fa:59:60:56:c6:a8:64: 2e:d4:15:b4:ea:d9:25:78:2d:68:c6:8c:9d:a5:91:22: 20:e5:56:f5:63:59:55:2f:63:73:1a:ee:33:c1:cf:ae Fingerprint (SHA-256): B0:D2:14:34:10:C3:B4:DE:53:82:21:F2:A0:2D:BF:6E:2A:EA:07:5F:49:A4:B2:6E:70:45:7A:22:12:1D:30:EC Fingerprint (SHA1): A3:2D:B7:B0:13:5B:6C:00:6D:25:75:B2:B2:EC:FB:3B:D5:3C:3E:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174422 (0x3cb01bd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:45 2023 Not After : Wed Oct 18 17:49:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:00:6b:81:74:dc:41:d6:cd:35:7c:83:f3:bf:cf:bb: ed:c2:43:4f:5c:80:a6:19:21:c5:ce:09:d8:07:65:30: 36:f0:d1:11:e6:24:a0:f5:19:e9:be:d3:e0:ed:37:c1: 39:09:4c:2b:65:4b:d9:d0:92:2a:bc:89:a2:c9:85:12: f1:a9:37:ae:0e:67:6b:39:6e:27:e9:ee:8d:40:e5:89: 98:51:62:2b:25:4a:71:03:ff:d2:f0:b2:80:2e:b7:3c: 3c:6c:82:00:79:94:2b:15:a7:bb:a9:bf:3a:e8:1b:3a: ca:f8:cb:d6:52:8d:3f:a8:98:d2:ef:b6:13:00:a4:12: e1:f9:a2:0f:8d:35:b4:41:fa:db:70:8b:70:c5:37:0a: c1:2e:2b:07:74:5f:6d:81:3f:23:20:96:37:b9:e6:a9: 6e:3d:5f:59:04:f5:75:76:d3:ec:82:90:03:2d:b7:84: 89:a2:1a:40:0d:41:69:a3:66:5c:cd:e2:6b:85:4a:cc: 34:6f:b9:2a:b5:74:05:6d:0d:1c:7c:9a:04:28:e6:ba: 97:fd:6a:40:82:2e:8b:77:aa:ee:dd:f2:16:a1:b0:e3: c3:35:55:79:4c:1c:ec:dd:e3:6c:41:4a:fc:70:59:ef: 7b:ee:eb:e8:92:25:9e:54:6b:f0:48:65:fe:bd:ce:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:cb:5b:75:82:47:b0:35:7c:2d:1c:ef:28:87:ff:3c: 10:22:19:49:86:8b:6b:a4:5e:e2:e0:e3:55:b8:9b:d7: 5f:c5:7b:cf:32:bd:33:ab:63:ee:62:70:9c:a4:5a:0f: 4e:3a:0a:cc:c4:9a:ef:9c:14:15:51:9c:f0:79:0e:23: ae:65:fd:7c:c5:59:73:58:ed:25:96:de:d6:14:ed:bb: 72:34:b1:57:d8:8a:fc:e1:73:95:f1:90:3b:0e:1a:10: 26:d3:be:c3:9b:46:b5:9b:41:ff:40:15:db:50:c7:7a: 5c:79:c2:4a:d2:b8:0b:51:22:13:99:b4:9a:00:14:4c: 6e:6b:dc:0e:32:bc:24:4b:88:12:c1:58:5f:04:f8:26: ae:94:c1:59:bf:0e:4a:9e:70:8c:a3:44:a5:a2:7e:8b: 28:12:60:27:2d:a3:51:dd:71:2e:9a:b3:0e:f8:11:b7: 9e:b5:8c:1e:a0:34:96:3b:f4:1c:a0:a3:3a:4d:b4:71: dc:57:ff:99:11:86:15:f4:0f:ff:46:32:5a:56:a5:be: a7:49:d9:f3:b9:e6:aa:07:b1:fa:59:60:56:c6:a8:64: 2e:d4:15:b4:ea:d9:25:78:2d:68:c6:8c:9d:a5:91:22: 20:e5:56:f5:63:59:55:2f:63:73:1a:ee:33:c1:cf:ae Fingerprint (SHA-256): B0:D2:14:34:10:C3:B4:DE:53:82:21:F2:A0:2D:BF:6E:2A:EA:07:5F:49:A4:B2:6E:70:45:7A:22:12:1D:30:EC Fingerprint (SHA1): A3:2D:B7:B0:13:5B:6C:00:6D:25:75:B2:B2:EC:FB:3B:D5:3C:3E:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174421 (0x3cb01bd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:49:43 2023 Not After : Wed Oct 18 17:49:43 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:88:67:19:99:40:31:43:0a:d3:3c:8b:f1:d7:51:60: 56:2b:8e:9a:d4:9a:e2:b8:e8:a1:6c:ed:9f:12:fb:17: 80:17:ff:5b:34:ee:d2:df:79:7c:17:bc:52:d6:16:aa: bf:49:df:a0:1c:ad:d7:39:66:f2:e3:c5:66:ae:ff:75: cf:c7:b7:3c:5b:3d:83:0d:17:60:93:07:ab:6a:a3:0a: e1:8c:69:c8:9b:8a:c5:35:30:b5:6b:1f:c1:87:c8:99: 5a:e3:12:b4:c2:c6:5c:65:1f:6d:27:6d:90:4e:0c:43: c9:17:a0:f1:15:ba:72:5e:79:9f:c0:d9:e5:14:e6:e1: 92:ba:2e:12:4b:c4:fd:f7:d9:dd:16:bb:20:1d:09:fc: 4b:f9:28:c0:85:e3:c0:fc:60:e3:c9:51:b8:99:44:f0: 9a:35:3e:d6:39:c1:46:64:52:49:e3:d2:33:c0:26:5d: dd:de:24:30:26:f7:55:e3:fa:ac:22:3e:ab:d3:87:00: 6b:9d:d0:25:1b:61:46:17:37:f0:6f:17:e1:2e:c5:41: 17:b7:c1:47:00:cc:4e:c6:80:3a:f2:e3:cf:8e:b7:c9: d1:14:fb:23:8d:2c:af:ae:f7:04:49:d9:47:66:33:a9: f6:d9:73:ac:04:39:d9:1f:0f:e2:bf:37:fb:d9:8b:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:b6:7e:f0:e9:f9:51:2a:5b:2f:98:19:95:46:1e:37: 53:52:af:45:60:c9:d6:26:58:7c:22:1e:69:45:25:99: 31:73:3d:e6:dd:ac:62:e8:2b:1e:c3:3e:73:b3:03:3d: b1:ee:a6:c5:ad:c2:a8:0b:d2:a1:5d:6f:5f:72:ae:2e: a1:82:b5:97:69:e9:ae:b5:49:8e:5d:1e:9c:8c:32:c3: e0:b4:bf:2d:a2:1d:e1:fa:9c:25:9c:93:21:76:7e:b2: 59:fb:7a:ef:7c:f1:b1:dc:27:b7:8a:d8:70:c1:46:73: ea:df:03:d5:60:28:50:0c:25:71:3b:96:c4:0a:a4:a7: 08:2b:4d:48:63:cf:e2:40:4d:a0:ec:fb:57:5c:fd:5e: e3:33:8f:44:a9:f0:6a:10:62:e3:19:6f:8f:99:5d:f8: 27:96:96:aa:6d:93:b0:c3:a0:7b:b6:fc:aa:bd:09:25: 97:94:e9:1c:23:6b:1e:99:13:09:f8:2f:61:1a:33:a7: ca:ac:0f:63:42:fe:a2:b8:d0:c5:e0:19:cd:c5:32:71: 9a:4d:4e:cb:05:69:6b:56:0a:18:c7:fc:43:a0:48:9e: a5:fa:52:b9:7e:0e:b7:89:b0:b8:93:de:a6:b5:66:e9: 94:f6:e5:56:01:dd:b8:49:72:99:94:01:f2:2b:10:b2 Fingerprint (SHA-256): A3:36:85:DE:FB:AE:0B:D9:08:B8:F6:D0:61:91:0B:C4:8E:7D:BE:A6:63:1D:B5:E9:57:F7:81:A1:72:EF:0B:5B Fingerprint (SHA1): C9:86:47:F6:B8:77:C6:DF:30:3A:8D:C8:1D:1C:59:61:24:61:CF:47 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174422 (0x3cb01bd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:45 2023 Not After : Wed Oct 18 17:49:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:00:6b:81:74:dc:41:d6:cd:35:7c:83:f3:bf:cf:bb: ed:c2:43:4f:5c:80:a6:19:21:c5:ce:09:d8:07:65:30: 36:f0:d1:11:e6:24:a0:f5:19:e9:be:d3:e0:ed:37:c1: 39:09:4c:2b:65:4b:d9:d0:92:2a:bc:89:a2:c9:85:12: f1:a9:37:ae:0e:67:6b:39:6e:27:e9:ee:8d:40:e5:89: 98:51:62:2b:25:4a:71:03:ff:d2:f0:b2:80:2e:b7:3c: 3c:6c:82:00:79:94:2b:15:a7:bb:a9:bf:3a:e8:1b:3a: ca:f8:cb:d6:52:8d:3f:a8:98:d2:ef:b6:13:00:a4:12: e1:f9:a2:0f:8d:35:b4:41:fa:db:70:8b:70:c5:37:0a: c1:2e:2b:07:74:5f:6d:81:3f:23:20:96:37:b9:e6:a9: 6e:3d:5f:59:04:f5:75:76:d3:ec:82:90:03:2d:b7:84: 89:a2:1a:40:0d:41:69:a3:66:5c:cd:e2:6b:85:4a:cc: 34:6f:b9:2a:b5:74:05:6d:0d:1c:7c:9a:04:28:e6:ba: 97:fd:6a:40:82:2e:8b:77:aa:ee:dd:f2:16:a1:b0:e3: c3:35:55:79:4c:1c:ec:dd:e3:6c:41:4a:fc:70:59:ef: 7b:ee:eb:e8:92:25:9e:54:6b:f0:48:65:fe:bd:ce:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:cb:5b:75:82:47:b0:35:7c:2d:1c:ef:28:87:ff:3c: 10:22:19:49:86:8b:6b:a4:5e:e2:e0:e3:55:b8:9b:d7: 5f:c5:7b:cf:32:bd:33:ab:63:ee:62:70:9c:a4:5a:0f: 4e:3a:0a:cc:c4:9a:ef:9c:14:15:51:9c:f0:79:0e:23: ae:65:fd:7c:c5:59:73:58:ed:25:96:de:d6:14:ed:bb: 72:34:b1:57:d8:8a:fc:e1:73:95:f1:90:3b:0e:1a:10: 26:d3:be:c3:9b:46:b5:9b:41:ff:40:15:db:50:c7:7a: 5c:79:c2:4a:d2:b8:0b:51:22:13:99:b4:9a:00:14:4c: 6e:6b:dc:0e:32:bc:24:4b:88:12:c1:58:5f:04:f8:26: ae:94:c1:59:bf:0e:4a:9e:70:8c:a3:44:a5:a2:7e:8b: 28:12:60:27:2d:a3:51:dd:71:2e:9a:b3:0e:f8:11:b7: 9e:b5:8c:1e:a0:34:96:3b:f4:1c:a0:a3:3a:4d:b4:71: dc:57:ff:99:11:86:15:f4:0f:ff:46:32:5a:56:a5:be: a7:49:d9:f3:b9:e6:aa:07:b1:fa:59:60:56:c6:a8:64: 2e:d4:15:b4:ea:d9:25:78:2d:68:c6:8c:9d:a5:91:22: 20:e5:56:f5:63:59:55:2f:63:73:1a:ee:33:c1:cf:ae Fingerprint (SHA-256): B0:D2:14:34:10:C3:B4:DE:53:82:21:F2:A0:2D:BF:6E:2A:EA:07:5F:49:A4:B2:6E:70:45:7A:22:12:1D:30:EC Fingerprint (SHA1): A3:2D:B7:B0:13:5B:6C:00:6D:25:75:B2:B2:EC:FB:3B:D5:3C:3E:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174422 (0x3cb01bd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:49:45 2023 Not After : Wed Oct 18 17:49:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:00:6b:81:74:dc:41:d6:cd:35:7c:83:f3:bf:cf:bb: ed:c2:43:4f:5c:80:a6:19:21:c5:ce:09:d8:07:65:30: 36:f0:d1:11:e6:24:a0:f5:19:e9:be:d3:e0:ed:37:c1: 39:09:4c:2b:65:4b:d9:d0:92:2a:bc:89:a2:c9:85:12: f1:a9:37:ae:0e:67:6b:39:6e:27:e9:ee:8d:40:e5:89: 98:51:62:2b:25:4a:71:03:ff:d2:f0:b2:80:2e:b7:3c: 3c:6c:82:00:79:94:2b:15:a7:bb:a9:bf:3a:e8:1b:3a: ca:f8:cb:d6:52:8d:3f:a8:98:d2:ef:b6:13:00:a4:12: e1:f9:a2:0f:8d:35:b4:41:fa:db:70:8b:70:c5:37:0a: c1:2e:2b:07:74:5f:6d:81:3f:23:20:96:37:b9:e6:a9: 6e:3d:5f:59:04:f5:75:76:d3:ec:82:90:03:2d:b7:84: 89:a2:1a:40:0d:41:69:a3:66:5c:cd:e2:6b:85:4a:cc: 34:6f:b9:2a:b5:74:05:6d:0d:1c:7c:9a:04:28:e6:ba: 97:fd:6a:40:82:2e:8b:77:aa:ee:dd:f2:16:a1:b0:e3: c3:35:55:79:4c:1c:ec:dd:e3:6c:41:4a:fc:70:59:ef: 7b:ee:eb:e8:92:25:9e:54:6b:f0:48:65:fe:bd:ce:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:cb:5b:75:82:47:b0:35:7c:2d:1c:ef:28:87:ff:3c: 10:22:19:49:86:8b:6b:a4:5e:e2:e0:e3:55:b8:9b:d7: 5f:c5:7b:cf:32:bd:33:ab:63:ee:62:70:9c:a4:5a:0f: 4e:3a:0a:cc:c4:9a:ef:9c:14:15:51:9c:f0:79:0e:23: ae:65:fd:7c:c5:59:73:58:ed:25:96:de:d6:14:ed:bb: 72:34:b1:57:d8:8a:fc:e1:73:95:f1:90:3b:0e:1a:10: 26:d3:be:c3:9b:46:b5:9b:41:ff:40:15:db:50:c7:7a: 5c:79:c2:4a:d2:b8:0b:51:22:13:99:b4:9a:00:14:4c: 6e:6b:dc:0e:32:bc:24:4b:88:12:c1:58:5f:04:f8:26: ae:94:c1:59:bf:0e:4a:9e:70:8c:a3:44:a5:a2:7e:8b: 28:12:60:27:2d:a3:51:dd:71:2e:9a:b3:0e:f8:11:b7: 9e:b5:8c:1e:a0:34:96:3b:f4:1c:a0:a3:3a:4d:b4:71: dc:57:ff:99:11:86:15:f4:0f:ff:46:32:5a:56:a5:be: a7:49:d9:f3:b9:e6:aa:07:b1:fa:59:60:56:c6:a8:64: 2e:d4:15:b4:ea:d9:25:78:2d:68:c6:8c:9d:a5:91:22: 20:e5:56:f5:63:59:55:2f:63:73:1a:ee:33:c1:cf:ae Fingerprint (SHA-256): B0:D2:14:34:10:C3:B4:DE:53:82:21:F2:A0:2D:BF:6E:2A:EA:07:5F:49:A4:B2:6E:70:45:7A:22:12:1D:30:EC Fingerprint (SHA1): A3:2D:B7:B0:13:5B:6C:00:6D:25:75:B2:B2:EC:FB:3B:D5:3C:3E:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174429 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174430 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018174431 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018174432 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018174433 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018174434 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174435 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018174436 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174437 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174438 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174429 (0x3cb01bdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:50:02 2023 Not After : Wed Oct 18 17:50:02 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:55:1d:57:36:12:33:54:f6:7f:5f:8a:31:b6:1a:40: af:76:67:a4:94:a7:0a:f6:d1:44:a2:b4:45:e3:f7:4f: 87:a0:5b:96:d9:86:b5:ec:e4:a9:8b:dc:3f:4e:88:a8: f9:36:99:8c:04:76:ec:1d:f0:9b:a8:87:d6:4d:26:dc: fe:e6:4e:8b:6d:b5:b0:6b:f1:1f:01:2e:f7:22:39:aa: 98:de:4b:92:94:68:b3:4e:50:02:2b:20:5b:2e:b7:01: 19:37:ab:45:77:0a:70:d5:9c:09:c6:8f:24:84:f8:de: 1b:0b:9a:01:31:de:6b:84:d6:9f:a0:35:bd:65:d6:43: 34:70:e5:f1:9a:7e:91:3e:56:67:6e:5a:94:bb:8f:6f: 44:01:bc:a2:20:f8:89:49:ec:36:cf:5b:f8:77:20:31: bf:50:1d:a7:45:f8:1b:84:80:ba:51:8e:ce:c3:49:5a: ec:6e:f9:ed:36:07:b3:79:a9:65:06:0a:56:9d:1b:48: 26:ec:0d:fe:c0:0d:a9:9e:57:2e:13:44:2e:51:6f:60: d0:37:ad:96:b7:89:16:74:2e:2b:71:fe:28:c8:08:92: cb:76:4f:0e:af:7d:1a:ab:f8:36:de:a0:5c:40:dd:94: 50:a2:7c:54:af:e3:61:ca:4a:f2:0a:3a:b9:1f:59:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:f3:6c:0f:0f:6a:cb:54:d7:ac:49:8c:62:9f:6e:ca: da:bf:8e:6a:e1:36:4b:09:79:f1:ba:1b:ad:6c:21:e5: 84:55:8f:51:e6:db:2d:28:a0:7d:49:61:48:9a:9d:30: e8:24:4e:24:56:5a:fb:31:66:94:3e:e3:88:2c:4b:55: 0f:7a:97:e5:4a:ea:e5:a4:2a:3f:51:3c:fa:4d:9d:f0: 73:df:9a:61:34:eb:5e:0c:ac:dc:61:3f:1d:64:25:d9: 9b:fc:ee:fd:1b:ac:f5:21:62:35:a3:9c:9b:8f:7b:2b: 88:a0:f1:1e:9d:31:46:6b:08:ab:94:b6:7e:ac:b1:4d: 2a:c1:20:3c:46:1c:03:0a:c6:d6:f0:90:e5:b3:48:39: 8f:e9:39:71:60:e9:3a:71:85:f2:32:c1:3f:43:7f:d8: a7:d5:26:a9:8f:8e:47:75:85:54:be:86:8b:03:a7:88: 41:e2:b5:a2:b8:b2:ca:b4:32:51:0d:93:2b:46:91:23: 3a:5a:55:ec:3a:12:d7:2f:9b:ed:71:3c:f0:37:54:20: 6a:77:e0:d0:72:48:00:73:b1:0c:c1:1b:bf:52:4e:ad: cc:75:15:46:ad:7b:3a:6d:40:c8:40:33:70:ce:48:30: fb:f1:c4:08:3f:f9:40:c1:05:09:6c:5f:2f:0f:74:5a Fingerprint (SHA-256): 9E:60:35:D7:19:2D:8F:44:AD:5C:44:2D:69:4E:0A:1D:EC:0C:5F:C9:84:8A:E1:EF:7A:B0:CA:AE:5A:FF:44:98 Fingerprint (SHA1): 95:57:12:96:61:A1:D9:3B:20:C2:1A:DC:2B:94:89:74:D0:E1:E0:F9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174430 (0x3cb01bde) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:50:04 2023 Not After : Wed Oct 18 17:50:04 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:bc:d3:34:ba:c8:b0:de:73:08:6f:a7:9b:79:2f:5f: a0:cf:52:73:e8:36:19:b4:b8:bb:7e:bf:46:10:fe:dc: 28:50:f5:3d:fc:3d:0a:b4:e0:fd:c4:33:7f:04:f0:06: cb:c6:7a:27:4a:2b:c8:bb:9b:c4:c8:ac:e3:0e:48:e8: 73:cf:db:8a:e2:80:38:28:20:cf:21:a3:34:9c:99:9d: 5b:30:cf:ea:56:6f:e5:1e:ad:b0:a1:c0:2f:8e:f6:53: b1:18:d5:d8:11:43:cf:28:40:e7:f8:61:9d:75:fc:e3: c0:5c:6a:44:02:61:53:0a:76:ca:8c:5f:19:34:f4:a8: 3f:3a:77:ee:e1:e1:30:32:1c:71:df:b4:67:c3:19:bf: 5d:f2:cb:f1:3e:37:7e:a7:95:d1:f7:cd:a3:cc:68:6b: 39:d2:d6:51:02:53:cc:c9:d7:6b:99:e6:53:f9:11:08: b6:ae:0a:92:a4:51:aa:df:46:27:77:aa:98:9b:f6:82: 04:df:d6:98:f6:11:57:20:e2:27:f8:93:e9:d7:32:59: 77:2f:30:92:3f:1a:52:47:02:1b:e5:9d:87:ba:70:d8: 2a:e0:f7:d8:f7:71:a0:8b:bd:19:11:b4:30:aa:f0:bb: e6:04:f3:14:38:5a:f6:c1:f9:11:fd:50:cb:68:f4:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:14:8a:17:9e:7d:f3:50:79:a9:97:e6:17:36:bd:1f: bd:93:15:23:f0:e5:41:1d:b4:0a:38:c4:fc:8d:69:5c: 49:c8:c4:90:e2:61:01:d8:53:44:9d:80:39:b6:55:15: ee:6b:cd:aa:01:8b:41:8f:76:fd:07:44:ca:c1:b6:5b: aa:da:85:23:dd:dc:32:2a:8e:bc:e8:c3:a7:0f:58:34: e9:c9:7f:98:65:e4:12:39:c5:a6:aa:5c:6b:76:45:df: 1d:d8:10:5f:64:57:9d:6f:e5:47:38:cb:36:b9:cb:d2: 5c:be:32:e6:26:a0:04:71:f6:ba:29:e1:99:dd:7f:3b: 3d:06:52:9c:91:95:75:8d:31:60:3a:af:0a:2e:6e:8d: 1c:74:ea:53:4c:bb:00:c1:7f:4d:f5:58:ae:09:e5:5b: a9:05:c2:0d:f0:5c:a4:e3:a0:bb:72:c3:20:28:b0:2a: 51:a6:02:17:a7:d3:84:5f:80:a4:9c:7b:c9:36:58:5d: d3:fd:f7:6f:c0:93:b6:a1:d3:1e:b9:6e:38:84:30:bd: d1:a4:d4:35:64:94:73:16:45:89:74:1a:30:d8:3c:69: 75:a6:45:c4:15:ab:61:ef:d7:2d:f7:8f:00:bc:ad:7c: ab:51:8d:70:c0:c3:39:de:54:0a:e1:f9:ac:85:a1:87 Fingerprint (SHA-256): 74:C6:2A:CC:DA:02:91:0C:F5:EF:44:B5:9D:29:95:75:54:AA:C0:8E:3D:36:38:68:62:83:E1:80:E5:80:5C:EB Fingerprint (SHA1): 39:28:98:2C:7C:32:F0:D7:C2:1B:88:C8:BC:07:F5:B9:B0:EA:DA:B5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174439 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174440 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174441 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018174442 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174443 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018174444 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018174445 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018174446 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018174447 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174439 (0x3cb01be7) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:31 2023 Not After : Wed Oct 18 17:50:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 85:ee:2e:6c:42:78:ce:bc:18:cb:0b:f2:a4:ae:f4:65: d2:8c:7a:a1:3e:16:06:c3:d4:a3:ce:7a:24:d8:cb:70: 78:8b:59:49:9e:f2:58:90:c1:4d:21:54:85:87:d0:de: 13:6d:d7:61:ad:4c:53:b7:90:e4:a0:24:6b:b1:72:d8: ce:0f:c8:97:15:85:c3:2c:ec:d6:fe:49:9a:35:28:5d: 04:c3:4b:b2:6a:bf:8a:53:eb:cb:9e:ce:05:ad:e9:4f: cc:c1:0c:37:95:04:ff:e4:b6:a0:4c:d3:cd:b3:54:9c: e0:32:ba:0d:5f:fe:2b:5a:83:32:47:c3:35:8c:9d:ec: 30:0d:c6:86:3b:70:d7:c9:5e:f6:8e:4c:f9:1e:84:d0: d3:61:7c:87:f5:79:b2:1b:0a:fe:20:8c:58:ab:c8:81: dc:92:a0:79:23:b5:19:dd:79:f7:80:09:ea:83:13:e0: a4:5c:1a:e9:d7:49:b6:84:73:27:2c:a7:cc:00:15:78: f2:dc:1a:95:ad:66:e7:71:1f:aa:84:c1:be:30:9a:7b: 3a:e7:da:86:26:bb:9c:ae:3f:fd:70:9f:b4:cb:95:19: d4:63:6e:ff:dd:1a:63:80:8a:75:28:3d:92:fa:d0:4b: 9d:44:ce:61:67:4a:de:df:3f:fd:49:ad:13:5e:0a:86 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:59:e5:4f:0d:d6:72:65:7a:c7:7c:68:03: 32:1d:e5:db:11:64:fd:bf:bf:36:a4:19:59:d4:57:1a: 02:1d:00:a9:44:cd:da:5f:b3:3f:f5:9a:20:e8:c0:d2: 1f:47:69:6a:b3:db:76:59:01:b3:d9:86:01:6f:e3 Fingerprint (SHA-256): 09:DA:41:B8:3F:9E:7C:92:3D:5E:54:36:C3:AC:C4:25:3E:FE:F4:AB:F0:8C:0B:69:71:BF:8F:06:38:1A:A9:F9 Fingerprint (SHA1): 4E:22:EC:E7:0A:B0:D1:F3:CC:B8:D1:91:AA:19:6F:5C:2C:E8:D8:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174439 (0x3cb01be7) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:31 2023 Not After : Wed Oct 18 17:50:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 85:ee:2e:6c:42:78:ce:bc:18:cb:0b:f2:a4:ae:f4:65: d2:8c:7a:a1:3e:16:06:c3:d4:a3:ce:7a:24:d8:cb:70: 78:8b:59:49:9e:f2:58:90:c1:4d:21:54:85:87:d0:de: 13:6d:d7:61:ad:4c:53:b7:90:e4:a0:24:6b:b1:72:d8: ce:0f:c8:97:15:85:c3:2c:ec:d6:fe:49:9a:35:28:5d: 04:c3:4b:b2:6a:bf:8a:53:eb:cb:9e:ce:05:ad:e9:4f: cc:c1:0c:37:95:04:ff:e4:b6:a0:4c:d3:cd:b3:54:9c: e0:32:ba:0d:5f:fe:2b:5a:83:32:47:c3:35:8c:9d:ec: 30:0d:c6:86:3b:70:d7:c9:5e:f6:8e:4c:f9:1e:84:d0: d3:61:7c:87:f5:79:b2:1b:0a:fe:20:8c:58:ab:c8:81: dc:92:a0:79:23:b5:19:dd:79:f7:80:09:ea:83:13:e0: a4:5c:1a:e9:d7:49:b6:84:73:27:2c:a7:cc:00:15:78: f2:dc:1a:95:ad:66:e7:71:1f:aa:84:c1:be:30:9a:7b: 3a:e7:da:86:26:bb:9c:ae:3f:fd:70:9f:b4:cb:95:19: d4:63:6e:ff:dd:1a:63:80:8a:75:28:3d:92:fa:d0:4b: 9d:44:ce:61:67:4a:de:df:3f:fd:49:ad:13:5e:0a:86 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:59:e5:4f:0d:d6:72:65:7a:c7:7c:68:03: 32:1d:e5:db:11:64:fd:bf:bf:36:a4:19:59:d4:57:1a: 02:1d:00:a9:44:cd:da:5f:b3:3f:f5:9a:20:e8:c0:d2: 1f:47:69:6a:b3:db:76:59:01:b3:d9:86:01:6f:e3 Fingerprint (SHA-256): 09:DA:41:B8:3F:9E:7C:92:3D:5E:54:36:C3:AC:C4:25:3E:FE:F4:AB:F0:8C:0B:69:71:BF:8F:06:38:1A:A9:F9 Fingerprint (SHA1): 4E:22:EC:E7:0A:B0:D1:F3:CC:B8:D1:91:AA:19:6F:5C:2C:E8:D8:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174439 (0x3cb01be7) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:31 2023 Not After : Wed Oct 18 17:50:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 85:ee:2e:6c:42:78:ce:bc:18:cb:0b:f2:a4:ae:f4:65: d2:8c:7a:a1:3e:16:06:c3:d4:a3:ce:7a:24:d8:cb:70: 78:8b:59:49:9e:f2:58:90:c1:4d:21:54:85:87:d0:de: 13:6d:d7:61:ad:4c:53:b7:90:e4:a0:24:6b:b1:72:d8: ce:0f:c8:97:15:85:c3:2c:ec:d6:fe:49:9a:35:28:5d: 04:c3:4b:b2:6a:bf:8a:53:eb:cb:9e:ce:05:ad:e9:4f: cc:c1:0c:37:95:04:ff:e4:b6:a0:4c:d3:cd:b3:54:9c: e0:32:ba:0d:5f:fe:2b:5a:83:32:47:c3:35:8c:9d:ec: 30:0d:c6:86:3b:70:d7:c9:5e:f6:8e:4c:f9:1e:84:d0: d3:61:7c:87:f5:79:b2:1b:0a:fe:20:8c:58:ab:c8:81: dc:92:a0:79:23:b5:19:dd:79:f7:80:09:ea:83:13:e0: a4:5c:1a:e9:d7:49:b6:84:73:27:2c:a7:cc:00:15:78: f2:dc:1a:95:ad:66:e7:71:1f:aa:84:c1:be:30:9a:7b: 3a:e7:da:86:26:bb:9c:ae:3f:fd:70:9f:b4:cb:95:19: d4:63:6e:ff:dd:1a:63:80:8a:75:28:3d:92:fa:d0:4b: 9d:44:ce:61:67:4a:de:df:3f:fd:49:ad:13:5e:0a:86 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:59:e5:4f:0d:d6:72:65:7a:c7:7c:68:03: 32:1d:e5:db:11:64:fd:bf:bf:36:a4:19:59:d4:57:1a: 02:1d:00:a9:44:cd:da:5f:b3:3f:f5:9a:20:e8:c0:d2: 1f:47:69:6a:b3:db:76:59:01:b3:d9:86:01:6f:e3 Fingerprint (SHA-256): 09:DA:41:B8:3F:9E:7C:92:3D:5E:54:36:C3:AC:C4:25:3E:FE:F4:AB:F0:8C:0B:69:71:BF:8F:06:38:1A:A9:F9 Fingerprint (SHA1): 4E:22:EC:E7:0A:B0:D1:F3:CC:B8:D1:91:AA:19:6F:5C:2C:E8:D8:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174439 (0x3cb01be7) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:31 2023 Not After : Wed Oct 18 17:50:31 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 85:ee:2e:6c:42:78:ce:bc:18:cb:0b:f2:a4:ae:f4:65: d2:8c:7a:a1:3e:16:06:c3:d4:a3:ce:7a:24:d8:cb:70: 78:8b:59:49:9e:f2:58:90:c1:4d:21:54:85:87:d0:de: 13:6d:d7:61:ad:4c:53:b7:90:e4:a0:24:6b:b1:72:d8: ce:0f:c8:97:15:85:c3:2c:ec:d6:fe:49:9a:35:28:5d: 04:c3:4b:b2:6a:bf:8a:53:eb:cb:9e:ce:05:ad:e9:4f: cc:c1:0c:37:95:04:ff:e4:b6:a0:4c:d3:cd:b3:54:9c: e0:32:ba:0d:5f:fe:2b:5a:83:32:47:c3:35:8c:9d:ec: 30:0d:c6:86:3b:70:d7:c9:5e:f6:8e:4c:f9:1e:84:d0: d3:61:7c:87:f5:79:b2:1b:0a:fe:20:8c:58:ab:c8:81: dc:92:a0:79:23:b5:19:dd:79:f7:80:09:ea:83:13:e0: a4:5c:1a:e9:d7:49:b6:84:73:27:2c:a7:cc:00:15:78: f2:dc:1a:95:ad:66:e7:71:1f:aa:84:c1:be:30:9a:7b: 3a:e7:da:86:26:bb:9c:ae:3f:fd:70:9f:b4:cb:95:19: d4:63:6e:ff:dd:1a:63:80:8a:75:28:3d:92:fa:d0:4b: 9d:44:ce:61:67:4a:de:df:3f:fd:49:ad:13:5e:0a:86 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:59:e5:4f:0d:d6:72:65:7a:c7:7c:68:03: 32:1d:e5:db:11:64:fd:bf:bf:36:a4:19:59:d4:57:1a: 02:1d:00:a9:44:cd:da:5f:b3:3f:f5:9a:20:e8:c0:d2: 1f:47:69:6a:b3:db:76:59:01:b3:d9:86:01:6f:e3 Fingerprint (SHA-256): 09:DA:41:B8:3F:9E:7C:92:3D:5E:54:36:C3:AC:C4:25:3E:FE:F4:AB:F0:8C:0B:69:71:BF:8F:06:38:1A:A9:F9 Fingerprint (SHA1): 4E:22:EC:E7:0A:B0:D1:F3:CC:B8:D1:91:AA:19:6F:5C:2C:E8:D8:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018175105Z nextupdate=20241018175105Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:51:05 2023 Next Update: Fri Oct 18 17:51:05 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175105Z nextupdate=20241018175105Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:51:05 2023 Next Update: Fri Oct 18 17:51:05 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175106Z nextupdate=20241018175106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:51:06 2023 Next Update: Fri Oct 18 17:51:06 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018175106Z nextupdate=20241018175106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:51:06 2023 Next Update: Fri Oct 18 17:51:06 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175107Z addcert 14 20231018175107Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:51:07 2023 Next Update: Fri Oct 18 17:51:06 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 17:51:07 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175108Z addcert 15 20231018175108Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:51:08 2023 Next Update: Fri Oct 18 17:51:05 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 17:51:08 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:49 2023 Not After : Wed Oct 18 17:50:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:79:8a:a5:3e:ad:66:0f:6d:fa:2b:7f:b6:ff:79:7c: 60:11:5d:0f:ea:7b:a9:f1:ca:7a:90:c1:63:78:fe:31: 48:2d:ef:77:d6:7a:26:27:db:5d:d2:f4:6e:48:3d:7b: 60:08:ed:13:39:d6:59:cc:a7:c0:38:2e:19:65:ce:e9: 45:ab:f3:8b:43:e1:30:9f:dd:37:4d:a5:3a:dd:67:ef: 1c:bb:50:b5:70:26:5b:c4:f4:e1:e2:e5:c4:f2:65:8f: 7e:3b:36:44:20:20:d2:51:fd:87:c3:ec:7d:15:04:e1: 08:4f:3e:7a:6f:5b:b1:cc:67:0c:3c:94:63:53:ea:f8: f3:30:92:3b:63:a6:4c:08:6a:bf:f3:e3:3f:53:61:01: 5b:23:a8:9c:61:89:eb:3c:a5:b8:ae:58:87:a3:d5:0e: 89:a7:66:58:b8:2e:3b:4c:61:ea:b8:6c:07:0e:d6:99: 61:d0:b2:aa:3f:44:f9:72:dd:70:7d:a9:b0:5d:87:91: 1e:52:f2:2b:e8:95:42:97:c6:cd:31:56:5d:66:0c:d6: 35:0f:75:c1:7b:73:ad:07:9d:59:79:11:09:e9:52:97: 19:a7:a1:e3:3a:16:e4:a5:d0:51:4e:4a:29:78:da:e6: 4c:94:d7:d2:49:5a:21:9c:97:c7:cc:02:40:83:7b:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d4:03:55:3f:41:09:25:91:7b:cd:ba:96:fd:29:fb:04: 2f:46:46:b1:9a:df:94:bc:45:70:4e:49:c6:9e:d9:50: 04:61:53:a6:b7:79:37:83:81:26:15:48:85:8c:35:2d: bd:1c:e7:89:6d:f4:c3:59:59:a7:19:a0:73:6b:6f:01: 97:f9:9d:48:75:e9:7e:fc:91:bf:b3:54:e4:7c:84:15: 33:c7:4f:cb:fa:84:c5:9c:2d:8c:2d:cc:1d:08:e0:4f: f7:36:0b:52:7c:56:b5:72:24:fe:9a:68:fb:f9:ba:5c: 2a:7e:78:40:96:bf:e0:cd:cf:b1:bf:0c:1f:7d:0d:3f: 12:e1:ea:19:7a:37:3a:b4:d6:67:37:a2:ae:81:ea:8d: 33:2d:7e:29:e7:13:4f:8f:15:15:d0:28:63:b7:a2:bc: 49:48:a9:f9:fd:5f:fc:fb:41:e2:cf:77:7c:1c:62:17: 95:24:08:24:b7:15:06:b8:7e:d0:3e:53:da:59:5f:fd: b9:1f:e3:38:d2:49:c7:a5:d2:f9:a0:c0:06:e5:f5:8b: 80:25:3a:b5:69:b9:d2:39:67:28:c3:fd:2d:16:3c:7a: 32:30:ea:03:3d:76:f6:43:08:a0:79:c6:25:52:26:73: 1f:5c:f3:20:76:ed:a7:f0:a8:c3:5b:c3:6f:53:70:1c Fingerprint (SHA-256): 11:36:07:BD:CC:68:B4:BA:F0:5E:1A:4B:40:0C:7D:3B:45:B6:41:A8:79:99:78:3C:39:64:B1:97:FC:93:CC:C7 Fingerprint (SHA1): F6:4A:5B:0B:41:5C:23:4E:73:00:FC:91:53:66:6E:EA:93:6D:BE:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:50:49 2023 Not After : Wed Oct 18 17:50:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:79:8a:a5:3e:ad:66:0f:6d:fa:2b:7f:b6:ff:79:7c: 60:11:5d:0f:ea:7b:a9:f1:ca:7a:90:c1:63:78:fe:31: 48:2d:ef:77:d6:7a:26:27:db:5d:d2:f4:6e:48:3d:7b: 60:08:ed:13:39:d6:59:cc:a7:c0:38:2e:19:65:ce:e9: 45:ab:f3:8b:43:e1:30:9f:dd:37:4d:a5:3a:dd:67:ef: 1c:bb:50:b5:70:26:5b:c4:f4:e1:e2:e5:c4:f2:65:8f: 7e:3b:36:44:20:20:d2:51:fd:87:c3:ec:7d:15:04:e1: 08:4f:3e:7a:6f:5b:b1:cc:67:0c:3c:94:63:53:ea:f8: f3:30:92:3b:63:a6:4c:08:6a:bf:f3:e3:3f:53:61:01: 5b:23:a8:9c:61:89:eb:3c:a5:b8:ae:58:87:a3:d5:0e: 89:a7:66:58:b8:2e:3b:4c:61:ea:b8:6c:07:0e:d6:99: 61:d0:b2:aa:3f:44:f9:72:dd:70:7d:a9:b0:5d:87:91: 1e:52:f2:2b:e8:95:42:97:c6:cd:31:56:5d:66:0c:d6: 35:0f:75:c1:7b:73:ad:07:9d:59:79:11:09:e9:52:97: 19:a7:a1:e3:3a:16:e4:a5:d0:51:4e:4a:29:78:da:e6: 4c:94:d7:d2:49:5a:21:9c:97:c7:cc:02:40:83:7b:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d4:03:55:3f:41:09:25:91:7b:cd:ba:96:fd:29:fb:04: 2f:46:46:b1:9a:df:94:bc:45:70:4e:49:c6:9e:d9:50: 04:61:53:a6:b7:79:37:83:81:26:15:48:85:8c:35:2d: bd:1c:e7:89:6d:f4:c3:59:59:a7:19:a0:73:6b:6f:01: 97:f9:9d:48:75:e9:7e:fc:91:bf:b3:54:e4:7c:84:15: 33:c7:4f:cb:fa:84:c5:9c:2d:8c:2d:cc:1d:08:e0:4f: f7:36:0b:52:7c:56:b5:72:24:fe:9a:68:fb:f9:ba:5c: 2a:7e:78:40:96:bf:e0:cd:cf:b1:bf:0c:1f:7d:0d:3f: 12:e1:ea:19:7a:37:3a:b4:d6:67:37:a2:ae:81:ea:8d: 33:2d:7e:29:e7:13:4f:8f:15:15:d0:28:63:b7:a2:bc: 49:48:a9:f9:fd:5f:fc:fb:41:e2:cf:77:7c:1c:62:17: 95:24:08:24:b7:15:06:b8:7e:d0:3e:53:da:59:5f:fd: b9:1f:e3:38:d2:49:c7:a5:d2:f9:a0:c0:06:e5:f5:8b: 80:25:3a:b5:69:b9:d2:39:67:28:c3:fd:2d:16:3c:7a: 32:30:ea:03:3d:76:f6:43:08:a0:79:c6:25:52:26:73: 1f:5c:f3:20:76:ed:a7:f0:a8:c3:5b:c3:6f:53:70:1c Fingerprint (SHA-256): 11:36:07:BD:CC:68:B4:BA:F0:5E:1A:4B:40:0C:7D:3B:45:B6:41:A8:79:99:78:3C:39:64:B1:97:FC:93:CC:C7 Fingerprint (SHA1): F6:4A:5B:0B:41:5C:23:4E:73:00:FC:91:53:66:6E:EA:93:6D:BE:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174448 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018174449 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174324.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174308.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174324.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018174450 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174324.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174309.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018174451 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174324.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174310.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174324.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174311.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018175132Z nextupdate=20241018175132Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:51:32 2023 Next Update: Fri Oct 18 17:51:32 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175133Z nextupdate=20241018175133Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:51:33 2023 Next Update: Fri Oct 18 17:51:33 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175134Z nextupdate=20241018175134Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:51:34 2023 Next Update: Fri Oct 18 17:51:34 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018175134Z nextupdate=20241018175134Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:51:34 2023 Next Update: Fri Oct 18 17:51:34 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175135Z addcert 20 20231018175135Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:51:35 2023 Next Update: Fri Oct 18 17:51:33 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:51:35 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175136Z addcert 40 20231018175136Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:51:36 2023 Next Update: Fri Oct 18 17:51:33 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:51:35 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 17:51:36 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174448 (0x3cb01bf0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:51:14 2023 Not After : Wed Oct 18 17:51:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:78:48:9a:0f:1d:d7:84:d8:ed:56:48:14:88:52:50: 00:de:79:85:7b:23:46:49:d9:88:d2:48:c3:6d:16:bd: 65:19:1e:06:c0:c6:75:49:4e:e9:29:98:7c:bb:d5:7c: a8:50:82:ea:08:a7:2d:05:94:35:32:74:9f:4e:a9:f3: 49:0d:66:a2:3d:1c:62:dc:83:a5:07:64:8b:e6:1b:1a: 66:1f:a4:bd:12:6a:b5:a2:d8:fc:b5:96:cd:2e:48:1b: e4:f3:03:ab:bc:d8:2f:1d:7e:9e:34:4a:6f:83:f3:57: e2:e3:f5:14:0b:26:7c:9c:76:71:97:22:b3:8c:fb:72: 49:3c:81:4c:54:a0:fb:ef:a5:3f:26:df:4f:7e:05:f0: ae:dd:ef:24:22:79:5c:6b:42:fd:5d:ca:4e:38:a4:ea: e3:71:0e:ad:66:ec:53:b6:c7:de:3d:63:45:1a:a4:ee: 2c:e8:6f:30:9a:dd:d0:93:26:a3:cf:78:8a:4b:69:c5: e0:9a:6e:29:22:ab:48:19:a9:c1:14:4c:87:d2:8c:60: de:a4:3a:c5:d3:ff:89:d8:9a:0b:8c:b4:84:a7:f0:28: f7:b8:ea:7d:ed:ec:1f:fe:8e:a5:9c:0a:4b:b9:98:23: 17:bb:20:64:1f:6f:32:1d:ac:e7:03:48:e9:53:b6:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:d6:c8:f9:4f:f9:e8:09:4c:ca:c2:fb:6b:ff:3a: f1:db:6a:2e:2b:f0:a5:1d:57:f1:08:8b:f3:df:a3:77: d7:35:e9:5a:aa:87:62:51:b1:0d:f0:34:5a:0d:b3:7d: 3e:15:40:38:d5:7e:2b:80:7f:41:58:85:7f:3e:d6:98: 56:ab:ae:a5:bb:e4:b5:ce:eb:78:fe:88:91:20:f6:2f: 3a:45:a5:20:86:80:b0:e6:1c:43:41:c2:b4:a4:1a:ce: 54:34:1c:29:ae:fb:69:3f:75:fd:24:9b:31:0f:b5:15: 7a:ec:f7:6c:66:af:e5:f3:5d:5e:6b:0f:33:8c:74:e3: 07:3c:c9:05:d3:92:b0:fa:17:2b:69:16:ff:4a:d6:58: 9b:3b:1a:52:23:f7:73:2f:6a:d5:2e:d2:19:a4:63:fb: f6:1b:ec:17:7f:7d:ce:ae:f9:7e:02:cc:16:d1:e6:52: 25:04:1d:44:9e:b0:a8:d6:26:be:d5:49:ba:eb:64:11: 75:a0:47:bc:a7:0f:97:84:85:4f:52:8a:c7:1c:96:02: 17:6d:cc:90:65:64:fa:3a:c3:7b:fe:7e:14:13:6c:9c: 4b:c0:04:0d:98:98:38:18:81:ea:e9:46:73:f3:b6:4f: 32:0b:6e:a2:dd:f1:82:60:b1:07:06:5e:7d:5d:e4:7e Fingerprint (SHA-256): 07:32:E2:94:7C:6B:94:7A:CB:2C:DA:63:E0:48:E6:2D:9D:E5:93:A3:68:DF:6E:3D:A6:17:DD:6B:3E:C7:B3:34 Fingerprint (SHA1): 09:72:1A:EB:78:74:41:3A:C6:93:3B:17:59:F5:5E:AA:81:94:83:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174448 (0x3cb01bf0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:51:14 2023 Not After : Wed Oct 18 17:51:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:78:48:9a:0f:1d:d7:84:d8:ed:56:48:14:88:52:50: 00:de:79:85:7b:23:46:49:d9:88:d2:48:c3:6d:16:bd: 65:19:1e:06:c0:c6:75:49:4e:e9:29:98:7c:bb:d5:7c: a8:50:82:ea:08:a7:2d:05:94:35:32:74:9f:4e:a9:f3: 49:0d:66:a2:3d:1c:62:dc:83:a5:07:64:8b:e6:1b:1a: 66:1f:a4:bd:12:6a:b5:a2:d8:fc:b5:96:cd:2e:48:1b: e4:f3:03:ab:bc:d8:2f:1d:7e:9e:34:4a:6f:83:f3:57: e2:e3:f5:14:0b:26:7c:9c:76:71:97:22:b3:8c:fb:72: 49:3c:81:4c:54:a0:fb:ef:a5:3f:26:df:4f:7e:05:f0: ae:dd:ef:24:22:79:5c:6b:42:fd:5d:ca:4e:38:a4:ea: e3:71:0e:ad:66:ec:53:b6:c7:de:3d:63:45:1a:a4:ee: 2c:e8:6f:30:9a:dd:d0:93:26:a3:cf:78:8a:4b:69:c5: e0:9a:6e:29:22:ab:48:19:a9:c1:14:4c:87:d2:8c:60: de:a4:3a:c5:d3:ff:89:d8:9a:0b:8c:b4:84:a7:f0:28: f7:b8:ea:7d:ed:ec:1f:fe:8e:a5:9c:0a:4b:b9:98:23: 17:bb:20:64:1f:6f:32:1d:ac:e7:03:48:e9:53:b6:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:a9:d6:c8:f9:4f:f9:e8:09:4c:ca:c2:fb:6b:ff:3a: f1:db:6a:2e:2b:f0:a5:1d:57:f1:08:8b:f3:df:a3:77: d7:35:e9:5a:aa:87:62:51:b1:0d:f0:34:5a:0d:b3:7d: 3e:15:40:38:d5:7e:2b:80:7f:41:58:85:7f:3e:d6:98: 56:ab:ae:a5:bb:e4:b5:ce:eb:78:fe:88:91:20:f6:2f: 3a:45:a5:20:86:80:b0:e6:1c:43:41:c2:b4:a4:1a:ce: 54:34:1c:29:ae:fb:69:3f:75:fd:24:9b:31:0f:b5:15: 7a:ec:f7:6c:66:af:e5:f3:5d:5e:6b:0f:33:8c:74:e3: 07:3c:c9:05:d3:92:b0:fa:17:2b:69:16:ff:4a:d6:58: 9b:3b:1a:52:23:f7:73:2f:6a:d5:2e:d2:19:a4:63:fb: f6:1b:ec:17:7f:7d:ce:ae:f9:7e:02:cc:16:d1:e6:52: 25:04:1d:44:9e:b0:a8:d6:26:be:d5:49:ba:eb:64:11: 75:a0:47:bc:a7:0f:97:84:85:4f:52:8a:c7:1c:96:02: 17:6d:cc:90:65:64:fa:3a:c3:7b:fe:7e:14:13:6c:9c: 4b:c0:04:0d:98:98:38:18:81:ea:e9:46:73:f3:b6:4f: 32:0b:6e:a2:dd:f1:82:60:b1:07:06:5e:7d:5d:e4:7e Fingerprint (SHA-256): 07:32:E2:94:7C:6B:94:7A:CB:2C:DA:63:E0:48:E6:2D:9D:E5:93:A3:68:DF:6E:3D:A6:17:DD:6B:3E:C7:B3:34 Fingerprint (SHA1): 09:72:1A:EB:78:74:41:3A:C6:93:3B:17:59:F5:5E:AA:81:94:83:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174452 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174453 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174454 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018174455 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174456 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018174457 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018174458 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174452 (0x3cb01bf4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:51:41 2023 Not After : Wed Oct 18 17:51:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:29:bd:3c:cc:ee:0f:74:32:22:32:18:cc:82:c8:fa: 6f:44:04:9c:cd:e1:0f:2c:30:58:14:56:ee:c2:2c:33: a5:14:c7:84:f6:4b:48:90:c2:4c:c7:c8:ce:84:a0:c9: af:06:9c:ce:1c:8c:13:16:f0:c5:d5:a8:37:37:b3:a5: b6:c7:91:b8:7a:b4:12:5f:2f:11:75:e7:68:b1:23:83: 3e:64:f6:d6:f7:ce:64:6e:a3:72:b3:6e:68:02:bb:04: 5d:62:eb:f2:48:61:ed:f3:36:6d:c2:90:8a:34:8f:1b: 62:27:21:80:d8:01:d0:32:f9:49:64:69:30:6e:60:08: d4:85:c8:b9:3f:71:fb:66:79:bc:95:df:90:84:8c:ef: 67:26:07:b3:ca:d5:67:7d:5b:c0:eb:6f:4e:cf:2a:af: 45:3d:a9:b5:5e:da:3b:4c:39:3f:5c:84:5c:e0:e2:a3: ca:64:6d:0c:25:a6:6e:2f:f8:8f:f4:de:89:72:33:38: 17:43:03:bc:76:81:63:8d:cd:b9:61:48:2a:7c:fc:fa: f4:ac:22:dd:ab:27:b6:a6:9e:5e:e0:cc:d6:dd:d8:9f: 01:74:3e:c2:5c:73:11:58:91:39:bf:35:97:d2:ae:d3: 7f:3e:3f:c2:19:4e:4d:ca:fd:dc:d5:10:b8:77:c2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:06:89:1e:ea:19:7c:70:7d:d8:12:12:92:d4:e9:4b: 52:97:7d:70:d4:57:33:89:c5:8f:b0:8d:11:72:7d:ba: 93:49:7c:ec:eb:db:59:d1:e1:7d:6e:d8:3a:78:e2:4c: 0e:0c:14:42:89:17:84:83:bc:3a:81:4e:77:e0:36:8d: 1f:73:aa:4c:3b:93:aa:06:0c:f2:43:67:98:24:5d:71: 2d:96:14:b9:ff:29:5c:b0:3e:f5:d3:5e:83:8b:4b:b1: 90:27:8f:3b:f7:61:3d:03:d0:28:f9:4c:73:dc:7d:2c: da:db:cc:18:a0:37:09:8e:b2:57:ec:72:81:24:e4:c3: 40:db:f8:a6:df:d7:25:62:49:b9:21:06:14:8f:1e:e6: 79:a9:03:08:f4:4c:02:c4:d6:2a:e8:1c:04:57:1a:d0: be:92:e8:12:f5:96:9c:e6:f5:72:01:2d:58:c9:a4:12: 30:7a:5a:c2:f9:ba:7a:01:dd:b5:6d:bb:f0:f1:53:8d: cb:45:75:98:1d:47:d4:8c:39:18:33:ab:80:d9:2d:31: 2e:aa:43:1a:1b:b9:df:b9:b6:a4:57:d2:68:c7:51:f8: 52:22:50:fb:f6:be:ca:00:b7:ab:27:8d:36:cf:39:7f: c2:30:da:dd:61:6f:84:82:f9:f3:cc:cf:7b:be:a6:4b Fingerprint (SHA-256): 1F:26:E1:B7:C9:33:9A:CE:4F:0A:23:62:CF:B3:CC:FE:72:31:92:BB:E7:25:03:23:04:ED:E9:97:7C:CE:2A:A1 Fingerprint (SHA1): C7:0B:C3:3A:81:D8:1A:87:BA:E9:A9:8A:BA:B8:D1:22:E5:4F:74:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174454 (0x3cb01bf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:51:46 2023 Not After : Wed Oct 18 17:51:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:5b:4f:75:86:36:81:0f:a3:a2:30:bf:8d:0c:22:c1: 23:02:d3:ba:27:06:7d:90:01:11:15:5b:f3:d1:c0:dc: 6c:41:f7:1d:f8:66:8c:9c:73:6a:20:e1:19:cf:72:f6: 1f:79:55:f5:27:f5:a9:df:66:80:6e:f1:79:79:f0:9b: ee:ef:40:c8:db:dd:a6:f2:5a:cd:2b:07:86:66:33:18: d8:49:1f:c4:a7:87:36:b9:af:63:f5:2a:8b:23:14:7c: 9f:8c:5a:36:66:4c:12:d8:6e:04:3c:1a:d0:f9:c4:a8: 20:21:af:ad:53:2c:7b:d3:50:af:31:cb:d5:09:83:e5: ef:6f:25:e6:ec:5a:27:dc:43:de:31:c5:7e:09:6e:fa: 65:ff:f9:a2:4c:5f:58:9f:80:ca:f1:cb:77:b5:47:e1: b2:a5:e5:c7:ea:98:bd:f4:36:d4:ad:45:85:f3:d1:6e: 19:2b:8d:8d:39:15:5c:b2:f6:79:5e:e4:cb:37:3d:57: 1d:0c:ac:5a:e0:86:ee:03:f3:27:20:87:41:7a:1e:41: 00:28:08:01:eb:5d:6a:2d:a6:cb:43:94:bc:1b:1e:d5: 9c:17:4a:e2:82:5c:fb:59:1a:ec:74:6d:3d:93:e3:fa: 82:7b:e4:f3:74:00:fa:c9:0e:4d:1a:32:76:d4:44:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:51:88:f1:38:06:c5:06:f2:90:e4:e2:f5:8e:1d:42: ba:5b:89:73:e4:ea:a6:7a:17:fe:02:2d:1e:cc:5e:70: f5:8a:b9:f7:c5:f0:22:51:62:51:b7:63:e0:3d:bb:8d: 0f:8c:c2:e5:5c:f5:5c:65:74:a6:c1:24:78:78:4e:40: c8:6a:84:fb:b1:e0:ac:db:9e:69:96:8e:11:d6:6a:91: 70:74:ad:6b:00:c8:f7:ac:c0:6f:ec:99:48:f3:ed:3e: 68:00:22:54:b3:c5:f1:58:ee:13:8f:7e:ea:d3:57:c2: 93:d2:8c:de:a4:00:6d:6d:2c:6d:32:f9:2e:7a:73:c3: e5:7d:2e:19:2b:e4:04:9c:db:5d:c1:cf:19:81:cd:a5: ca:95:c1:37:9d:d2:fe:8c:1f:7f:8f:b3:47:f8:6d:22: d9:07:54:2a:ef:8a:b3:f6:28:d7:45:29:70:11:57:41: 06:ec:d6:08:52:be:85:ad:d1:62:e3:0c:e3:3a:99:67: b7:5e:fc:cc:b4:91:1a:00:e5:93:62:fc:d5:49:7b:e5: c3:9a:9d:76:9a:99:69:6a:bb:ce:cb:b6:51:ed:10:a6: d5:e1:03:ba:6d:26:00:78:2f:20:0f:67:09:ef:6a:f5: ea:a2:26:76:80:6f:2e:ab:40:6b:ad:90:28:99:d7:9f Fingerprint (SHA-256): BD:8A:BE:33:4F:01:8D:AA:F9:92:CE:8C:22:43:8C:DA:52:AA:8D:7B:09:58:BB:13:33:41:66:D1:2B:3D:3B:24 Fingerprint (SHA1): B9:AE:1B:69:4E:7C:7F:B2:EE:80:A5:30:43:3B:14:51:DA:7C:FF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174452 (0x3cb01bf4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:51:41 2023 Not After : Wed Oct 18 17:51:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:29:bd:3c:cc:ee:0f:74:32:22:32:18:cc:82:c8:fa: 6f:44:04:9c:cd:e1:0f:2c:30:58:14:56:ee:c2:2c:33: a5:14:c7:84:f6:4b:48:90:c2:4c:c7:c8:ce:84:a0:c9: af:06:9c:ce:1c:8c:13:16:f0:c5:d5:a8:37:37:b3:a5: b6:c7:91:b8:7a:b4:12:5f:2f:11:75:e7:68:b1:23:83: 3e:64:f6:d6:f7:ce:64:6e:a3:72:b3:6e:68:02:bb:04: 5d:62:eb:f2:48:61:ed:f3:36:6d:c2:90:8a:34:8f:1b: 62:27:21:80:d8:01:d0:32:f9:49:64:69:30:6e:60:08: d4:85:c8:b9:3f:71:fb:66:79:bc:95:df:90:84:8c:ef: 67:26:07:b3:ca:d5:67:7d:5b:c0:eb:6f:4e:cf:2a:af: 45:3d:a9:b5:5e:da:3b:4c:39:3f:5c:84:5c:e0:e2:a3: ca:64:6d:0c:25:a6:6e:2f:f8:8f:f4:de:89:72:33:38: 17:43:03:bc:76:81:63:8d:cd:b9:61:48:2a:7c:fc:fa: f4:ac:22:dd:ab:27:b6:a6:9e:5e:e0:cc:d6:dd:d8:9f: 01:74:3e:c2:5c:73:11:58:91:39:bf:35:97:d2:ae:d3: 7f:3e:3f:c2:19:4e:4d:ca:fd:dc:d5:10:b8:77:c2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:06:89:1e:ea:19:7c:70:7d:d8:12:12:92:d4:e9:4b: 52:97:7d:70:d4:57:33:89:c5:8f:b0:8d:11:72:7d:ba: 93:49:7c:ec:eb:db:59:d1:e1:7d:6e:d8:3a:78:e2:4c: 0e:0c:14:42:89:17:84:83:bc:3a:81:4e:77:e0:36:8d: 1f:73:aa:4c:3b:93:aa:06:0c:f2:43:67:98:24:5d:71: 2d:96:14:b9:ff:29:5c:b0:3e:f5:d3:5e:83:8b:4b:b1: 90:27:8f:3b:f7:61:3d:03:d0:28:f9:4c:73:dc:7d:2c: da:db:cc:18:a0:37:09:8e:b2:57:ec:72:81:24:e4:c3: 40:db:f8:a6:df:d7:25:62:49:b9:21:06:14:8f:1e:e6: 79:a9:03:08:f4:4c:02:c4:d6:2a:e8:1c:04:57:1a:d0: be:92:e8:12:f5:96:9c:e6:f5:72:01:2d:58:c9:a4:12: 30:7a:5a:c2:f9:ba:7a:01:dd:b5:6d:bb:f0:f1:53:8d: cb:45:75:98:1d:47:d4:8c:39:18:33:ab:80:d9:2d:31: 2e:aa:43:1a:1b:b9:df:b9:b6:a4:57:d2:68:c7:51:f8: 52:22:50:fb:f6:be:ca:00:b7:ab:27:8d:36:cf:39:7f: c2:30:da:dd:61:6f:84:82:f9:f3:cc:cf:7b:be:a6:4b Fingerprint (SHA-256): 1F:26:E1:B7:C9:33:9A:CE:4F:0A:23:62:CF:B3:CC:FE:72:31:92:BB:E7:25:03:23:04:ED:E9:97:7C:CE:2A:A1 Fingerprint (SHA1): C7:0B:C3:3A:81:D8:1A:87:BA:E9:A9:8A:BA:B8:D1:22:E5:4F:74:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174452 (0x3cb01bf4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:51:41 2023 Not After : Wed Oct 18 17:51:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:29:bd:3c:cc:ee:0f:74:32:22:32:18:cc:82:c8:fa: 6f:44:04:9c:cd:e1:0f:2c:30:58:14:56:ee:c2:2c:33: a5:14:c7:84:f6:4b:48:90:c2:4c:c7:c8:ce:84:a0:c9: af:06:9c:ce:1c:8c:13:16:f0:c5:d5:a8:37:37:b3:a5: b6:c7:91:b8:7a:b4:12:5f:2f:11:75:e7:68:b1:23:83: 3e:64:f6:d6:f7:ce:64:6e:a3:72:b3:6e:68:02:bb:04: 5d:62:eb:f2:48:61:ed:f3:36:6d:c2:90:8a:34:8f:1b: 62:27:21:80:d8:01:d0:32:f9:49:64:69:30:6e:60:08: d4:85:c8:b9:3f:71:fb:66:79:bc:95:df:90:84:8c:ef: 67:26:07:b3:ca:d5:67:7d:5b:c0:eb:6f:4e:cf:2a:af: 45:3d:a9:b5:5e:da:3b:4c:39:3f:5c:84:5c:e0:e2:a3: ca:64:6d:0c:25:a6:6e:2f:f8:8f:f4:de:89:72:33:38: 17:43:03:bc:76:81:63:8d:cd:b9:61:48:2a:7c:fc:fa: f4:ac:22:dd:ab:27:b6:a6:9e:5e:e0:cc:d6:dd:d8:9f: 01:74:3e:c2:5c:73:11:58:91:39:bf:35:97:d2:ae:d3: 7f:3e:3f:c2:19:4e:4d:ca:fd:dc:d5:10:b8:77:c2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:06:89:1e:ea:19:7c:70:7d:d8:12:12:92:d4:e9:4b: 52:97:7d:70:d4:57:33:89:c5:8f:b0:8d:11:72:7d:ba: 93:49:7c:ec:eb:db:59:d1:e1:7d:6e:d8:3a:78:e2:4c: 0e:0c:14:42:89:17:84:83:bc:3a:81:4e:77:e0:36:8d: 1f:73:aa:4c:3b:93:aa:06:0c:f2:43:67:98:24:5d:71: 2d:96:14:b9:ff:29:5c:b0:3e:f5:d3:5e:83:8b:4b:b1: 90:27:8f:3b:f7:61:3d:03:d0:28:f9:4c:73:dc:7d:2c: da:db:cc:18:a0:37:09:8e:b2:57:ec:72:81:24:e4:c3: 40:db:f8:a6:df:d7:25:62:49:b9:21:06:14:8f:1e:e6: 79:a9:03:08:f4:4c:02:c4:d6:2a:e8:1c:04:57:1a:d0: be:92:e8:12:f5:96:9c:e6:f5:72:01:2d:58:c9:a4:12: 30:7a:5a:c2:f9:ba:7a:01:dd:b5:6d:bb:f0:f1:53:8d: cb:45:75:98:1d:47:d4:8c:39:18:33:ab:80:d9:2d:31: 2e:aa:43:1a:1b:b9:df:b9:b6:a4:57:d2:68:c7:51:f8: 52:22:50:fb:f6:be:ca:00:b7:ab:27:8d:36:cf:39:7f: c2:30:da:dd:61:6f:84:82:f9:f3:cc:cf:7b:be:a6:4b Fingerprint (SHA-256): 1F:26:E1:B7:C9:33:9A:CE:4F:0A:23:62:CF:B3:CC:FE:72:31:92:BB:E7:25:03:23:04:ED:E9:97:7C:CE:2A:A1 Fingerprint (SHA1): C7:0B:C3:3A:81:D8:1A:87:BA:E9:A9:8A:BA:B8:D1:22:E5:4F:74:07 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174454 (0x3cb01bf6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:51:46 2023 Not After : Wed Oct 18 17:51:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:5b:4f:75:86:36:81:0f:a3:a2:30:bf:8d:0c:22:c1: 23:02:d3:ba:27:06:7d:90:01:11:15:5b:f3:d1:c0:dc: 6c:41:f7:1d:f8:66:8c:9c:73:6a:20:e1:19:cf:72:f6: 1f:79:55:f5:27:f5:a9:df:66:80:6e:f1:79:79:f0:9b: ee:ef:40:c8:db:dd:a6:f2:5a:cd:2b:07:86:66:33:18: d8:49:1f:c4:a7:87:36:b9:af:63:f5:2a:8b:23:14:7c: 9f:8c:5a:36:66:4c:12:d8:6e:04:3c:1a:d0:f9:c4:a8: 20:21:af:ad:53:2c:7b:d3:50:af:31:cb:d5:09:83:e5: ef:6f:25:e6:ec:5a:27:dc:43:de:31:c5:7e:09:6e:fa: 65:ff:f9:a2:4c:5f:58:9f:80:ca:f1:cb:77:b5:47:e1: b2:a5:e5:c7:ea:98:bd:f4:36:d4:ad:45:85:f3:d1:6e: 19:2b:8d:8d:39:15:5c:b2:f6:79:5e:e4:cb:37:3d:57: 1d:0c:ac:5a:e0:86:ee:03:f3:27:20:87:41:7a:1e:41: 00:28:08:01:eb:5d:6a:2d:a6:cb:43:94:bc:1b:1e:d5: 9c:17:4a:e2:82:5c:fb:59:1a:ec:74:6d:3d:93:e3:fa: 82:7b:e4:f3:74:00:fa:c9:0e:4d:1a:32:76:d4:44:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:51:88:f1:38:06:c5:06:f2:90:e4:e2:f5:8e:1d:42: ba:5b:89:73:e4:ea:a6:7a:17:fe:02:2d:1e:cc:5e:70: f5:8a:b9:f7:c5:f0:22:51:62:51:b7:63:e0:3d:bb:8d: 0f:8c:c2:e5:5c:f5:5c:65:74:a6:c1:24:78:78:4e:40: c8:6a:84:fb:b1:e0:ac:db:9e:69:96:8e:11:d6:6a:91: 70:74:ad:6b:00:c8:f7:ac:c0:6f:ec:99:48:f3:ed:3e: 68:00:22:54:b3:c5:f1:58:ee:13:8f:7e:ea:d3:57:c2: 93:d2:8c:de:a4:00:6d:6d:2c:6d:32:f9:2e:7a:73:c3: e5:7d:2e:19:2b:e4:04:9c:db:5d:c1:cf:19:81:cd:a5: ca:95:c1:37:9d:d2:fe:8c:1f:7f:8f:b3:47:f8:6d:22: d9:07:54:2a:ef:8a:b3:f6:28:d7:45:29:70:11:57:41: 06:ec:d6:08:52:be:85:ad:d1:62:e3:0c:e3:3a:99:67: b7:5e:fc:cc:b4:91:1a:00:e5:93:62:fc:d5:49:7b:e5: c3:9a:9d:76:9a:99:69:6a:bb:ce:cb:b6:51:ed:10:a6: d5:e1:03:ba:6d:26:00:78:2f:20:0f:67:09:ef:6a:f5: ea:a2:26:76:80:6f:2e:ab:40:6b:ad:90:28:99:d7:9f Fingerprint (SHA-256): BD:8A:BE:33:4F:01:8D:AA:F9:92:CE:8C:22:43:8C:DA:52:AA:8D:7B:09:58:BB:13:33:41:66:D1:2B:3D:3B:24 Fingerprint (SHA1): B9:AE:1B:69:4E:7C:7F:B2:EE:80:A5:30:43:3B:14:51:DA:7C:FF:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174452 (0x3cb01bf4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:51:41 2023 Not After : Wed Oct 18 17:51:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:29:bd:3c:cc:ee:0f:74:32:22:32:18:cc:82:c8:fa: 6f:44:04:9c:cd:e1:0f:2c:30:58:14:56:ee:c2:2c:33: a5:14:c7:84:f6:4b:48:90:c2:4c:c7:c8:ce:84:a0:c9: af:06:9c:ce:1c:8c:13:16:f0:c5:d5:a8:37:37:b3:a5: b6:c7:91:b8:7a:b4:12:5f:2f:11:75:e7:68:b1:23:83: 3e:64:f6:d6:f7:ce:64:6e:a3:72:b3:6e:68:02:bb:04: 5d:62:eb:f2:48:61:ed:f3:36:6d:c2:90:8a:34:8f:1b: 62:27:21:80:d8:01:d0:32:f9:49:64:69:30:6e:60:08: d4:85:c8:b9:3f:71:fb:66:79:bc:95:df:90:84:8c:ef: 67:26:07:b3:ca:d5:67:7d:5b:c0:eb:6f:4e:cf:2a:af: 45:3d:a9:b5:5e:da:3b:4c:39:3f:5c:84:5c:e0:e2:a3: ca:64:6d:0c:25:a6:6e:2f:f8:8f:f4:de:89:72:33:38: 17:43:03:bc:76:81:63:8d:cd:b9:61:48:2a:7c:fc:fa: f4:ac:22:dd:ab:27:b6:a6:9e:5e:e0:cc:d6:dd:d8:9f: 01:74:3e:c2:5c:73:11:58:91:39:bf:35:97:d2:ae:d3: 7f:3e:3f:c2:19:4e:4d:ca:fd:dc:d5:10:b8:77:c2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:06:89:1e:ea:19:7c:70:7d:d8:12:12:92:d4:e9:4b: 52:97:7d:70:d4:57:33:89:c5:8f:b0:8d:11:72:7d:ba: 93:49:7c:ec:eb:db:59:d1:e1:7d:6e:d8:3a:78:e2:4c: 0e:0c:14:42:89:17:84:83:bc:3a:81:4e:77:e0:36:8d: 1f:73:aa:4c:3b:93:aa:06:0c:f2:43:67:98:24:5d:71: 2d:96:14:b9:ff:29:5c:b0:3e:f5:d3:5e:83:8b:4b:b1: 90:27:8f:3b:f7:61:3d:03:d0:28:f9:4c:73:dc:7d:2c: da:db:cc:18:a0:37:09:8e:b2:57:ec:72:81:24:e4:c3: 40:db:f8:a6:df:d7:25:62:49:b9:21:06:14:8f:1e:e6: 79:a9:03:08:f4:4c:02:c4:d6:2a:e8:1c:04:57:1a:d0: be:92:e8:12:f5:96:9c:e6:f5:72:01:2d:58:c9:a4:12: 30:7a:5a:c2:f9:ba:7a:01:dd:b5:6d:bb:f0:f1:53:8d: cb:45:75:98:1d:47:d4:8c:39:18:33:ab:80:d9:2d:31: 2e:aa:43:1a:1b:b9:df:b9:b6:a4:57:d2:68:c7:51:f8: 52:22:50:fb:f6:be:ca:00:b7:ab:27:8d:36:cf:39:7f: c2:30:da:dd:61:6f:84:82:f9:f3:cc:cf:7b:be:a6:4b Fingerprint (SHA-256): 1F:26:E1:B7:C9:33:9A:CE:4F:0A:23:62:CF:B3:CC:FE:72:31:92:BB:E7:25:03:23:04:ED:E9:97:7C:CE:2A:A1 Fingerprint (SHA1): C7:0B:C3:3A:81:D8:1A:87:BA:E9:A9:8A:BA:B8:D1:22:E5:4F:74:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174456 (0x3cb01bf8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:51:50 2023 Not After : Wed Oct 18 17:51:50 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fd:f6:64:5f:c9:f7:9d:e9:0a:97:63:a1:2f:68:97:16: 79:ba:75:97:b6:b7:44:37:84:e6:f5:9a:5c:4b:a2:c4: 7e:e0:c6:4d:67:97:d2:e0:9a:3a:6b:53:38:04:87:ed: 6b:fa:d6:07:eb:48:94:4a:8e:9f:1d:77:cc:10:65:7f: 87:96:40:57:cc:7f:bc:15:16:8a:c3:bc:07:2a:19:e1: 0c:bb:8e:0e:8a:61:7b:b4:8b:90:d7:fc:c2:6a:bc:f6: 66:7e:61:89:37:76:c0:96:cd:9c:31:86:fd:33:5f:1f: f9:0b:29:27:6c:f4:c9:2e:94:09:de:88:40:b5:21:a5: 7f:be:e4:d7:dd:91:a7:37:31:c9:5a:45:ff:10:99:1a: a7:27:03:8c:10:92:dd:55:d5:72:d8:6f:d5:32:ea:ea: dc:e8:a1:39:5e:98:91:01:6e:fe:a0:68:49:a6:16:69: ec:36:49:51:78:44:4d:2e:dd:a1:c1:42:f2:a9:3c:6a: b8:62:3b:62:89:bf:b1:ac:7b:af:d0:36:4f:e3:dd:84: 5c:2b:ff:45:42:72:e1:7d:e0:d9:a8:a1:9b:c5:13:1f: b0:75:af:df:fa:a3:3b:c7:24:2a:88:ce:74:af:7c:7c: 6d:06:81:aa:a2:ab:37:cc:50:9b:2d:06:80:9b:54:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:45:d0:5e:bc:a6:0d:c7:5e:20:35:9c:4f:67:5a:f3: d1:70:c7:22:62:d8:c4:45:a4:49:ba:41:46:33:ee:cb: 33:4b:f0:22:c5:52:6f:6a:47:c9:0c:2c:8e:fc:6e:c2: 68:73:07:42:81:fc:bf:b8:e3:cf:03:c4:9b:a7:56:8f: e9:7d:14:d5:58:17:12:b3:f9:42:c3:53:57:c3:e9:39: a2:38:1a:3f:bb:cb:90:17:14:19:2b:c7:76:57:c4:84: 2b:eb:40:4d:f1:aa:6f:bf:be:9e:c6:a4:ea:b5:e6:f0: 6d:a7:46:6b:78:ed:0f:13:79:a6:4f:f4:a8:7a:41:cd: cd:97:d5:e1:8b:64:9c:3b:5c:e0:aa:6b:e8:36:2e:30: 13:f5:22:c1:0f:d2:e1:01:15:fb:8a:35:ac:ed:85:ad: 5d:ae:b8:ee:c9:90:aa:5c:ee:e4:74:e6:18:ba:08:bb: 71:55:bd:1b:e9:b4:a2:6d:5c:2d:82:b4:43:62:f6:93: 75:83:cc:11:2f:c1:a1:3b:da:01:0f:d8:bc:77:56:d5: 92:22:ce:9f:45:88:3e:b8:7e:cb:32:42:b1:15:c7:f8: bb:3f:87:14:33:31:b0:67:9a:38:ae:4e:0d:f3:ef:68: 7f:01:ca:cd:6b:83:9b:f1:9a:60:b2:f9:65:8b:e5:45 Fingerprint (SHA-256): 13:3B:2B:BF:F2:99:35:8E:42:E0:6B:A4:89:73:94:84:D4:03:FD:0D:2C:0C:95:15:12:D7:6C:5E:4F:79:BF:49 Fingerprint (SHA1): D5:E5:36:71:3F:9F:46:52:32:90:E2:5D:7D:A9:BA:97:97:52:65:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174452 (0x3cb01bf4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:51:41 2023 Not After : Wed Oct 18 17:51:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:29:bd:3c:cc:ee:0f:74:32:22:32:18:cc:82:c8:fa: 6f:44:04:9c:cd:e1:0f:2c:30:58:14:56:ee:c2:2c:33: a5:14:c7:84:f6:4b:48:90:c2:4c:c7:c8:ce:84:a0:c9: af:06:9c:ce:1c:8c:13:16:f0:c5:d5:a8:37:37:b3:a5: b6:c7:91:b8:7a:b4:12:5f:2f:11:75:e7:68:b1:23:83: 3e:64:f6:d6:f7:ce:64:6e:a3:72:b3:6e:68:02:bb:04: 5d:62:eb:f2:48:61:ed:f3:36:6d:c2:90:8a:34:8f:1b: 62:27:21:80:d8:01:d0:32:f9:49:64:69:30:6e:60:08: d4:85:c8:b9:3f:71:fb:66:79:bc:95:df:90:84:8c:ef: 67:26:07:b3:ca:d5:67:7d:5b:c0:eb:6f:4e:cf:2a:af: 45:3d:a9:b5:5e:da:3b:4c:39:3f:5c:84:5c:e0:e2:a3: ca:64:6d:0c:25:a6:6e:2f:f8:8f:f4:de:89:72:33:38: 17:43:03:bc:76:81:63:8d:cd:b9:61:48:2a:7c:fc:fa: f4:ac:22:dd:ab:27:b6:a6:9e:5e:e0:cc:d6:dd:d8:9f: 01:74:3e:c2:5c:73:11:58:91:39:bf:35:97:d2:ae:d3: 7f:3e:3f:c2:19:4e:4d:ca:fd:dc:d5:10:b8:77:c2:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:06:89:1e:ea:19:7c:70:7d:d8:12:12:92:d4:e9:4b: 52:97:7d:70:d4:57:33:89:c5:8f:b0:8d:11:72:7d:ba: 93:49:7c:ec:eb:db:59:d1:e1:7d:6e:d8:3a:78:e2:4c: 0e:0c:14:42:89:17:84:83:bc:3a:81:4e:77:e0:36:8d: 1f:73:aa:4c:3b:93:aa:06:0c:f2:43:67:98:24:5d:71: 2d:96:14:b9:ff:29:5c:b0:3e:f5:d3:5e:83:8b:4b:b1: 90:27:8f:3b:f7:61:3d:03:d0:28:f9:4c:73:dc:7d:2c: da:db:cc:18:a0:37:09:8e:b2:57:ec:72:81:24:e4:c3: 40:db:f8:a6:df:d7:25:62:49:b9:21:06:14:8f:1e:e6: 79:a9:03:08:f4:4c:02:c4:d6:2a:e8:1c:04:57:1a:d0: be:92:e8:12:f5:96:9c:e6:f5:72:01:2d:58:c9:a4:12: 30:7a:5a:c2:f9:ba:7a:01:dd:b5:6d:bb:f0:f1:53:8d: cb:45:75:98:1d:47:d4:8c:39:18:33:ab:80:d9:2d:31: 2e:aa:43:1a:1b:b9:df:b9:b6:a4:57:d2:68:c7:51:f8: 52:22:50:fb:f6:be:ca:00:b7:ab:27:8d:36:cf:39:7f: c2:30:da:dd:61:6f:84:82:f9:f3:cc:cf:7b:be:a6:4b Fingerprint (SHA-256): 1F:26:E1:B7:C9:33:9A:CE:4F:0A:23:62:CF:B3:CC:FE:72:31:92:BB:E7:25:03:23:04:ED:E9:97:7C:CE:2A:A1 Fingerprint (SHA1): C7:0B:C3:3A:81:D8:1A:87:BA:E9:A9:8A:BA:B8:D1:22:E5:4F:74:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174457 (0x3cb01bf9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:51:52 2023 Not After : Wed Oct 18 17:51:52 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:1a:c3:fd:a4:5d:1e:7b:0d:1c:1b:c4:c7:39:e9:6d: 12:70:60:84:06:25:57:9d:53:96:93:c3:65:4e:ec:8e: ec:de:dd:c5:f9:ae:c8:f9:6d:6e:01:a2:ad:b8:22:4b: b5:01:25:34:78:01:61:e0:f2:93:7b:85:94:e6:d9:4b: a4:b7:28:f1:a5:61:11:9f:d9:8a:8e:bf:9e:b0:d8:c1: e7:51:84:e7:1c:48:a7:3a:ab:29:8e:53:2e:2a:44:bc: a5:da:a5:7c:a6:e9:95:68:5e:15:92:bd:6e:b0:e2:07: 0b:88:87:a1:66:f2:66:5e:62:95:72:93:1e:0a:87:a8: 6a:4d:75:43:66:0b:d7:91:2d:90:2c:4e:6b:a7:b5:40: a5:32:50:8c:82:c6:de:76:7f:05:bd:d1:25:5d:73:ea: bb:e4:e7:f2:b1:22:ce:e2:36:e3:53:67:57:38:99:1d: 11:50:0b:38:69:3a:8b:e6:2a:24:99:e8:91:43:11:ad: 4c:59:9d:f0:65:f2:e1:5d:ab:ec:4c:a4:7d:5d:72:df: 83:5e:e2:12:81:ba:a8:dc:74:f0:c2:8a:65:00:8e:14: b7:4f:82:d5:cd:8a:45:7d:01:2e:3f:56:84:df:23:9f: 79:6c:e2:73:cc:ed:b7:09:7c:41:fe:42:33:82:f0:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 70:19:58:ba:d2:17:ed:e7:9c:34:a9:5f:0f:c2:74:5c: d8:3a:87:b1:75:50:8b:c1:66:a3:2e:53:c9:fa:38:d2: cb:e7:67:17:25:65:09:67:42:6b:8e:71:f6:65:b8:b9: cd:a7:c1:e4:95:5b:a3:70:07:8c:a7:c4:b4:65:40:32: d9:dd:01:d9:ed:bc:74:76:8f:16:c0:5d:d8:e3:59:c6: 26:66:30:b4:5b:07:f5:00:c9:97:d9:6a:e6:cc:68:a0: 35:1c:40:4e:07:13:55:59:81:56:90:08:22:6c:c4:58: 48:0a:d3:a9:24:6d:bf:9a:47:46:81:d4:94:52:f5:03: e3:aa:ac:f2:91:58:2a:c9:39:36:f9:41:a1:b5:6e:99: c6:5b:c1:64:7f:9d:3f:7c:ef:9f:b3:88:58:a9:53:c2: 73:20:0a:80:f4:23:62:fa:cc:07:91:96:9f:e5:7a:f3: ba:7f:33:cf:4d:a5:9b:8f:a2:ad:f2:f6:65:36:89:91: 2e:c4:b1:0f:16:79:e9:8b:04:48:bd:d4:bd:1a:1f:2f: 6d:df:46:f8:1c:3a:82:b9:a3:d7:05:64:41:68:30:32: bd:9d:a2:7c:f7:ab:69:0e:fb:8a:92:89:6e:14:89:cd: a4:2b:c9:b9:b7:ae:85:58:11:65:01:e1:86:f8:db:bd Fingerprint (SHA-256): 9F:F5:82:5C:F0:A2:90:F0:CB:F1:15:FB:9B:5A:6F:CB:D5:26:B2:67:28:79:D1:1C:50:20:E7:C1:D2:A9:25:51 Fingerprint (SHA1): 34:4D:08:4F:D5:D2:58:5C:90:BB:F0:25:55:C6:77:28:54:29:51:30 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 19663 at Wed Oct 18 17:52:10 UTC 2023 kill -USR1 19663 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 19663 killed at Wed Oct 18 17:52:10 UTC 2023 httpserv starting at Wed Oct 18 17:52:10 UTC 2023 httpserv -D -p 9365 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.27434 & trying to connect to httpserv at Wed Oct 18 17:52:10 UTC 2023 tstclnt -4 -p 9365 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9365 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 31979 >/dev/null 2>/dev/null httpserv with PID 31979 found at Wed Oct 18 17:52:11 UTC 2023 httpserv with PID 31979 started at Wed Oct 18 17:52:11 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174459 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174460 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174461 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174462 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018174463 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174460 (0x3cb01bfc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:52:15 2023 Not After : Wed Oct 18 17:52:15 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:fb:8c:77:8f:4a:66:91:af:29:ac:2c:19:b4:d0:25: a6:b0:a5:ba:98:b5:cf:8a:24:05:7d:29:d2:0f:63:b8: 88:58:8a:b8:44:83:64:83:e1:de:bc:b1:0c:21:38:e6: 57:42:7c:eb:30:d5:91:b5:b3:18:71:58:08:41:ad:4a: ae:94:77:06:a2:ac:a7:e4:f0:2b:d6:c7:73:73:be:02: 6e:2b:fd:68:73:90:f4:32:8a:cd:7a:6f:bb:d2:a3:da: 2e:de:48:ad:3a:8d:a7:d5:fc:f4:3d:73:73:f9:68:f2: 0e:46:7a:bd:a9:ae:9c:74:c6:eb:e3:5e:4d:6b:d7:38: ce:69:92:0a:d5:c7:40:bd:cc:1c:47:a0:10:c0:c3:8e: c7:b5:f0:9d:5a:31:6d:b9:54:d6:88:26:e0:19:cd:39: b4:0f:28:d2:fd:ce:7c:6b:95:60:25:48:55:9a:f7:33: 93:fc:4c:2f:10:92:51:22:d1:b3:d7:f6:5a:07:e4:58: 58:44:06:31:81:d9:44:2d:0e:b5:b8:28:90:ad:0f:3c: 50:61:be:73:c0:05:46:a4:74:ca:18:d0:2b:37:0a:fe: e0:b6:88:6e:e0:3d:f8:e2:1d:e1:73:6f:73:28:5d:e1: a5:b6:98:c2:77:9f:03:6c:c7:04:96:b8:ac:78:bf:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:78:85:33:00:d5:44:cd:2e:61:35:97:cd:17:17:d0: 36:d6:12:9d:1c:15:8c:80:39:e7:05:d7:5a:53:cd:6a: 6b:21:05:62:a7:ba:dc:ce:61:2b:e7:6d:ad:02:d3:2a: b9:2f:80:ae:68:6c:a1:54:e3:fe:28:13:ba:da:8e:8b: 1e:9e:67:af:d0:6f:d5:06:e4:95:62:20:00:de:84:c7: 57:8e:8a:5b:27:d8:2d:19:60:10:19:f2:1a:3a:62:0a: 0c:30:7e:07:77:a9:cf:e6:c6:34:66:cd:3d:6c:53:e1: b3:34:84:6c:3d:84:74:50:48:41:4e:ce:55:55:05:a4: dc:21:58:fd:cc:2e:16:51:59:12:08:e4:af:f6:f7:ff: 2b:3f:a9:53:bf:d3:f9:57:21:ba:50:73:ee:6b:f4:81: bd:35:0c:dc:10:52:cd:23:1d:26:60:f7:fe:22:e4:19: 9e:8d:47:cf:56:a5:ee:5b:79:4b:11:6d:bd:81:5c:8c: cd:ff:9a:76:fa:f0:13:c7:7b:6d:5b:75:9f:bb:39:f1: b8:cc:75:68:90:b8:2d:20:70:d1:53:bb:38:3d:55:13: 97:1c:9a:87:98:e7:07:79:24:52:d3:92:3b:52:83:7a: 70:a3:6a:27:19:78:cf:f5:83:c2:87:9f:4e:8b:20:41 Fingerprint (SHA-256): 44:21:E6:0F:F7:78:AD:6F:74:81:26:FF:8A:02:4D:91:D6:23:FA:6E:45:71:89:7D:4F:4E:CA:98:5B:8C:7E:E9 Fingerprint (SHA1): DD:AF:6A:36:F6:70:33:35:DE:61:1C:F3:95:AA:3E:B5:5E:E8:9E:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174459 (0x3cb01bfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:52:12 2023 Not After : Wed Oct 18 17:52:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:05:f5:ec:1f:90:94:95:30:cd:5a:be:74:fb:ff:4a: fa:2c:8a:89:00:45:0d:00:25:5d:39:1b:23:3e:2d:36: 77:6a:85:64:8e:88:3e:d2:f5:d7:9a:58:03:05:33:09: 49:ee:fd:de:73:af:65:9a:e6:2b:5f:9e:c3:66:de:38: a2:18:ca:33:85:98:93:05:22:0d:93:bb:44:11:fe:4a: 4b:4e:79:ae:e0:3a:cc:7a:31:b8:e4:57:0f:88:90:4c: 18:e8:9a:0f:e2:27:a3:81:c0:73:07:65:e3:82:a6:3a: 16:2e:58:d2:f3:ea:a0:e7:c3:88:97:f2:e6:36:06:8b: 7f:73:e9:ce:df:74:19:61:e9:82:ce:89:d0:5b:b4:61: 16:65:3e:fd:ec:e0:b8:90:90:a5:5b:19:56:e9:fa:63: 77:cd:d6:79:e3:4f:b4:6d:53:ca:da:fa:34:ce:cb:40: 50:b7:62:42:34:88:d5:4a:1c:9f:10:aa:38:8d:8a:f7: cf:59:2d:06:47:c2:a1:71:2b:9f:2b:73:1d:cf:d2:9e: 69:33:bf:73:c6:43:3d:f6:50:19:52:eb:65:d5:1c:fd: a3:28:94:c2:ef:9e:ba:4b:b3:a2:cf:53:09:04:6b:97: 63:57:3a:24:e6:b3:77:7d:bd:e1:cd:2b:76:9b:1e:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:00:4b:b3:bb:85:5d:fc:c6:f0:19:b0:6e:05:c5:d0: 6c:b4:a2:4d:a9:f3:d7:a2:85:4d:50:1d:9a:1d:43:a9: 23:f9:8b:22:af:2d:5e:81:7a:0c:be:bf:9b:44:ec:79: 8d:61:e7:d1:1a:c0:af:36:27:85:37:dd:e2:0e:ba:ba: ae:05:e5:7a:93:77:c8:80:91:d3:e9:eb:d0:fb:f8:c1: 3f:a9:87:90:69:b2:dc:02:96:06:f2:39:9a:38:0c:d5: 0a:b1:d7:7b:cf:dc:6d:25:47:0e:01:2b:bb:7e:ef:08: f5:8f:87:5e:74:cd:a4:6e:aa:2a:63:57:34:f8:ee:65: 3e:50:75:3f:f0:23:3f:a3:3f:9b:dd:a1:6a:78:53:e7: 23:94:c2:49:09:0c:9c:9b:f0:82:de:b5:69:2f:49:dd: 67:95:33:b3:4f:aa:73:34:74:03:a1:c5:51:68:0a:43: e6:01:9b:0b:fe:7d:b4:6a:b0:7a:28:9f:6e:bb:b7:5e: ee:4d:d8:55:68:b9:50:97:2b:8a:d8:62:43:0f:4f:a4: 0a:a2:73:8b:50:b6:8b:2c:d1:c7:3e:63:0f:f1:98:61: 3a:cb:8e:23:dd:af:9a:b7:c2:b1:69:6e:57:31:b8:23: f1:61:57:90:3c:5a:f3:85:32:36:2d:57:69:93:5c:96 Fingerprint (SHA-256): 7F:D5:57:6D:14:F5:3B:19:3A:8C:32:5A:6F:37:D7:F5:D1:E8:B3:D1:DF:22:48:DD:B6:EF:D4:57:AE:4E:92:B7 Fingerprint (SHA1): 47:D3:E5:DF:F8:ED:61:4A:52:97:25:7B:5C:44:C0:EF:DE:93:8C:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174459 (0x3cb01bfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:52:12 2023 Not After : Wed Oct 18 17:52:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:05:f5:ec:1f:90:94:95:30:cd:5a:be:74:fb:ff:4a: fa:2c:8a:89:00:45:0d:00:25:5d:39:1b:23:3e:2d:36: 77:6a:85:64:8e:88:3e:d2:f5:d7:9a:58:03:05:33:09: 49:ee:fd:de:73:af:65:9a:e6:2b:5f:9e:c3:66:de:38: a2:18:ca:33:85:98:93:05:22:0d:93:bb:44:11:fe:4a: 4b:4e:79:ae:e0:3a:cc:7a:31:b8:e4:57:0f:88:90:4c: 18:e8:9a:0f:e2:27:a3:81:c0:73:07:65:e3:82:a6:3a: 16:2e:58:d2:f3:ea:a0:e7:c3:88:97:f2:e6:36:06:8b: 7f:73:e9:ce:df:74:19:61:e9:82:ce:89:d0:5b:b4:61: 16:65:3e:fd:ec:e0:b8:90:90:a5:5b:19:56:e9:fa:63: 77:cd:d6:79:e3:4f:b4:6d:53:ca:da:fa:34:ce:cb:40: 50:b7:62:42:34:88:d5:4a:1c:9f:10:aa:38:8d:8a:f7: cf:59:2d:06:47:c2:a1:71:2b:9f:2b:73:1d:cf:d2:9e: 69:33:bf:73:c6:43:3d:f6:50:19:52:eb:65:d5:1c:fd: a3:28:94:c2:ef:9e:ba:4b:b3:a2:cf:53:09:04:6b:97: 63:57:3a:24:e6:b3:77:7d:bd:e1:cd:2b:76:9b:1e:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:00:4b:b3:bb:85:5d:fc:c6:f0:19:b0:6e:05:c5:d0: 6c:b4:a2:4d:a9:f3:d7:a2:85:4d:50:1d:9a:1d:43:a9: 23:f9:8b:22:af:2d:5e:81:7a:0c:be:bf:9b:44:ec:79: 8d:61:e7:d1:1a:c0:af:36:27:85:37:dd:e2:0e:ba:ba: ae:05:e5:7a:93:77:c8:80:91:d3:e9:eb:d0:fb:f8:c1: 3f:a9:87:90:69:b2:dc:02:96:06:f2:39:9a:38:0c:d5: 0a:b1:d7:7b:cf:dc:6d:25:47:0e:01:2b:bb:7e:ef:08: f5:8f:87:5e:74:cd:a4:6e:aa:2a:63:57:34:f8:ee:65: 3e:50:75:3f:f0:23:3f:a3:3f:9b:dd:a1:6a:78:53:e7: 23:94:c2:49:09:0c:9c:9b:f0:82:de:b5:69:2f:49:dd: 67:95:33:b3:4f:aa:73:34:74:03:a1:c5:51:68:0a:43: e6:01:9b:0b:fe:7d:b4:6a:b0:7a:28:9f:6e:bb:b7:5e: ee:4d:d8:55:68:b9:50:97:2b:8a:d8:62:43:0f:4f:a4: 0a:a2:73:8b:50:b6:8b:2c:d1:c7:3e:63:0f:f1:98:61: 3a:cb:8e:23:dd:af:9a:b7:c2:b1:69:6e:57:31:b8:23: f1:61:57:90:3c:5a:f3:85:32:36:2d:57:69:93:5c:96 Fingerprint (SHA-256): 7F:D5:57:6D:14:F5:3B:19:3A:8C:32:5A:6F:37:D7:F5:D1:E8:B3:D1:DF:22:48:DD:B6:EF:D4:57:AE:4E:92:B7 Fingerprint (SHA1): 47:D3:E5:DF:F8:ED:61:4A:52:97:25:7B:5C:44:C0:EF:DE:93:8C:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174460 (0x3cb01bfc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:52:15 2023 Not After : Wed Oct 18 17:52:15 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:fb:8c:77:8f:4a:66:91:af:29:ac:2c:19:b4:d0:25: a6:b0:a5:ba:98:b5:cf:8a:24:05:7d:29:d2:0f:63:b8: 88:58:8a:b8:44:83:64:83:e1:de:bc:b1:0c:21:38:e6: 57:42:7c:eb:30:d5:91:b5:b3:18:71:58:08:41:ad:4a: ae:94:77:06:a2:ac:a7:e4:f0:2b:d6:c7:73:73:be:02: 6e:2b:fd:68:73:90:f4:32:8a:cd:7a:6f:bb:d2:a3:da: 2e:de:48:ad:3a:8d:a7:d5:fc:f4:3d:73:73:f9:68:f2: 0e:46:7a:bd:a9:ae:9c:74:c6:eb:e3:5e:4d:6b:d7:38: ce:69:92:0a:d5:c7:40:bd:cc:1c:47:a0:10:c0:c3:8e: c7:b5:f0:9d:5a:31:6d:b9:54:d6:88:26:e0:19:cd:39: b4:0f:28:d2:fd:ce:7c:6b:95:60:25:48:55:9a:f7:33: 93:fc:4c:2f:10:92:51:22:d1:b3:d7:f6:5a:07:e4:58: 58:44:06:31:81:d9:44:2d:0e:b5:b8:28:90:ad:0f:3c: 50:61:be:73:c0:05:46:a4:74:ca:18:d0:2b:37:0a:fe: e0:b6:88:6e:e0:3d:f8:e2:1d:e1:73:6f:73:28:5d:e1: a5:b6:98:c2:77:9f:03:6c:c7:04:96:b8:ac:78:bf:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:78:85:33:00:d5:44:cd:2e:61:35:97:cd:17:17:d0: 36:d6:12:9d:1c:15:8c:80:39:e7:05:d7:5a:53:cd:6a: 6b:21:05:62:a7:ba:dc:ce:61:2b:e7:6d:ad:02:d3:2a: b9:2f:80:ae:68:6c:a1:54:e3:fe:28:13:ba:da:8e:8b: 1e:9e:67:af:d0:6f:d5:06:e4:95:62:20:00:de:84:c7: 57:8e:8a:5b:27:d8:2d:19:60:10:19:f2:1a:3a:62:0a: 0c:30:7e:07:77:a9:cf:e6:c6:34:66:cd:3d:6c:53:e1: b3:34:84:6c:3d:84:74:50:48:41:4e:ce:55:55:05:a4: dc:21:58:fd:cc:2e:16:51:59:12:08:e4:af:f6:f7:ff: 2b:3f:a9:53:bf:d3:f9:57:21:ba:50:73:ee:6b:f4:81: bd:35:0c:dc:10:52:cd:23:1d:26:60:f7:fe:22:e4:19: 9e:8d:47:cf:56:a5:ee:5b:79:4b:11:6d:bd:81:5c:8c: cd:ff:9a:76:fa:f0:13:c7:7b:6d:5b:75:9f:bb:39:f1: b8:cc:75:68:90:b8:2d:20:70:d1:53:bb:38:3d:55:13: 97:1c:9a:87:98:e7:07:79:24:52:d3:92:3b:52:83:7a: 70:a3:6a:27:19:78:cf:f5:83:c2:87:9f:4e:8b:20:41 Fingerprint (SHA-256): 44:21:E6:0F:F7:78:AD:6F:74:81:26:FF:8A:02:4D:91:D6:23:FA:6E:45:71:89:7D:4F:4E:CA:98:5B:8C:7E:E9 Fingerprint (SHA1): DD:AF:6A:36:F6:70:33:35:DE:61:1C:F3:95:AA:3E:B5:5E:E8:9E:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174460 (0x3cb01bfc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:52:15 2023 Not After : Wed Oct 18 17:52:15 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:fb:8c:77:8f:4a:66:91:af:29:ac:2c:19:b4:d0:25: a6:b0:a5:ba:98:b5:cf:8a:24:05:7d:29:d2:0f:63:b8: 88:58:8a:b8:44:83:64:83:e1:de:bc:b1:0c:21:38:e6: 57:42:7c:eb:30:d5:91:b5:b3:18:71:58:08:41:ad:4a: ae:94:77:06:a2:ac:a7:e4:f0:2b:d6:c7:73:73:be:02: 6e:2b:fd:68:73:90:f4:32:8a:cd:7a:6f:bb:d2:a3:da: 2e:de:48:ad:3a:8d:a7:d5:fc:f4:3d:73:73:f9:68:f2: 0e:46:7a:bd:a9:ae:9c:74:c6:eb:e3:5e:4d:6b:d7:38: ce:69:92:0a:d5:c7:40:bd:cc:1c:47:a0:10:c0:c3:8e: c7:b5:f0:9d:5a:31:6d:b9:54:d6:88:26:e0:19:cd:39: b4:0f:28:d2:fd:ce:7c:6b:95:60:25:48:55:9a:f7:33: 93:fc:4c:2f:10:92:51:22:d1:b3:d7:f6:5a:07:e4:58: 58:44:06:31:81:d9:44:2d:0e:b5:b8:28:90:ad:0f:3c: 50:61:be:73:c0:05:46:a4:74:ca:18:d0:2b:37:0a:fe: e0:b6:88:6e:e0:3d:f8:e2:1d:e1:73:6f:73:28:5d:e1: a5:b6:98:c2:77:9f:03:6c:c7:04:96:b8:ac:78:bf:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:78:85:33:00:d5:44:cd:2e:61:35:97:cd:17:17:d0: 36:d6:12:9d:1c:15:8c:80:39:e7:05:d7:5a:53:cd:6a: 6b:21:05:62:a7:ba:dc:ce:61:2b:e7:6d:ad:02:d3:2a: b9:2f:80:ae:68:6c:a1:54:e3:fe:28:13:ba:da:8e:8b: 1e:9e:67:af:d0:6f:d5:06:e4:95:62:20:00:de:84:c7: 57:8e:8a:5b:27:d8:2d:19:60:10:19:f2:1a:3a:62:0a: 0c:30:7e:07:77:a9:cf:e6:c6:34:66:cd:3d:6c:53:e1: b3:34:84:6c:3d:84:74:50:48:41:4e:ce:55:55:05:a4: dc:21:58:fd:cc:2e:16:51:59:12:08:e4:af:f6:f7:ff: 2b:3f:a9:53:bf:d3:f9:57:21:ba:50:73:ee:6b:f4:81: bd:35:0c:dc:10:52:cd:23:1d:26:60:f7:fe:22:e4:19: 9e:8d:47:cf:56:a5:ee:5b:79:4b:11:6d:bd:81:5c:8c: cd:ff:9a:76:fa:f0:13:c7:7b:6d:5b:75:9f:bb:39:f1: b8:cc:75:68:90:b8:2d:20:70:d1:53:bb:38:3d:55:13: 97:1c:9a:87:98:e7:07:79:24:52:d3:92:3b:52:83:7a: 70:a3:6a:27:19:78:cf:f5:83:c2:87:9f:4e:8b:20:41 Fingerprint (SHA-256): 44:21:E6:0F:F7:78:AD:6F:74:81:26:FF:8A:02:4D:91:D6:23:FA:6E:45:71:89:7D:4F:4E:CA:98:5B:8C:7E:E9 Fingerprint (SHA1): DD:AF:6A:36:F6:70:33:35:DE:61:1C:F3:95:AA:3E:B5:5E:E8:9E:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174460 (0x3cb01bfc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:52:15 2023 Not After : Wed Oct 18 17:52:15 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:fb:8c:77:8f:4a:66:91:af:29:ac:2c:19:b4:d0:25: a6:b0:a5:ba:98:b5:cf:8a:24:05:7d:29:d2:0f:63:b8: 88:58:8a:b8:44:83:64:83:e1:de:bc:b1:0c:21:38:e6: 57:42:7c:eb:30:d5:91:b5:b3:18:71:58:08:41:ad:4a: ae:94:77:06:a2:ac:a7:e4:f0:2b:d6:c7:73:73:be:02: 6e:2b:fd:68:73:90:f4:32:8a:cd:7a:6f:bb:d2:a3:da: 2e:de:48:ad:3a:8d:a7:d5:fc:f4:3d:73:73:f9:68:f2: 0e:46:7a:bd:a9:ae:9c:74:c6:eb:e3:5e:4d:6b:d7:38: ce:69:92:0a:d5:c7:40:bd:cc:1c:47:a0:10:c0:c3:8e: c7:b5:f0:9d:5a:31:6d:b9:54:d6:88:26:e0:19:cd:39: b4:0f:28:d2:fd:ce:7c:6b:95:60:25:48:55:9a:f7:33: 93:fc:4c:2f:10:92:51:22:d1:b3:d7:f6:5a:07:e4:58: 58:44:06:31:81:d9:44:2d:0e:b5:b8:28:90:ad:0f:3c: 50:61:be:73:c0:05:46:a4:74:ca:18:d0:2b:37:0a:fe: e0:b6:88:6e:e0:3d:f8:e2:1d:e1:73:6f:73:28:5d:e1: a5:b6:98:c2:77:9f:03:6c:c7:04:96:b8:ac:78:bf:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:78:85:33:00:d5:44:cd:2e:61:35:97:cd:17:17:d0: 36:d6:12:9d:1c:15:8c:80:39:e7:05:d7:5a:53:cd:6a: 6b:21:05:62:a7:ba:dc:ce:61:2b:e7:6d:ad:02:d3:2a: b9:2f:80:ae:68:6c:a1:54:e3:fe:28:13:ba:da:8e:8b: 1e:9e:67:af:d0:6f:d5:06:e4:95:62:20:00:de:84:c7: 57:8e:8a:5b:27:d8:2d:19:60:10:19:f2:1a:3a:62:0a: 0c:30:7e:07:77:a9:cf:e6:c6:34:66:cd:3d:6c:53:e1: b3:34:84:6c:3d:84:74:50:48:41:4e:ce:55:55:05:a4: dc:21:58:fd:cc:2e:16:51:59:12:08:e4:af:f6:f7:ff: 2b:3f:a9:53:bf:d3:f9:57:21:ba:50:73:ee:6b:f4:81: bd:35:0c:dc:10:52:cd:23:1d:26:60:f7:fe:22:e4:19: 9e:8d:47:cf:56:a5:ee:5b:79:4b:11:6d:bd:81:5c:8c: cd:ff:9a:76:fa:f0:13:c7:7b:6d:5b:75:9f:bb:39:f1: b8:cc:75:68:90:b8:2d:20:70:d1:53:bb:38:3d:55:13: 97:1c:9a:87:98:e7:07:79:24:52:d3:92:3b:52:83:7a: 70:a3:6a:27:19:78:cf:f5:83:c2:87:9f:4e:8b:20:41 Fingerprint (SHA-256): 44:21:E6:0F:F7:78:AD:6F:74:81:26:FF:8A:02:4D:91:D6:23:FA:6E:45:71:89:7D:4F:4E:CA:98:5B:8C:7E:E9 Fingerprint (SHA1): DD:AF:6A:36:F6:70:33:35:DE:61:1C:F3:95:AA:3E:B5:5E:E8:9E:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174459 (0x3cb01bfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:52:12 2023 Not After : Wed Oct 18 17:52:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:05:f5:ec:1f:90:94:95:30:cd:5a:be:74:fb:ff:4a: fa:2c:8a:89:00:45:0d:00:25:5d:39:1b:23:3e:2d:36: 77:6a:85:64:8e:88:3e:d2:f5:d7:9a:58:03:05:33:09: 49:ee:fd:de:73:af:65:9a:e6:2b:5f:9e:c3:66:de:38: a2:18:ca:33:85:98:93:05:22:0d:93:bb:44:11:fe:4a: 4b:4e:79:ae:e0:3a:cc:7a:31:b8:e4:57:0f:88:90:4c: 18:e8:9a:0f:e2:27:a3:81:c0:73:07:65:e3:82:a6:3a: 16:2e:58:d2:f3:ea:a0:e7:c3:88:97:f2:e6:36:06:8b: 7f:73:e9:ce:df:74:19:61:e9:82:ce:89:d0:5b:b4:61: 16:65:3e:fd:ec:e0:b8:90:90:a5:5b:19:56:e9:fa:63: 77:cd:d6:79:e3:4f:b4:6d:53:ca:da:fa:34:ce:cb:40: 50:b7:62:42:34:88:d5:4a:1c:9f:10:aa:38:8d:8a:f7: cf:59:2d:06:47:c2:a1:71:2b:9f:2b:73:1d:cf:d2:9e: 69:33:bf:73:c6:43:3d:f6:50:19:52:eb:65:d5:1c:fd: a3:28:94:c2:ef:9e:ba:4b:b3:a2:cf:53:09:04:6b:97: 63:57:3a:24:e6:b3:77:7d:bd:e1:cd:2b:76:9b:1e:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:00:4b:b3:bb:85:5d:fc:c6:f0:19:b0:6e:05:c5:d0: 6c:b4:a2:4d:a9:f3:d7:a2:85:4d:50:1d:9a:1d:43:a9: 23:f9:8b:22:af:2d:5e:81:7a:0c:be:bf:9b:44:ec:79: 8d:61:e7:d1:1a:c0:af:36:27:85:37:dd:e2:0e:ba:ba: ae:05:e5:7a:93:77:c8:80:91:d3:e9:eb:d0:fb:f8:c1: 3f:a9:87:90:69:b2:dc:02:96:06:f2:39:9a:38:0c:d5: 0a:b1:d7:7b:cf:dc:6d:25:47:0e:01:2b:bb:7e:ef:08: f5:8f:87:5e:74:cd:a4:6e:aa:2a:63:57:34:f8:ee:65: 3e:50:75:3f:f0:23:3f:a3:3f:9b:dd:a1:6a:78:53:e7: 23:94:c2:49:09:0c:9c:9b:f0:82:de:b5:69:2f:49:dd: 67:95:33:b3:4f:aa:73:34:74:03:a1:c5:51:68:0a:43: e6:01:9b:0b:fe:7d:b4:6a:b0:7a:28:9f:6e:bb:b7:5e: ee:4d:d8:55:68:b9:50:97:2b:8a:d8:62:43:0f:4f:a4: 0a:a2:73:8b:50:b6:8b:2c:d1:c7:3e:63:0f:f1:98:61: 3a:cb:8e:23:dd:af:9a:b7:c2:b1:69:6e:57:31:b8:23: f1:61:57:90:3c:5a:f3:85:32:36:2d:57:69:93:5c:96 Fingerprint (SHA-256): 7F:D5:57:6D:14:F5:3B:19:3A:8C:32:5A:6F:37:D7:F5:D1:E8:B3:D1:DF:22:48:DD:B6:EF:D4:57:AE:4E:92:B7 Fingerprint (SHA1): 47:D3:E5:DF:F8:ED:61:4A:52:97:25:7B:5C:44:C0:EF:DE:93:8C:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174459 (0x3cb01bfb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:52:12 2023 Not After : Wed Oct 18 17:52:12 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:05:f5:ec:1f:90:94:95:30:cd:5a:be:74:fb:ff:4a: fa:2c:8a:89:00:45:0d:00:25:5d:39:1b:23:3e:2d:36: 77:6a:85:64:8e:88:3e:d2:f5:d7:9a:58:03:05:33:09: 49:ee:fd:de:73:af:65:9a:e6:2b:5f:9e:c3:66:de:38: a2:18:ca:33:85:98:93:05:22:0d:93:bb:44:11:fe:4a: 4b:4e:79:ae:e0:3a:cc:7a:31:b8:e4:57:0f:88:90:4c: 18:e8:9a:0f:e2:27:a3:81:c0:73:07:65:e3:82:a6:3a: 16:2e:58:d2:f3:ea:a0:e7:c3:88:97:f2:e6:36:06:8b: 7f:73:e9:ce:df:74:19:61:e9:82:ce:89:d0:5b:b4:61: 16:65:3e:fd:ec:e0:b8:90:90:a5:5b:19:56:e9:fa:63: 77:cd:d6:79:e3:4f:b4:6d:53:ca:da:fa:34:ce:cb:40: 50:b7:62:42:34:88:d5:4a:1c:9f:10:aa:38:8d:8a:f7: cf:59:2d:06:47:c2:a1:71:2b:9f:2b:73:1d:cf:d2:9e: 69:33:bf:73:c6:43:3d:f6:50:19:52:eb:65:d5:1c:fd: a3:28:94:c2:ef:9e:ba:4b:b3:a2:cf:53:09:04:6b:97: 63:57:3a:24:e6:b3:77:7d:bd:e1:cd:2b:76:9b:1e:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:00:4b:b3:bb:85:5d:fc:c6:f0:19:b0:6e:05:c5:d0: 6c:b4:a2:4d:a9:f3:d7:a2:85:4d:50:1d:9a:1d:43:a9: 23:f9:8b:22:af:2d:5e:81:7a:0c:be:bf:9b:44:ec:79: 8d:61:e7:d1:1a:c0:af:36:27:85:37:dd:e2:0e:ba:ba: ae:05:e5:7a:93:77:c8:80:91:d3:e9:eb:d0:fb:f8:c1: 3f:a9:87:90:69:b2:dc:02:96:06:f2:39:9a:38:0c:d5: 0a:b1:d7:7b:cf:dc:6d:25:47:0e:01:2b:bb:7e:ef:08: f5:8f:87:5e:74:cd:a4:6e:aa:2a:63:57:34:f8:ee:65: 3e:50:75:3f:f0:23:3f:a3:3f:9b:dd:a1:6a:78:53:e7: 23:94:c2:49:09:0c:9c:9b:f0:82:de:b5:69:2f:49:dd: 67:95:33:b3:4f:aa:73:34:74:03:a1:c5:51:68:0a:43: e6:01:9b:0b:fe:7d:b4:6a:b0:7a:28:9f:6e:bb:b7:5e: ee:4d:d8:55:68:b9:50:97:2b:8a:d8:62:43:0f:4f:a4: 0a:a2:73:8b:50:b6:8b:2c:d1:c7:3e:63:0f:f1:98:61: 3a:cb:8e:23:dd:af:9a:b7:c2:b1:69:6e:57:31:b8:23: f1:61:57:90:3c:5a:f3:85:32:36:2d:57:69:93:5c:96 Fingerprint (SHA-256): 7F:D5:57:6D:14:F5:3B:19:3A:8C:32:5A:6F:37:D7:F5:D1:E8:B3:D1:DF:22:48:DD:B6:EF:D4:57:AE:4E:92:B7 Fingerprint (SHA1): 47:D3:E5:DF:F8:ED:61:4A:52:97:25:7B:5C:44:C0:EF:DE:93:8C:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174464 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174465 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174466 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174467 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174468 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174469 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174470 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174471 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174472 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018174473 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018174474 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018174475 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018174476 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018174477 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018174478 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018174479 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018174480 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018174481 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018174482 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018174483 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018174484 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018174485 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174486 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174464 (0x3cb01c00) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 17:52:30 2023 Not After : Wed Oct 18 17:52:30 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:e0:54:58:7b:37:20:61:9d:e9:bd:e2:f4:49:28:98: 21:57:08:c5:8e:86:0b:35:f1:ae:24:a5:81:f0:d3:a3: ec:b7:ee:6f:fd:80:36:fd:85:dc:81:b6:88:cd:2d:6e: 29:d3:d4:9c:b2:7e:a3:f2:82:4f:a9:be:14:53:2e:06: af:8c:08:ad:4d:87:3f:1a:2c:9b:ce:3b:8b:ec:ff:02: 9d:eb:5d:8f:e4:d3:02:a2:af:85:ce:66:b3:f3:79:3b: 0d:e2:87:27:80:d8:58:43:40:d9:c3:98:83:e5:60:d3: 20:bd:8a:0c:1d:f6:5b:6f:17:4f:6a:ec:64:0f:25:5d: 57:be:16:41:bc:a9:16:6d:c1:64:32:76:c9:ba:99:97: a5:e3:15:79:11:f2:d6:77:8a:e2:07:a4:8f:2b:10:1b: 65:ae:8a:63:27:e5:57:af:91:2b:d6:f9:c6:39:c3:e1: fd:fd:21:79:33:1b:36:92:89:2a:96:87:b1:3a:57:8d: f3:2c:0f:15:0d:02:60:62:ea:ad:e5:4d:2b:8a:ae:19: 02:74:76:15:b2:11:1f:84:68:fa:87:25:29:e5:6e:10: c3:3f:ed:c8:3d:a6:9d:ef:49:35:0c:c9:c1:24:16:ff: 96:8e:fe:ff:69:31:73:4d:13:30:15:df:7b:37:e9:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c3:c0:f7:a5:fb:a9:f1:92:c0:ec:ea:78:e0:9a:ca:56: 4d:bd:3f:d9:ba:95:32:b5:08:b0:6a:72:0a:d4:94:05: de:92:69:71:ac:33:65:6c:a8:a7:02:b4:68:57:1f:58: d9:a4:61:f6:cf:42:b2:c5:17:c0:15:4e:ac:e9:98:3f: c1:03:fb:38:3b:fe:e7:31:9f:43:6a:ea:35:52:fb:f1: 4a:f3:d2:21:db:50:1f:cf:79:d4:92:32:61:1b:77:3a: aa:fe:c5:35:a9:5d:c5:a3:0a:c9:3f:7f:26:06:18:da: c8:66:f1:73:c3:2d:a0:99:1c:75:1c:ff:33:d3:c4:a1: 3a:b3:c7:60:cc:d6:ec:d7:d2:f3:fb:2d:9f:03:60:79: a0:95:b8:e4:45:46:2d:fb:45:55:f6:21:56:a5:b1:91: 49:59:52:99:b7:22:cc:70:4f:32:21:e5:e3:52:67:3a: b1:e0:5f:f8:ac:fa:68:4d:8d:69:7d:6d:16:8e:51:a4: 93:4c:0b:f3:cc:d6:4c:18:00:af:19:13:8d:cd:ba:7d: 10:56:f2:20:eb:43:f6:81:b8:cf:61:52:d5:f7:37:f8: e2:90:9a:f1:74:15:bb:16:95:c1:5c:59:84:50:bc:6f: 17:6c:f8:e2:22:e6:ec:39:72:9c:b1:96:82:8a:4b:cb Fingerprint (SHA-256): A8:FD:9C:AD:FC:CE:45:9F:A6:4D:F7:8C:9C:45:AF:27:6C:47:BB:5D:7A:A2:3D:40:DF:D6:CF:74:54:E8:94:3F Fingerprint (SHA1): F0:2F:2E:33:DC:59:2F:AA:E4:BE:EB:7C:9E:D7:7B:93:42:83:49:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174465 (0x3cb01c01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 17:52:32 2023 Not After : Wed Oct 18 17:52:32 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:ac:80:6e:1b:bf:0c:55:61:b3:bc:31:c6:3f:e9:70: d7:5d:3a:0b:03:fc:ea:fb:01:53:a9:dd:f2:72:73:a8: d7:ce:66:37:e5:d7:38:85:b6:fe:f2:d2:81:0f:1c:28: da:e9:8c:0b:c4:be:30:c2:4b:65:2e:05:4a:dd:a1:7c: 2b:0e:0b:73:64:6d:db:a1:09:13:6a:44:b8:d0:e6:f0: 8f:1c:0f:f8:14:83:f5:74:a3:89:57:36:ff:04:76:97: 90:2c:5c:33:53:29:7a:33:0b:1b:c1:01:4c:cb:a9:7e: 86:e3:16:91:ee:e1:5f:20:f9:5f:0a:ac:fa:f8:19:54: c2:57:2c:32:90:b9:e0:68:f1:c3:37:a5:a3:b6:98:f4: 94:e5:d2:d8:7d:7b:a5:dc:eb:c8:0a:86:81:a1:b4:ed: 3c:4c:b1:55:c9:02:66:3f:8b:c8:fb:da:44:e6:b0:c0: ba:c1:83:3a:ba:80:45:06:35:a1:0d:c6:d6:cf:ad:03: fc:43:cc:b4:23:17:d4:7c:14:aa:9a:6f:34:1b:70:7d: 0a:86:da:4a:ac:b8:03:82:5c:8d:27:21:05:8f:45:a4: 2b:52:15:f5:d8:07:02:62:e7:35:84:f9:d8:17:ea:d5: c7:ee:69:52:89:06:a1:68:3f:98:5a:60:68:7b:28:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d0:09:90:db:c7:1a:34:e2:7f:21:c1:b2:7d:f4:8e:ae: 40:d4:1f:64:40:4d:2c:99:d1:6d:ba:b1:b5:5b:b8:93: 18:72:5d:93:af:9d:2c:33:46:b4:69:1e:bb:68:f6:49: 9a:bd:13:d8:ba:55:e8:f9:ef:05:a3:68:cc:66:ae:08: f8:5a:96:b2:38:1f:60:0a:8e:92:2e:d9:a7:73:ce:6f: 05:0e:59:08:78:77:57:df:e3:97:f8:e6:f5:93:9a:4f: ff:aa:ce:ee:50:83:8f:be:c6:9c:66:27:27:79:cc:46: 5e:b1:3a:11:ff:6b:21:c7:4f:b5:d1:c1:78:1f:41:0a: dd:df:69:77:5f:bf:49:36:05:7c:1a:ed:e9:5e:5b:ed: 5b:07:4b:35:2d:40:a1:0e:2d:9a:89:f1:61:d6:32:00: 46:c1:a8:4b:c4:1f:98:d1:77:6f:c5:09:17:4a:e4:88: ac:95:8f:8d:39:62:50:d0:34:5e:28:be:0c:b0:35:59: 72:c8:b6:c7:9e:16:ec:27:0c:fd:90:4b:40:c1:d4:f2: 76:7d:95:7b:9c:50:52:81:58:fb:d5:f8:2e:3c:4b:94: 84:f5:00:d9:4e:04:b4:f7:65:38:0b:a2:34:c3:f2:62: ec:6d:23:f2:2e:ae:b0:00:d3:ca:5c:38:d3:27:0d:24 Fingerprint (SHA-256): C1:C8:25:AC:88:64:32:B4:F3:1C:F7:C6:67:DC:13:3B:CD:4A:E4:21:D4:53:D2:64:92:7D:01:B3:8D:3F:6E:5C Fingerprint (SHA1): 58:D5:76:AF:AC:E1:10:7E:5C:15:4B:9C:EE:75:5B:96:5C:F4:5D:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174466 (0x3cb01c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 17:52:34 2023 Not After : Wed Oct 18 17:52:34 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:24:3c:d1:a5:2c:da:7e:57:5b:01:d4:33:2f:ac:fb: d8:c3:f2:db:26:d2:a0:d3:01:d5:6d:99:2b:b9:26:83: 0c:e3:36:e4:6d:21:7e:9c:7e:24:51:f5:a5:d5:ea:3f: fd:52:71:74:e3:78:7f:fa:01:51:7e:85:12:b3:f9:6e: a4:03:f7:d6:fc:34:fe:1d:66:14:c1:1d:73:b3:24:4a: 81:1c:11:16:94:fc:27:84:65:4b:52:09:bf:51:7e:0d: 4b:fb:bb:62:c8:ab:2a:85:1b:05:f7:c6:30:a9:30:ca: b4:e4:02:69:d7:7e:14:8b:d2:67:38:69:58:3a:a5:59: 65:9c:67:9d:67:5d:f4:4a:36:ff:4c:72:ba:22:31:63: b8:fe:b7:0f:91:aa:95:b3:d6:32:8d:84:34:69:7e:03: 2b:a1:19:a1:1d:fc:8b:fc:e3:d3:f0:6b:06:7d:a6:7c: 0f:73:48:d8:da:80:46:31:52:b0:fa:c3:fa:1a:d9:94: 1f:bb:0f:a6:e2:13:3e:a5:b0:e0:61:41:c8:32:b7:b0: 4b:5f:b2:5a:ee:77:5c:11:c6:1f:38:07:f1:ed:c7:96: 14:fb:ef:a4:fb:22:b1:76:1b:f6:4b:b7:66:fc:f8:c9: 56:d1:9e:64:b3:09:14:25:ae:38:5f:79:68:f5:f6:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:f3:b1:63:2e:2c:91:90:21:ef:f5:6c:2c:71:f6:bc: 4c:6b:35:09:3a:84:98:4a:54:7d:56:b3:11:71:ac:96: 03:af:4a:01:7b:00:1f:ee:97:22:8f:e4:f5:0b:b6:6c: 25:54:f2:c5:46:07:c5:90:98:18:9e:a5:24:e8:fd:f5: 1c:6d:2b:ab:74:04:34:0b:ec:d0:4a:b2:fe:4d:c2:38: 8f:bc:4d:d3:a4:62:a0:60:a4:19:d3:53:74:ea:8c:35: a8:d6:3b:8f:ad:fb:64:bf:45:9e:9b:b9:72:b2:d0:e5: 79:85:cc:18:85:78:30:15:3b:17:80:7c:c5:b7:88:3f: a2:49:a4:9f:eb:d7:2e:67:6e:3f:20:47:98:1a:20:e5: 6c:e5:8e:0c:4e:c1:02:58:db:19:d4:6d:1c:2f:a3:64: d2:91:6b:d9:32:02:10:71:42:ea:af:15:ae:4a:4e:32: 04:45:90:56:2e:8f:cb:90:c9:94:1c:3c:c3:60:15:66: b3:2e:3e:89:c6:0e:e9:e1:d9:ac:88:4f:37:ee:20:c7: 85:a9:fc:c3:8b:d3:86:81:c2:b6:e7:9b:d4:21:42:59: e9:0d:25:36:2c:f6:6a:d7:36:43:f9:b0:33:05:e3:6d: 68:d4:42:f2:1c:99:cc:ed:a7:b8:f2:09:e9:d0:22:7b Fingerprint (SHA-256): 6C:61:7E:A7:93:63:9C:DB:84:12:42:7B:4C:98:3A:9E:BD:3F:20:F3:D2:E2:FF:48:E6:46:A5:CF:81:B0:A2:A7 Fingerprint (SHA1): EE:81:48:1D:C5:AB:9B:F3:A9:94:39:F0:17:95:AC:79:38:C3:B2:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174467 (0x3cb01c03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 17:52:36 2023 Not After : Wed Oct 18 17:52:36 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:4e:87:59:2d:cb:11:37:38:23:cc:23:d9:af:16:b4: 7c:e9:4c:6a:1a:33:84:71:2a:4b:72:7b:34:96:5a:49: 5a:22:5e:79:6e:f4:82:4c:a9:e2:f5:74:49:e2:14:2f: 93:79:e1:65:4c:3a:21:79:10:7e:b8:8c:84:0b:da:c8: 77:65:ff:d8:b5:e1:52:01:f2:d6:cd:33:0c:d6:77:52: 86:b2:30:53:f4:b0:19:81:f1:05:4c:fe:19:39:2d:4d: 75:05:d8:8e:60:26:8d:03:47:6e:7b:a9:90:fa:30:f2: 51:d7:8e:b9:69:e5:0a:e5:2d:3a:f8:58:29:f1:1e:a9: 8b:83:8d:c5:ab:95:ec:6a:dc:6b:7c:26:4f:15:12:ec: f3:d0:d2:8b:6f:b6:bf:64:50:2f:df:af:55:3a:3e:12: 68:cc:b0:df:d0:10:0d:37:03:e4:9c:89:8e:4f:84:1d: 14:50:f6:03:48:a5:12:6c:c4:f1:36:78:6d:1a:b9:5f: 50:3e:74:01:6d:62:d1:7d:dc:45:3c:d5:98:35:68:d0: 15:0b:a3:3e:7c:dd:9a:0b:e6:4d:ff:d4:6e:2d:06:b0: e2:d5:13:60:4f:88:a2:af:3e:ff:c5:67:65:90:78:a5: fd:32:87:a2:ba:59:1b:fe:f7:5f:6b:fc:84:15:d4:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:21:4d:36:42:9b:eb:1d:bd:2f:2d:75:92:d9:74:30: 70:d5:b0:a9:25:6e:dd:f5:7f:d7:2b:bc:f0:59:ab:50: cd:c2:8e:73:39:6b:d0:e3:f3:6c:06:90:a4:fd:d2:d4: 18:ac:90:a0:20:20:e9:21:e0:f9:98:9f:7a:8c:de:31: 65:fb:75:aa:9e:6a:93:53:0b:d1:39:bf:23:26:8b:41: 28:66:d5:13:08:91:cd:b1:1f:33:4e:94:d2:30:ea:f0: f3:fd:b4:d9:6d:b9:cd:5d:63:4a:f0:c3:58:6e:6c:62: ad:90:f5:79:09:6a:11:ea:87:d1:b5:57:92:88:f2:e3: 86:04:dc:1a:60:e5:b3:83:24:22:fc:ad:27:70:c5:80: 7c:38:8f:76:77:19:31:c7:21:11:63:01:c6:e5:c8:58: 78:17:c2:5a:4b:dc:75:76:e1:5e:7b:69:ee:5d:da:f9: d1:9b:6f:c7:6b:7c:8c:23:6f:99:fb:05:f6:b9:2a:57: 2a:75:0f:ff:6b:c4:96:aa:15:1b:1b:92:96:a1:c1:1a: 69:9f:08:bb:44:0a:90:99:d6:29:14:0f:b8:76:9c:89: 5e:31:0f:c8:d0:99:26:29:35:49:b6:ca:6b:d7:95:0e: 0b:01:97:f5:52:29:54:e7:dd:84:7f:d8:ed:48:69:a2 Fingerprint (SHA-256): DD:80:D6:3F:AB:A7:A4:FF:4B:E3:D1:A9:AA:78:63:ED:1B:00:B3:DC:B3:34:8F:3F:2F:30:95:E5:AD:23:15:B7 Fingerprint (SHA1): 67:55:30:0F:0D:F7:AD:55:4E:CD:5A:67:94:2A:64:90:31:61:4D:9D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174468 (0x3cb01c04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 17:52:38 2023 Not After : Wed Oct 18 17:52:38 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:b4:77:27:57:ec:db:91:79:c4:a7:9b:8d:94:ea:0c: 34:b3:5b:ef:0a:17:ed:93:78:c1:a4:cc:c1:b3:08:e5: f8:62:9d:b9:88:9d:77:21:1d:05:90:26:88:15:24:cb: 31:0f:98:79:52:ef:2f:ea:13:e7:3a:25:c4:b5:42:93: 24:15:98:3d:3e:18:a2:76:e4:54:04:97:52:82:73:f9: 63:11:63:c5:cc:84:89:aa:92:5b:f8:49:74:66:bf:b2: 88:86:16:2a:8c:d7:28:c1:e9:e3:96:b6:c4:31:a4:81: eb:07:41:c7:68:27:7a:2b:49:15:79:1f:0d:63:e1:a9: c6:94:2d:e3:38:c0:0b:6b:ad:3b:1f:af:1f:5b:da:cc: a3:0a:84:eb:cf:c8:44:fd:02:fb:ec:24:dd:72:87:9f: 0e:47:23:b3:e7:14:81:5a:e1:8f:18:7f:9d:2a:25:40: 44:a0:a1:bc:c5:25:03:56:1c:17:ad:03:f0:33:fe:2d: dd:f7:d5:db:a0:b3:b5:9a:6e:23:3a:cc:1d:af:2c:97: 38:23:f7:e9:b4:a1:44:20:aa:3b:cd:9b:43:8a:25:3a: ef:92:54:b8:8a:fc:55:9b:d9:99:13:5a:26:b8:fb:56: 2d:a2:cc:b4:da:33:28:16:4c:9b:06:78:68:af:bb:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a2:81:bc:63:e7:df:e8:3f:1a:91:dc:39:09:bd:10:6b: 43:75:3d:f5:4f:dc:52:92:7f:7d:2c:71:45:10:5c:cb: 18:6a:72:1a:ad:90:a2:b0:95:87:e1:6e:2f:e1:6a:eb: 4d:38:80:bf:92:34:ff:b7:17:ac:58:4c:b7:29:21:6c: 14:e0:b7:5a:89:7e:e5:66:9a:43:19:3b:84:a2:3b:30: 84:7b:f8:30:19:37:3e:a8:e8:1d:2b:5e:68:a0:fc:2b: 7b:5b:bb:1b:a9:a5:d3:dc:c6:4a:b7:e6:69:80:0a:3f: 0d:08:07:13:1d:bc:5c:3f:53:d4:21:db:6f:47:51:db: 9c:2e:2e:5b:01:8f:47:9e:65:80:b6:24:a4:10:d0:cb: 29:e5:4a:c0:b6:a2:69:2b:f4:21:d8:12:51:c3:53:f9: 8c:d5:e0:06:a6:d1:a1:ea:60:ce:db:7f:04:de:59:13: 0d:21:4e:d9:a9:5b:e9:33:78:13:f3:4c:61:ae:56:0c: b6:bd:c7:32:18:23:59:6f:51:ec:19:30:23:38:4b:e7: 1a:35:3f:b1:02:f9:7c:db:5a:0f:f6:db:79:40:43:08: 71:a3:82:2e:62:3e:3a:cc:65:6e:0e:97:e8:2e:da:b8: bc:12:07:25:aa:8a:44:2d:9d:22:30:f8:0e:51:58:a1 Fingerprint (SHA-256): B5:FC:43:37:A2:61:03:23:1F:BF:99:77:B1:7A:8B:7B:6B:E3:A0:1C:C8:FB:54:F9:00:54:9D:95:A5:63:E2:93 Fingerprint (SHA1): 7E:55:F7:D7:8E:16:66:69:4F:53:05:7D:D7:2F:04:0D:6B:53:2A:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174469 (0x3cb01c05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 17:52:40 2023 Not After : Wed Oct 18 17:52:40 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:d1:90:1a:5c:7a:24:5c:b9:0d:b3:89:06:ed:48:e3: cc:33:77:26:07:ad:25:a3:d1:5f:c4:e6:67:77:c8:b0: 2c:d7:e5:4b:f2:fb:5e:d5:7d:6a:d7:ea:fa:45:1b:2e: b0:21:97:a5:37:f3:58:17:9d:22:91:61:23:df:43:eb: 5b:2b:b4:4f:9b:96:ec:92:6f:d0:7e:96:4c:9c:7b:00: de:84:2b:9d:ea:2e:75:e1:6c:d3:ca:2e:95:a8:8a:d1: 92:c3:33:ea:8e:14:04:51:c5:06:17:aa:ea:db:8e:7d: da:83:ae:a2:9a:19:1c:5a:3a:dd:a3:39:64:05:5f:d2: 10:8d:53:c8:61:3e:7a:89:bb:c5:9c:1d:af:cc:6d:7c: fe:da:f7:a5:df:2a:42:77:27:d9:d8:b6:bb:23:cb:66: 7b:d6:22:b9:ec:dc:6c:b2:af:ad:a0:f1:6e:3e:1b:e1: a1:0e:e9:42:da:93:7a:31:ed:99:f4:81:fb:ff:b5:eb: 61:b4:43:1d:3c:66:d8:18:d8:8f:91:f2:e9:16:57:c1: ef:68:d0:99:93:5e:25:97:9a:d6:70:da:14:65:54:84: 0a:73:f7:11:48:f4:39:f7:ad:1b:dd:8e:bc:65:55:e6: 57:d4:b7:85:90:a0:fd:55:1b:06:e0:fb:a5:e3:a5:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a3:7c:c2:0c:9d:86:55:36:35:94:c3:11:f5:d2:57:38: 74:9a:c3:5f:fa:72:01:5a:13:ab:c1:97:2d:d8:ef:70: 90:7a:44:9b:81:17:b0:0a:9e:e6:81:2a:87:6e:85:fb: 91:aa:80:9a:d8:b7:f9:e6:0f:32:b6:79:ea:e3:5f:ff: 13:8e:7e:7e:82:19:71:b0:cb:3a:5d:43:f8:f9:16:31: 3d:06:64:9c:43:91:89:cb:8b:fd:36:14:54:b3:81:67: 0d:4e:28:cb:0f:55:c8:b2:0c:08:34:e5:77:73:51:e3: 70:f2:83:f9:18:a4:fe:c8:04:c0:eb:6d:3a:85:79:1e: e9:83:d2:51:7b:9f:4b:a7:f2:c9:72:97:9c:ac:9b:37: cc:fd:32:2e:b1:66:f7:af:16:92:eb:9c:5a:c9:0f:69: 9f:7f:7f:59:1f:f6:cc:16:cc:b0:c8:a6:c5:b3:37:f5: 3e:f7:51:89:dc:6b:ae:d2:9a:e3:cb:9f:1d:d3:7e:37: 52:5c:ab:77:10:61:6d:1d:e3:68:1b:79:dd:6f:4e:c0: 8a:0f:f7:18:8f:11:dd:7f:35:18:84:ac:e5:38:d3:82: 4b:20:e7:c4:fe:d8:57:b5:b3:15:2f:11:3b:da:8c:ae: a3:44:ab:32:f3:c2:09:0b:06:e5:22:73:9d:3a:c8:b5 Fingerprint (SHA-256): C1:92:9B:0F:2B:CD:C6:A9:A5:36:70:F8:F7:4A:09:9E:E8:34:AC:16:C7:20:AB:08:BF:EC:42:16:A5:3D:D6:5E Fingerprint (SHA1): 92:01:2C:D7:08:95:4D:42:79:78:8A:70:AE:71:C5:23:6C:DF:C7:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174470 (0x3cb01c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 17:52:42 2023 Not After : Wed Oct 18 17:52:42 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f9:18:21:42:7b:61:d5:05:0c:11:c2:f8:42:60:db:d5: e8:4f:38:25:18:4f:0a:af:16:92:e6:16:be:5a:26:f6: 9f:f7:30:24:29:46:0b:9b:ae:52:60:a7:ad:53:59:26: 6d:c1:79:56:e2:c0:38:04:0f:97:ca:7d:93:82:3e:a1: 8c:0a:bf:d3:6f:c3:1b:7e:84:8c:36:85:4f:44:aa:94: e9:2f:7c:68:9f:58:99:69:c5:33:ed:4b:53:f9:a7:4f: c1:3d:d7:c3:9a:b2:6f:fe:7a:ff:d0:00:31:ec:3b:ca: bb:3d:8f:94:6a:32:30:c1:43:16:23:e9:87:a1:5b:e9: b9:df:79:5c:94:bd:7f:d3:63:29:22:33:04:0d:76:29: fa:34:32:87:d8:f5:de:3c:15:44:3a:25:da:d3:a8:68: cf:64:ea:26:7a:fc:37:bb:1c:8a:ae:21:b4:39:41:ed: 3b:64:9e:67:2b:ba:96:a5:ca:60:b0:45:cf:09:8a:5e: 62:ad:fe:c5:50:99:84:e9:31:f9:7e:2e:64:89:04:19: 0b:2b:03:4c:56:59:cf:a3:0a:7e:d2:0e:14:65:bf:0c: a6:6d:ef:1f:8a:26:1c:36:7b:d6:cd:d1:d3:51:76:f6: fd:fd:e5:41:bd:08:3d:65:1b:df:87:d7:62:7e:70:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: f4:bc:86:1c:9f:dd:82:01:f2:49:c2:ef:59:43:3a:4d: 9e:10:88:98:c3:39:7f:24:09:3f:6c:54:5f:a2:f8:3d: 40:d3:7c:3d:0f:f2:e5:49:e6:f8:52:9d:9a:af:2d:6c: fe:c4:ed:08:e7:63:bb:e8:7a:cd:89:e3:0d:53:3b:89: 97:69:c4:5b:03:fd:48:cc:e9:6b:64:d6:d9:6e:48:57: 54:ac:5f:a2:35:54:49:0f:23:57:19:44:91:02:1f:91: 97:5d:66:a8:44:25:3f:65:f7:20:d9:b0:18:f5:50:d5: 0f:5c:a6:31:03:4b:7e:d5:0e:3d:c8:50:a6:a8:4f:cc: 7e:5e:9e:05:93:30:86:e7:6a:ee:bb:05:d3:ab:eb:bb: 0a:4a:6c:b6:da:f5:c0:2b:50:db:b6:4a:40:39:e3:85: 4e:a5:23:a2:04:ea:ad:8e:ab:a7:a4:1a:08:7f:f1:a0: 3a:fe:8a:80:3b:c0:9a:ed:67:6e:f4:2e:b8:e9:50:f8: e6:60:99:ed:2c:3e:e0:31:9a:58:b0:c2:fc:3b:20:d2: 47:23:68:4c:d4:af:82:00:53:bb:00:eb:43:8e:07:ab: e8:37:c6:eb:30:a9:66:51:db:29:e0:03:4c:4d:92:70: da:6e:0f:96:d4:16:36:fe:c9:f0:f1:49:22:1b:e1:16 Fingerprint (SHA-256): F8:D2:F0:22:B7:35:B3:AA:00:53:C2:4D:7A:24:FD:E1:7D:11:60:BE:13:01:1E:5D:E9:AD:AE:49:B0:52:76:52 Fingerprint (SHA1): C7:7C:8F:C8:5B:59:0E:7B:79:DD:71:6E:D1:AC:D6:16:95:0E:F6:EC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174471 (0x3cb01c07) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 17:52:44 2023 Not After : Wed Oct 18 17:52:44 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:1b:a5:a3:82:c2:b5:eb:29:81:4f:a6:a5:c5:f1:47: 6a:84:f6:19:9c:f9:32:2b:f5:ed:cc:13:94:49:df:ac: 59:ce:7b:f1:20:ef:dd:2e:98:33:ff:c3:d8:f9:0e:0b: 65:90:ad:1b:e5:54:77:17:b8:f6:b6:7a:85:7a:66:4a: fc:00:f2:a7:bc:cc:3a:3c:38:5b:97:b9:99:65:6e:70: 0e:d0:3a:01:2c:03:f4:4f:be:d7:09:e0:4e:1b:e0:06: f7:25:6c:ec:b2:f8:36:52:60:16:ea:fd:c9:f4:c9:71: e9:85:ff:ee:40:da:f6:bd:ee:c6:75:d6:45:da:47:6d: b1:1f:19:3a:f6:37:e3:3b:64:64:c8:40:fe:21:b2:29: df:b5:a4:56:e8:4d:05:9d:16:3e:7b:1d:c0:4e:78:c8: 58:77:ef:20:63:ca:33:cc:86:d0:da:71:bf:d9:ce:d1: 5f:bf:3e:72:4f:eb:6f:f0:9c:ed:b3:80:b5:64:01:0e: a0:10:0d:78:92:65:34:c0:0b:f9:a7:2a:6f:17:ba:38: a8:ac:4d:8d:5b:e6:07:00:df:36:f9:cf:97:a2:4f:45: da:fb:32:e2:ff:61:0d:12:01:d6:cc:9f:4d:e4:85:c0: 15:e0:ba:58:46:01:d0:cd:17:37:31:ea:d9:e9:10:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:7e:eb:02:11:2e:3f:88:b9:89:b0:7d:7e:54:30:7e: 0b:33:c0:3a:16:8d:05:ec:97:43:98:11:e4:f9:3f:b3: 34:b9:d4:d5:a9:a2:ad:62:76:84:0f:0e:5d:a3:b0:f5: 1d:73:c0:ac:64:35:eb:d9:ac:93:38:4c:c7:e8:63:9e: 8a:95:fe:f6:1a:e9:1b:29:f5:0d:db:0f:da:b1:fe:d2: 8f:5d:4d:e9:6c:ec:56:6a:f5:fe:24:c4:c0:eb:45:8b: fe:8b:03:3a:21:a5:20:52:5a:78:4c:5f:4f:7b:a9:f6: a3:60:ed:cf:96:2c:64:91:e4:5a:73:b7:15:28:a2:01: 44:e8:1d:f0:94:9a:ef:db:dd:8d:c3:18:ed:dc:1f:6b: c3:b5:b9:67:5a:06:a3:6e:28:eb:50:e4:8f:93:d0:99: ca:fd:33:a4:62:f1:84:d7:e1:1d:d7:e8:db:d5:b7:00: f6:e5:2b:11:db:5d:9a:42:7d:82:fc:aa:be:59:bc:cd: 36:42:3d:a1:0e:92:6f:19:4e:dc:b4:5e:af:fc:3a:e4: f7:ba:19:62:e7:f1:9b:7d:39:b7:30:81:0c:e7:99:c3: 37:35:9e:e0:45:8d:aa:ca:06:ee:f8:2d:35:9f:1b:42: 12:fb:d1:c2:ba:2e:da:83:f0:42:d7:1c:d3:08:ee:74 Fingerprint (SHA-256): 95:DB:97:48:66:94:F7:FF:6F:21:84:E9:07:9A:63:50:E0:66:B6:5D:BD:AD:FD:F7:66:F1:9B:9E:36:64:71:DD Fingerprint (SHA1): F3:72:B3:23:26:52:68:A7:99:96:94:AA:25:78:D8:8B:A4:29:CA:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174472 (0x3cb01c08) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 17:52:46 2023 Not After : Wed Oct 18 17:52:46 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:bf:16:0a:4d:81:4e:fc:dd:3f:46:97:2b:e4:a8:30: 18:03:97:90:3d:57:b0:0c:83:95:b9:c4:42:79:28:ba: 4a:d9:5a:6f:61:a3:20:7c:82:93:e4:82:98:20:16:75: 76:38:d6:bb:1c:d5:ec:ef:f7:6d:58:56:b0:b4:57:9d: ba:65:55:f3:61:de:8b:a6:e3:56:71:d7:a7:d7:7d:1a: 0b:02:6b:0d:e4:6d:6e:55:93:a7:c5:0d:85:c7:dc:ee: 6d:3b:a2:c4:76:01:4e:07:b7:9d:c9:74:29:3a:1f:ea: ba:ac:7d:e2:50:8b:34:19:c5:a6:70:88:99:78:8e:c5: 11:1d:ed:55:c5:92:df:55:f7:64:08:e9:f7:ff:21:f3: b0:7e:eb:f7:25:35:14:9a:0e:c5:96:92:52:dc:65:0d: 5a:9f:6f:86:d3:c7:41:cd:0c:e6:9a:6a:8b:fe:bc:a6: 70:6a:0b:76:c7:31:5d:1d:ec:28:70:70:ef:be:a3:ac: bd:a9:06:38:61:24:29:f0:bb:a0:52:17:cb:7d:cb:f5: 5e:51:53:45:34:53:20:69:38:b8:94:49:e1:46:4e:28: 7a:fd:fa:25:40:22:dd:20:cb:09:cc:45:fc:ec:15:8b: ac:2f:22:34:2a:f7:0e:4a:ee:48:b8:1e:aa:5b:0c:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:7b:30:9e:40:54:4d:4e:bc:7c:d1:9a:62:03:bf:9c: 46:44:8f:83:cc:cf:e9:48:eb:85:ab:61:97:59:f8:8d: df:ca:5c:67:1b:c8:29:65:93:ea:5a:cd:07:dd:c4:19: db:28:dd:6e:11:38:4a:17:fc:40:17:f1:07:e3:6e:d4: cb:63:d7:74:46:a6:b6:ae:c1:38:9a:61:fc:6c:dc:9a: e5:3f:36:72:5c:f8:6c:58:a4:89:4a:16:72:d2:c2:c2: 98:19:d8:b9:cb:e5:a9:9e:9d:0e:a7:eb:b9:4f:79:46: 6d:f4:af:18:d3:5e:64:fa:f8:39:83:a1:4a:b2:7f:4b: 11:e1:b7:16:06:c7:01:0b:b2:ed:11:d4:02:d5:89:5e: 5d:36:27:f4:16:12:fd:5f:e1:a0:d8:39:f4:f8:f8:bc: a8:61:38:e6:90:a5:4c:78:8b:6f:77:e7:a5:d2:73:e6: d8:02:9e:0c:0a:2c:74:74:b3:2f:cc:9a:84:01:80:6e: 73:72:a1:60:19:8d:75:38:41:e0:0a:2b:9c:b8:a6:cb: 47:8d:d3:56:91:8e:20:2c:fd:5b:c1:94:2e:d2:4f:3c: 0c:3b:6a:15:41:23:0b:a9:df:c7:5d:0c:36:bd:56:be: 11:cd:20:91:af:93:25:59:45:ce:45:d3:f6:87:4a:1e Fingerprint (SHA-256): 10:6C:4E:E9:06:BD:3C:0E:3E:C7:70:11:08:6D:4B:5B:C9:C3:88:FD:36:66:3D:90:A4:1F:47:16:98:AD:43:A3 Fingerprint (SHA1): C2:1A:B3:4E:8D:5A:A1:2F:FF:9E:CA:37:A3:DE:5F:35:A1:C2:5A:28 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174487 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174488 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174489 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174490 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174487 (0x3cb01c17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:14 2023 Not After : Wed Oct 18 17:53:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:ce:3b:92:58:4d:55:8d:c8:fe:cb:5f:8f:57:fe:af: 09:66:57:fb:86:99:fe:bb:3f:68:63:95:8e:33:01:55: a5:1f:a0:9b:0a:5a:0b:77:b1:f8:87:c4:b9:a8:3c:1e: 60:b1:38:0d:ed:b3:6e:6a:4e:b5:80:24:0c:89:b0:e4: c7:55:54:c5:a6:87:18:7d:d6:6d:95:22:b2:f0:92:07: bf:7e:9c:09:a9:ca:1e:8b:8b:d1:c1:fc:05:d5:5c:b7: b0:4a:3d:db:ef:da:42:04:00:4e:c1:74:06:6b:a2:8e: 2b:b9:a4:63:e5:af:5f:8e:83:af:65:9b:ee:a2:8f:71: 8d:31:b1:52:ea:93:48:c1:1d:f0:02:eb:a2:d9:41:4b: 43:eb:f5:93:ef:c1:83:75:04:30:0b:c3:7e:2a:25:0b: 5b:e6:60:34:37:84:4f:0c:a9:76:f1:cd:64:df:5b:81: dc:18:f4:09:95:30:1f:22:9e:17:e6:d9:fb:9f:24:13: e5:75:90:0e:d9:e5:78:c3:65:34:01:54:36:56:b4:db: 60:ea:bd:a4:e7:2a:40:bc:c2:4d:e5:dc:9b:a2:9c:54: d2:3e:9d:8b:d1:2b:15:3a:05:98:84:89:e6:aa:f3:74: 1a:71:b6:41:db:7b:d2:6f:9f:ee:ca:67:9b:dd:ad:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:f3:1e:1b:30:1e:c3:80:25:99:08:f3:9a:7f:85:28: 23:2c:3c:ee:03:79:c0:94:af:e4:71:8d:e4:f7:cb:d2: 99:7e:b3:aa:18:8b:87:10:be:d1:a7:f3:0d:74:b1:3d: b5:8e:61:a5:67:d7:5b:5f:b4:da:5f:20:3b:12:b4:f6: 2c:21:cf:78:51:be:98:b4:4f:da:96:70:ed:90:fe:c0: 13:e2:d0:68:3b:50:a0:61:fb:b6:3b:5c:57:58:7f:7b: 34:82:25:6b:c9:70:70:d2:2c:63:ee:22:0c:e9:47:ab: 1f:8a:5c:05:ef:ac:64:db:04:1e:14:a5:5d:cf:92:95: 87:e0:31:01:31:1e:41:e2:de:6e:30:b5:6d:d4:ee:3a: 51:95:66:b1:81:c6:03:b3:22:77:f3:b3:82:63:70:ce: 74:61:08:dc:13:f5:ec:d8:26:ea:4a:42:a7:ca:4e:a8: c4:e3:f0:ef:e0:6d:1c:a7:75:32:34:76:77:13:5e:68: f3:e2:6b:4f:ea:82:49:ee:97:1b:db:0c:47:a1:98:ea: 68:db:47:99:05:7e:6e:9b:30:2c:74:34:ec:65:d8:5e: 12:f1:6a:13:a4:6e:d4:cf:8f:5a:89:8a:78:bc:d5:bd: a4:c5:d2:b6:23:c2:66:1d:22:66:db:9f:9c:6e:d6:dc Fingerprint (SHA-256): D2:0A:47:30:4E:C2:02:26:B0:B6:39:A1:BC:67:C2:3F:D8:9F:BE:A9:5F:C5:86:EE:08:B3:E9:CA:8E:4F:D4:7F Fingerprint (SHA1): 1A:3D:0C:F9:57:76:85:A0:AA:46:38:82:9A:0F:B2:FD:AB:B3:41:E9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174488 (0x3cb01c18) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:16 2023 Not After : Wed Oct 18 17:53:16 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2e:3a:14:95:a5:0c:50:ab:b3:ca:bd:8d:46:2f:c1: 42:c2:44:db:dd:e3:57:83:96:2e:3b:95:de:31:df:12: 07:43:fd:20:1d:08:ed:0a:92:6d:b9:56:fc:c5:91:e3: 5b:ba:8a:b4:c5:d5:86:d7:ca:d8:ca:ef:ea:c5:0f:19: f4:ac:d3:15:78:13:82:20:c4:d9:35:4f:e2:ce:3f:68: 3a:7d:b5:60:ca:9a:ad:f5:6a:0e:43:9e:76:bd:8b:3a: 48:93:06:9c:b2:2c:85:76:ab:46:5e:b6:92:5f:9b:5a: cb:fa:b9:e6:9c:aa:66:a7:85:44:db:16:ec:40:9d:6a: fe:7c:10:66:79:3f:5d:9b:7f:cf:f0:da:85:77:65:42: aa:62:da:b2:c1:80:57:9d:f3:75:76:ab:cb:5e:f1:88: 6a:c9:f5:8e:dc:ee:46:32:81:72:68:f5:6a:bf:d0:af: 92:43:6b:fb:ee:5e:f5:b0:54:65:ba:87:24:16:85:72: 46:f6:70:75:ee:b5:26:d5:e2:23:b4:b8:2b:89:a0:77: 12:28:9d:25:d9:61:cd:d4:c0:af:14:72:85:96:a2:c4: 24:95:b9:f1:26:80:fa:cf:12:ac:a3:1c:6f:7d:80:19: 92:41:d2:16:82:7e:f0:8b:4b:83:97:8e:88:40:65:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c8:46:5a:b9:af:b5:c5:04:01:b4:b7:73:c3:7f:78:27: 56:75:bb:fb:b1:e1:fd:fd:67:3b:ab:a3:87:9e:48:0b: 87:31:84:3b:87:b7:39:8b:d3:bf:91:a1:8d:5c:12:07: 6b:18:38:21:31:80:34:29:70:20:d9:df:84:61:9a:e1: 9a:43:ba:69:04:b7:71:4c:cd:76:de:a5:ec:91:b8:36: c0:7d:fe:80:60:72:15:32:4c:78:0b:c7:72:d8:e0:7a: d0:0b:99:8c:5e:b4:59:44:54:dc:67:7c:8b:d3:60:ea: a1:dc:3d:ec:44:2c:f2:e9:a8:b6:5f:09:4e:e1:1e:95: 1a:63:f4:b0:f9:33:71:85:56:66:65:c4:91:89:d0:34: 43:93:24:2f:ab:62:dd:d7:69:68:04:23:56:6f:f3:91: bb:00:cd:df:7d:73:dd:07:1b:b6:a3:f3:c5:c1:b1:a3: 3c:58:b4:99:86:3f:6c:c8:6c:dd:87:bb:d4:e3:97:ff: c2:27:8c:75:73:0c:f7:f2:56:8e:2c:f4:43:03:81:6c: b7:dc:65:df:65:2f:f4:05:40:1a:1f:05:3e:0e:67:f4: cd:22:bb:49:67:fa:c8:5d:9d:14:1f:c0:9f:cc:f1:31: ee:e3:4b:a9:47:1e:75:36:ad:8e:89:30:72:78:eb:b0 Fingerprint (SHA-256): F2:00:1C:35:84:F8:23:24:D8:77:89:92:FA:D6:F6:4E:79:D5:08:68:6C:0D:C0:49:B1:5D:60:F2:A2:BE:B0:CB Fingerprint (SHA1): 31:C3:E7:31:50:95:64:CE:A9:B2:89:37:F5:59:E5:85:E3:EB:A5:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174489 (0x3cb01c19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:19 2023 Not After : Wed Oct 18 17:53:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:a6:b0:f6:0a:1a:31:dd:33:ce:dc:42:62:6d:2c:af: f7:75:94:c8:01:4f:10:1a:bc:a4:dc:cd:92:cd:73:c0: e8:cb:77:96:73:a0:97:40:8d:9d:b3:40:76:f1:c0:b6: c8:72:7a:72:7d:98:1d:c7:9a:22:07:81:ff:93:64:bd: 9a:47:e2:6a:d6:bc:17:1e:21:80:53:84:9d:39:db:ae: 80:eb:54:78:e0:37:66:79:a1:2f:6c:83:59:3e:c0:68: a3:81:90:ca:32:61:23:f8:95:ee:cb:bc:62:f2:54:24: de:83:6c:51:a0:5b:2c:69:cf:b2:d3:48:cd:0a:e4:12: 78:61:ac:19:c7:e5:9b:74:e0:f3:9c:6f:88:3e:ca:d2: 4e:d8:2d:3d:70:32:1e:cb:0d:aa:81:e8:65:73:cc:c4: 2b:29:30:85:c2:ec:4c:b9:f6:03:f5:c6:c9:6a:b7:60: 7f:4c:cb:31:fc:cb:a1:e3:34:d8:29:18:1f:65:1c:ee: 90:27:84:9b:fa:62:d2:75:bb:ab:8b:f8:4a:63:32:00: 69:d9:f6:a4:43:d1:74:8b:25:1d:91:51:87:b4:cf:b4: 49:88:22:39:48:db:71:d4:cc:1e:4a:8f:8c:b1:e4:2d: 4d:66:86:a0:b7:b3:c7:30:ad:0d:ed:53:92:ea:75:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:dd:b9:90:14:6a:6c:3c:a8:1d:7b:dd:4c:dc:42:e5: 9d:e2:5a:39:ac:56:17:b1:0f:9a:8d:ce:37:18:6f:2a: 3f:e1:3b:ef:c8:3e:d1:c4:7f:96:26:69:ba:67:9a:64: b8:3a:a4:90:46:6d:63:c2:3a:53:3c:f5:5c:d9:df:02: a2:e8:da:ef:cb:f5:1c:16:05:37:b5:ab:c5:6b:af:14: 16:25:be:3a:eb:8e:f7:fd:3f:7f:e7:6b:a5:ca:fb:d1: 77:f8:aa:44:42:65:e0:b6:cd:75:08:3a:c7:a0:f8:03: c3:28:62:8c:fb:a8:b4:13:b7:c3:06:39:ab:12:ec:e1: 9d:e3:d5:7b:be:74:b6:73:1c:4b:9d:5b:7d:ed:1d:1a: fc:80:df:5c:81:40:f8:e8:dc:2b:7a:86:0a:20:4e:88: af:d5:c7:ae:73:83:f1:6a:e7:63:4b:9e:b4:3a:77:5a: e5:83:59:64:b7:1a:8d:44:13:71:85:5a:63:07:f7:3f: 4c:d7:00:a4:79:75:99:7e:4d:85:f7:fc:e3:7b:d7:33: 68:37:30:26:df:be:fe:22:f8:b9:e6:d5:26:3f:8a:1d: 38:68:c3:b1:bc:da:0e:49:2d:b0:ac:11:a2:1d:bd:e2: 7a:24:b3:b3:7f:b5:38:dc:59:19:22:53:15:40:af:e5 Fingerprint (SHA-256): 87:5D:C0:E7:89:AF:97:91:43:E3:0B:20:22:E0:CD:3C:A7:00:9E:78:8C:15:44:4C:65:4E:B4:8B:B1:CB:3B:84 Fingerprint (SHA1): CF:6D:5B:1D:D4:15:9E:37:F4:45:E7:36:70:D4:56:44:B9:86:5E:4F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174487 (0x3cb01c17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:14 2023 Not After : Wed Oct 18 17:53:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:ce:3b:92:58:4d:55:8d:c8:fe:cb:5f:8f:57:fe:af: 09:66:57:fb:86:99:fe:bb:3f:68:63:95:8e:33:01:55: a5:1f:a0:9b:0a:5a:0b:77:b1:f8:87:c4:b9:a8:3c:1e: 60:b1:38:0d:ed:b3:6e:6a:4e:b5:80:24:0c:89:b0:e4: c7:55:54:c5:a6:87:18:7d:d6:6d:95:22:b2:f0:92:07: bf:7e:9c:09:a9:ca:1e:8b:8b:d1:c1:fc:05:d5:5c:b7: b0:4a:3d:db:ef:da:42:04:00:4e:c1:74:06:6b:a2:8e: 2b:b9:a4:63:e5:af:5f:8e:83:af:65:9b:ee:a2:8f:71: 8d:31:b1:52:ea:93:48:c1:1d:f0:02:eb:a2:d9:41:4b: 43:eb:f5:93:ef:c1:83:75:04:30:0b:c3:7e:2a:25:0b: 5b:e6:60:34:37:84:4f:0c:a9:76:f1:cd:64:df:5b:81: dc:18:f4:09:95:30:1f:22:9e:17:e6:d9:fb:9f:24:13: e5:75:90:0e:d9:e5:78:c3:65:34:01:54:36:56:b4:db: 60:ea:bd:a4:e7:2a:40:bc:c2:4d:e5:dc:9b:a2:9c:54: d2:3e:9d:8b:d1:2b:15:3a:05:98:84:89:e6:aa:f3:74: 1a:71:b6:41:db:7b:d2:6f:9f:ee:ca:67:9b:dd:ad:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:f3:1e:1b:30:1e:c3:80:25:99:08:f3:9a:7f:85:28: 23:2c:3c:ee:03:79:c0:94:af:e4:71:8d:e4:f7:cb:d2: 99:7e:b3:aa:18:8b:87:10:be:d1:a7:f3:0d:74:b1:3d: b5:8e:61:a5:67:d7:5b:5f:b4:da:5f:20:3b:12:b4:f6: 2c:21:cf:78:51:be:98:b4:4f:da:96:70:ed:90:fe:c0: 13:e2:d0:68:3b:50:a0:61:fb:b6:3b:5c:57:58:7f:7b: 34:82:25:6b:c9:70:70:d2:2c:63:ee:22:0c:e9:47:ab: 1f:8a:5c:05:ef:ac:64:db:04:1e:14:a5:5d:cf:92:95: 87:e0:31:01:31:1e:41:e2:de:6e:30:b5:6d:d4:ee:3a: 51:95:66:b1:81:c6:03:b3:22:77:f3:b3:82:63:70:ce: 74:61:08:dc:13:f5:ec:d8:26:ea:4a:42:a7:ca:4e:a8: c4:e3:f0:ef:e0:6d:1c:a7:75:32:34:76:77:13:5e:68: f3:e2:6b:4f:ea:82:49:ee:97:1b:db:0c:47:a1:98:ea: 68:db:47:99:05:7e:6e:9b:30:2c:74:34:ec:65:d8:5e: 12:f1:6a:13:a4:6e:d4:cf:8f:5a:89:8a:78:bc:d5:bd: a4:c5:d2:b6:23:c2:66:1d:22:66:db:9f:9c:6e:d6:dc Fingerprint (SHA-256): D2:0A:47:30:4E:C2:02:26:B0:B6:39:A1:BC:67:C2:3F:D8:9F:BE:A9:5F:C5:86:EE:08:B3:E9:CA:8E:4F:D4:7F Fingerprint (SHA1): 1A:3D:0C:F9:57:76:85:A0:AA:46:38:82:9A:0F:B2:FD:AB:B3:41:E9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174488 (0x3cb01c18) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:16 2023 Not After : Wed Oct 18 17:53:16 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2e:3a:14:95:a5:0c:50:ab:b3:ca:bd:8d:46:2f:c1: 42:c2:44:db:dd:e3:57:83:96:2e:3b:95:de:31:df:12: 07:43:fd:20:1d:08:ed:0a:92:6d:b9:56:fc:c5:91:e3: 5b:ba:8a:b4:c5:d5:86:d7:ca:d8:ca:ef:ea:c5:0f:19: f4:ac:d3:15:78:13:82:20:c4:d9:35:4f:e2:ce:3f:68: 3a:7d:b5:60:ca:9a:ad:f5:6a:0e:43:9e:76:bd:8b:3a: 48:93:06:9c:b2:2c:85:76:ab:46:5e:b6:92:5f:9b:5a: cb:fa:b9:e6:9c:aa:66:a7:85:44:db:16:ec:40:9d:6a: fe:7c:10:66:79:3f:5d:9b:7f:cf:f0:da:85:77:65:42: aa:62:da:b2:c1:80:57:9d:f3:75:76:ab:cb:5e:f1:88: 6a:c9:f5:8e:dc:ee:46:32:81:72:68:f5:6a:bf:d0:af: 92:43:6b:fb:ee:5e:f5:b0:54:65:ba:87:24:16:85:72: 46:f6:70:75:ee:b5:26:d5:e2:23:b4:b8:2b:89:a0:77: 12:28:9d:25:d9:61:cd:d4:c0:af:14:72:85:96:a2:c4: 24:95:b9:f1:26:80:fa:cf:12:ac:a3:1c:6f:7d:80:19: 92:41:d2:16:82:7e:f0:8b:4b:83:97:8e:88:40:65:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c8:46:5a:b9:af:b5:c5:04:01:b4:b7:73:c3:7f:78:27: 56:75:bb:fb:b1:e1:fd:fd:67:3b:ab:a3:87:9e:48:0b: 87:31:84:3b:87:b7:39:8b:d3:bf:91:a1:8d:5c:12:07: 6b:18:38:21:31:80:34:29:70:20:d9:df:84:61:9a:e1: 9a:43:ba:69:04:b7:71:4c:cd:76:de:a5:ec:91:b8:36: c0:7d:fe:80:60:72:15:32:4c:78:0b:c7:72:d8:e0:7a: d0:0b:99:8c:5e:b4:59:44:54:dc:67:7c:8b:d3:60:ea: a1:dc:3d:ec:44:2c:f2:e9:a8:b6:5f:09:4e:e1:1e:95: 1a:63:f4:b0:f9:33:71:85:56:66:65:c4:91:89:d0:34: 43:93:24:2f:ab:62:dd:d7:69:68:04:23:56:6f:f3:91: bb:00:cd:df:7d:73:dd:07:1b:b6:a3:f3:c5:c1:b1:a3: 3c:58:b4:99:86:3f:6c:c8:6c:dd:87:bb:d4:e3:97:ff: c2:27:8c:75:73:0c:f7:f2:56:8e:2c:f4:43:03:81:6c: b7:dc:65:df:65:2f:f4:05:40:1a:1f:05:3e:0e:67:f4: cd:22:bb:49:67:fa:c8:5d:9d:14:1f:c0:9f:cc:f1:31: ee:e3:4b:a9:47:1e:75:36:ad:8e:89:30:72:78:eb:b0 Fingerprint (SHA-256): F2:00:1C:35:84:F8:23:24:D8:77:89:92:FA:D6:F6:4E:79:D5:08:68:6C:0D:C0:49:B1:5D:60:F2:A2:BE:B0:CB Fingerprint (SHA1): 31:C3:E7:31:50:95:64:CE:A9:B2:89:37:F5:59:E5:85:E3:EB:A5:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174489 (0x3cb01c19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:19 2023 Not After : Wed Oct 18 17:53:19 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:a6:b0:f6:0a:1a:31:dd:33:ce:dc:42:62:6d:2c:af: f7:75:94:c8:01:4f:10:1a:bc:a4:dc:cd:92:cd:73:c0: e8:cb:77:96:73:a0:97:40:8d:9d:b3:40:76:f1:c0:b6: c8:72:7a:72:7d:98:1d:c7:9a:22:07:81:ff:93:64:bd: 9a:47:e2:6a:d6:bc:17:1e:21:80:53:84:9d:39:db:ae: 80:eb:54:78:e0:37:66:79:a1:2f:6c:83:59:3e:c0:68: a3:81:90:ca:32:61:23:f8:95:ee:cb:bc:62:f2:54:24: de:83:6c:51:a0:5b:2c:69:cf:b2:d3:48:cd:0a:e4:12: 78:61:ac:19:c7:e5:9b:74:e0:f3:9c:6f:88:3e:ca:d2: 4e:d8:2d:3d:70:32:1e:cb:0d:aa:81:e8:65:73:cc:c4: 2b:29:30:85:c2:ec:4c:b9:f6:03:f5:c6:c9:6a:b7:60: 7f:4c:cb:31:fc:cb:a1:e3:34:d8:29:18:1f:65:1c:ee: 90:27:84:9b:fa:62:d2:75:bb:ab:8b:f8:4a:63:32:00: 69:d9:f6:a4:43:d1:74:8b:25:1d:91:51:87:b4:cf:b4: 49:88:22:39:48:db:71:d4:cc:1e:4a:8f:8c:b1:e4:2d: 4d:66:86:a0:b7:b3:c7:30:ad:0d:ed:53:92:ea:75:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 28:dd:b9:90:14:6a:6c:3c:a8:1d:7b:dd:4c:dc:42:e5: 9d:e2:5a:39:ac:56:17:b1:0f:9a:8d:ce:37:18:6f:2a: 3f:e1:3b:ef:c8:3e:d1:c4:7f:96:26:69:ba:67:9a:64: b8:3a:a4:90:46:6d:63:c2:3a:53:3c:f5:5c:d9:df:02: a2:e8:da:ef:cb:f5:1c:16:05:37:b5:ab:c5:6b:af:14: 16:25:be:3a:eb:8e:f7:fd:3f:7f:e7:6b:a5:ca:fb:d1: 77:f8:aa:44:42:65:e0:b6:cd:75:08:3a:c7:a0:f8:03: c3:28:62:8c:fb:a8:b4:13:b7:c3:06:39:ab:12:ec:e1: 9d:e3:d5:7b:be:74:b6:73:1c:4b:9d:5b:7d:ed:1d:1a: fc:80:df:5c:81:40:f8:e8:dc:2b:7a:86:0a:20:4e:88: af:d5:c7:ae:73:83:f1:6a:e7:63:4b:9e:b4:3a:77:5a: e5:83:59:64:b7:1a:8d:44:13:71:85:5a:63:07:f7:3f: 4c:d7:00:a4:79:75:99:7e:4d:85:f7:fc:e3:7b:d7:33: 68:37:30:26:df:be:fe:22:f8:b9:e6:d5:26:3f:8a:1d: 38:68:c3:b1:bc:da:0e:49:2d:b0:ac:11:a2:1d:bd:e2: 7a:24:b3:b3:7f:b5:38:dc:59:19:22:53:15:40:af:e5 Fingerprint (SHA-256): 87:5D:C0:E7:89:AF:97:91:43:E3:0B:20:22:E0:CD:3C:A7:00:9E:78:8C:15:44:4C:65:4E:B4:8B:B1:CB:3B:84 Fingerprint (SHA1): CF:6D:5B:1D:D4:15:9E:37:F4:45:E7:36:70:D4:56:44:B9:86:5E:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174491 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174492 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174493 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018174494 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018174495 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174491 (0x3cb01c1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:28 2023 Not After : Wed Oct 18 17:53:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:05:3a:4d:d8:68:ba:fc:e6:ff:55:d2:3a:c7:ba:de: 8d:6b:07:90:ea:19:93:6f:f9:89:a0:37:a6:96:c4:0b: 9f:18:b2:67:27:40:6a:d2:0f:af:50:44:3b:ad:a5:a5: da:81:17:00:8c:f3:b9:0f:6d:03:b8:49:c1:02:bb:e6: 1f:65:45:0a:c4:b3:4a:db:3f:6e:00:4d:ad:f3:4b:eb: ff:89:f4:99:fe:b8:34:13:ca:88:6c:cf:39:ae:51:d2: 34:14:58:8b:ec:1d:e7:a0:7b:2f:10:76:51:68:fd:77: f7:95:28:f3:a8:71:64:e5:66:39:90:55:46:61:01:4d: 9e:fd:2d:59:0f:7a:ba:79:98:68:56:8b:07:8c:57:be: 26:f2:cf:e6:f4:20:fa:ac:9c:5e:cb:75:b8:2a:a4:53: 61:b0:f4:2e:63:d9:b4:42:1f:a2:f8:5b:0e:7e:83:3b: ea:4d:95:2b:c0:97:87:2f:b2:4f:ab:c4:95:f2:89:e5: 38:cc:3e:a9:52:d5:c8:05:5b:1f:05:17:2a:98:bb:27: 12:a3:49:49:30:6d:d1:ea:51:78:7b:32:6e:c8:59:af: 2b:02:5e:36:ab:86:cc:b4:62:2c:80:d9:41:32:f6:92: 8e:5f:56:37:3e:58:ff:a9:d0:6f:b3:ba:aa:e6:a7:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:15:57:0a:99:77:a1:a4:c7:40:6b:bb:33:46:03:6d: 6d:8a:ae:1a:cd:9d:66:90:f1:0e:d3:3d:68:02:ba:b9: fa:99:9f:7b:b3:9b:13:38:fb:75:29:d7:40:6e:d2:ac: 2b:0e:5a:91:c6:f2:84:40:5b:47:38:e7:b2:ac:f6:af: c3:53:44:a2:25:5d:17:42:3f:20:03:bb:1e:db:c3:63: 1b:a0:9f:4e:0e:b4:b8:83:b9:b6:26:f7:0b:25:2b:cd: 55:56:08:fe:a9:29:7b:42:f6:69:57:68:09:6d:2c:e5: 21:92:3f:b6:af:de:8b:6a:49:9e:a7:ba:13:2f:ff:79: 23:1a:30:5f:70:a0:c5:ec:40:a4:92:20:74:3d:8f:14: 73:b7:0b:79:51:81:12:6a:e9:89:db:15:64:34:95:b4: 3b:1c:df:6e:f7:e0:3e:dc:4f:e4:c3:43:e1:84:e0:5f: 37:12:e4:34:9d:8d:46:32:97:54:99:af:07:82:a7:c6: 33:36:20:94:04:bc:60:71:bc:49:60:95:1b:cf:2b:a3: f4:29:c9:98:48:d4:ae:f0:bd:04:f5:67:c9:11:44:80: bb:3f:c0:2e:e3:b0:ea:16:11:de:f0:a2:62:ee:9e:4c: 42:e6:24:33:27:2d:07:9d:74:3a:4c:66:3c:2c:3a:a0 Fingerprint (SHA-256): 60:A3:DB:83:67:AC:4C:19:7F:0A:A9:BE:73:F9:50:2E:98:D5:7E:03:EB:13:D4:49:7A:49:4B:E5:FA:5C:77:83 Fingerprint (SHA1): B6:A5:88:60:A7:F4:7F:65:02:DC:E7:8D:C8:7E:83:D6:5B:18:8A:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174492 (0x3cb01c1c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:30 2023 Not After : Wed Oct 18 17:53:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:72:47:aa:34:08:a4:0b:c6:39:21:4a:18:0e:d2:9b: f0:05:3a:c4:5a:42:e3:a9:c8:1f:c3:86:78:7e:a4:bd: 10:c8:b2:4c:83:ef:d4:66:5c:fe:e9:da:77:1c:37:5d: 36:fe:14:67:db:bd:ce:3c:0c:ab:3f:49:c8:2c:35:00: f1:a9:38:e9:2e:d9:24:dd:9d:c1:57:54:88:a4:cd:84: 64:99:70:4a:d4:b3:51:49:91:da:c0:3d:5b:88:e1:da: 2a:83:53:9a:4f:3d:48:dd:96:43:17:9d:8a:29:16:2c: a7:0b:07:e9:45:da:32:8b:91:4e:30:ae:8d:7e:bc:25: 40:b7:b5:a8:fa:0b:9d:c3:c1:e9:ee:77:a6:51:15:51: 30:55:8c:a9:6a:ec:f3:ad:cc:f2:84:af:9f:5a:27:cc: 38:17:14:6b:19:bd:f8:32:62:0b:d8:64:58:d9:ca:f0: 06:cd:c1:64:7f:5b:cc:41:f3:c9:1c:29:1b:f9:86:82: 8c:88:b3:65:63:8b:64:e9:b6:ce:61:7f:5c:33:74:07: e9:b5:ff:40:75:90:eb:d7:9a:69:56:0e:00:91:7e:60: ba:b6:e2:88:9f:3a:f3:de:72:71:4c:d9:cb:ab:58:84: 92:6f:b7:73:44:76:f6:0c:9d:1d:e5:ba:57:c5:2f:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:42:82:96:e2:b1:53:b2:d2:f7:2a:eb:07:b8:74:46: fb:14:24:d7:56:c4:fd:a4:25:43:70:1e:ee:06:61:d0: 90:4c:f2:fb:9e:ca:f5:ad:0c:c5:87:ca:fa:c1:eb:8d: 1b:a1:3d:6e:cc:d3:a9:9a:20:c0:c0:71:1c:8b:27:59: 8c:cc:bd:bf:d4:ce:6a:b8:d1:07:27:cd:7c:19:ed:53: a3:b6:8d:28:34:26:62:45:f0:92:44:77:df:53:f8:a8: 4b:97:11:cc:86:9e:e2:83:8a:c0:94:1e:5b:ad:01:ec: 6f:c1:3c:61:6a:cc:1f:97:ec:30:60:35:da:b4:b7:30: 9d:ce:f5:55:65:9b:fe:fe:0a:88:e6:ff:17:b1:93:73: 49:07:2b:7b:f9:33:c9:1e:13:1c:70:30:c4:c3:a2:3a: 92:4c:4c:38:43:13:a1:f6:bd:14:d4:64:27:b9:86:c9: 60:66:7a:07:15:61:8d:f8:94:92:ae:23:9d:7e:2e:79: 60:0a:38:9e:54:bf:69:8d:2f:34:3d:86:b0:91:55:5b: 49:0c:e8:98:72:34:81:54:e9:2f:35:3e:ab:3f:d9:9b: 73:50:f6:2b:90:ab:02:87:73:8f:ec:bf:89:0c:b4:eb: 73:5e:ae:90:78:e4:7e:95:58:50:a4:6e:ab:89:90:e9 Fingerprint (SHA-256): 92:72:83:9B:03:40:DC:A7:31:06:12:DD:10:B6:8C:FD:EB:E8:B2:A1:0D:D3:2B:40:85:46:00:79:D7:F3:DD:06 Fingerprint (SHA1): FC:5D:02:13:E3:BF:B6:29:2F:1E:94:18:15:46:F9:40:19:9D:53:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174493 (0x3cb01c1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:33 2023 Not After : Wed Oct 18 17:53:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:d6:1e:16:e4:71:e3:30:b8:5c:fc:54:5d:14:ba:53: e0:a0:95:bd:8d:64:5d:4b:2f:07:bc:b1:dc:92:44:71: 39:bd:6f:9c:de:42:59:65:09:da:7c:9c:9e:08:80:aa: 3f:fc:73:49:3e:ef:61:a6:e7:49:e9:87:17:b1:25:37: c2:b7:27:79:75:57:44:06:3e:b8:7a:f0:d5:84:04:71: 8e:9d:92:2b:3e:85:7f:af:c0:71:92:19:b3:3d:e7:63: bd:3e:3b:3c:a7:89:7b:6f:44:62:2b:54:3c:81:84:73: 1b:1b:4a:32:78:b3:7a:e0:f0:e7:d6:6c:84:ae:8c:9a: c8:88:e6:17:73:62:62:66:7e:69:48:5b:ce:d5:4b:1b: 9d:4c:ba:87:82:43:e0:f5:4f:78:b5:cc:f3:22:90:eb: 24:30:0d:c3:b9:9c:88:f9:6f:ad:b7:3e:c6:04:fa:3d: 08:b4:85:f0:87:b2:34:94:28:c5:6b:8a:60:e1:c6:76: ae:bc:56:cf:db:be:08:1b:39:eb:a5:8f:0e:98:53:ad: c6:ec:26:db:88:9e:e9:0e:27:de:66:b8:5b:7f:14:c1: 33:2c:29:8c:9a:3b:d5:93:a7:a8:7f:10:ee:05:c8:45: 8a:87:be:df:00:5a:cd:fa:99:d0:6a:2d:fa:06:e8:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:87:f6:ef:0a:04:fa:88:04:49:a8:13:ba:66:70:64: 60:56:ae:11:9f:1d:da:b7:4f:73:9b:f2:42:32:2c:a6: 8b:32:0e:96:99:f5:ae:db:6d:54:92:54:fd:aa:cd:7d: fb:50:e7:2e:84:bc:0b:a7:e5:ba:63:7d:2a:ce:32:7b: 3f:4f:a2:5e:a3:a0:82:53:2a:8d:f8:94:3f:66:42:df: ab:88:44:13:f1:d0:14:35:af:16:f1:a9:47:e3:ec:45: 01:b4:93:7e:bf:f1:d8:99:88:b2:05:dc:0b:b1:6f:d8: eb:8c:71:ca:4b:0c:29:6c:2e:dc:76:3d:89:bf:c6:44: 21:ae:76:22:bb:c8:17:1d:5f:c6:81:69:c3:dd:e1:ae: f2:c9:18:68:c8:46:40:66:9f:66:a9:77:b2:db:76:fa: 2b:ef:a3:94:ba:a9:6b:fd:3c:ae:4e:cc:91:6b:e8:e9: db:c7:20:cc:ee:7f:77:05:f1:66:e0:0c:75:b4:59:1c: 0b:fc:fd:75:db:ff:6c:98:ee:1e:ed:0c:cd:b1:02:b0: 32:90:e4:ee:a0:b7:20:d5:17:51:80:5c:78:64:42:a2: db:83:ba:b1:7e:cd:35:7f:6d:16:d2:a2:5d:53:58:a5: c0:a8:a6:55:95:5f:27:b1:af:2d:63:6d:5c:50:1b:f2 Fingerprint (SHA-256): 2D:70:B4:67:DE:0A:4C:4A:1F:EC:D4:BD:54:E7:F0:07:C9:93:36:28:F4:39:0F:9A:C3:31:B8:0A:9D:34:13:7E Fingerprint (SHA1): 73:4B:9B:3B:CD:31:27:51:F5:44:D8:5D:96:DA:3A:F2:E3:F7:BE:57 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174491 (0x3cb01c1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:28 2023 Not After : Wed Oct 18 17:53:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:05:3a:4d:d8:68:ba:fc:e6:ff:55:d2:3a:c7:ba:de: 8d:6b:07:90:ea:19:93:6f:f9:89:a0:37:a6:96:c4:0b: 9f:18:b2:67:27:40:6a:d2:0f:af:50:44:3b:ad:a5:a5: da:81:17:00:8c:f3:b9:0f:6d:03:b8:49:c1:02:bb:e6: 1f:65:45:0a:c4:b3:4a:db:3f:6e:00:4d:ad:f3:4b:eb: ff:89:f4:99:fe:b8:34:13:ca:88:6c:cf:39:ae:51:d2: 34:14:58:8b:ec:1d:e7:a0:7b:2f:10:76:51:68:fd:77: f7:95:28:f3:a8:71:64:e5:66:39:90:55:46:61:01:4d: 9e:fd:2d:59:0f:7a:ba:79:98:68:56:8b:07:8c:57:be: 26:f2:cf:e6:f4:20:fa:ac:9c:5e:cb:75:b8:2a:a4:53: 61:b0:f4:2e:63:d9:b4:42:1f:a2:f8:5b:0e:7e:83:3b: ea:4d:95:2b:c0:97:87:2f:b2:4f:ab:c4:95:f2:89:e5: 38:cc:3e:a9:52:d5:c8:05:5b:1f:05:17:2a:98:bb:27: 12:a3:49:49:30:6d:d1:ea:51:78:7b:32:6e:c8:59:af: 2b:02:5e:36:ab:86:cc:b4:62:2c:80:d9:41:32:f6:92: 8e:5f:56:37:3e:58:ff:a9:d0:6f:b3:ba:aa:e6:a7:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:15:57:0a:99:77:a1:a4:c7:40:6b:bb:33:46:03:6d: 6d:8a:ae:1a:cd:9d:66:90:f1:0e:d3:3d:68:02:ba:b9: fa:99:9f:7b:b3:9b:13:38:fb:75:29:d7:40:6e:d2:ac: 2b:0e:5a:91:c6:f2:84:40:5b:47:38:e7:b2:ac:f6:af: c3:53:44:a2:25:5d:17:42:3f:20:03:bb:1e:db:c3:63: 1b:a0:9f:4e:0e:b4:b8:83:b9:b6:26:f7:0b:25:2b:cd: 55:56:08:fe:a9:29:7b:42:f6:69:57:68:09:6d:2c:e5: 21:92:3f:b6:af:de:8b:6a:49:9e:a7:ba:13:2f:ff:79: 23:1a:30:5f:70:a0:c5:ec:40:a4:92:20:74:3d:8f:14: 73:b7:0b:79:51:81:12:6a:e9:89:db:15:64:34:95:b4: 3b:1c:df:6e:f7:e0:3e:dc:4f:e4:c3:43:e1:84:e0:5f: 37:12:e4:34:9d:8d:46:32:97:54:99:af:07:82:a7:c6: 33:36:20:94:04:bc:60:71:bc:49:60:95:1b:cf:2b:a3: f4:29:c9:98:48:d4:ae:f0:bd:04:f5:67:c9:11:44:80: bb:3f:c0:2e:e3:b0:ea:16:11:de:f0:a2:62:ee:9e:4c: 42:e6:24:33:27:2d:07:9d:74:3a:4c:66:3c:2c:3a:a0 Fingerprint (SHA-256): 60:A3:DB:83:67:AC:4C:19:7F:0A:A9:BE:73:F9:50:2E:98:D5:7E:03:EB:13:D4:49:7A:49:4B:E5:FA:5C:77:83 Fingerprint (SHA1): B6:A5:88:60:A7:F4:7F:65:02:DC:E7:8D:C8:7E:83:D6:5B:18:8A:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174492 (0x3cb01c1c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:30 2023 Not After : Wed Oct 18 17:53:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:72:47:aa:34:08:a4:0b:c6:39:21:4a:18:0e:d2:9b: f0:05:3a:c4:5a:42:e3:a9:c8:1f:c3:86:78:7e:a4:bd: 10:c8:b2:4c:83:ef:d4:66:5c:fe:e9:da:77:1c:37:5d: 36:fe:14:67:db:bd:ce:3c:0c:ab:3f:49:c8:2c:35:00: f1:a9:38:e9:2e:d9:24:dd:9d:c1:57:54:88:a4:cd:84: 64:99:70:4a:d4:b3:51:49:91:da:c0:3d:5b:88:e1:da: 2a:83:53:9a:4f:3d:48:dd:96:43:17:9d:8a:29:16:2c: a7:0b:07:e9:45:da:32:8b:91:4e:30:ae:8d:7e:bc:25: 40:b7:b5:a8:fa:0b:9d:c3:c1:e9:ee:77:a6:51:15:51: 30:55:8c:a9:6a:ec:f3:ad:cc:f2:84:af:9f:5a:27:cc: 38:17:14:6b:19:bd:f8:32:62:0b:d8:64:58:d9:ca:f0: 06:cd:c1:64:7f:5b:cc:41:f3:c9:1c:29:1b:f9:86:82: 8c:88:b3:65:63:8b:64:e9:b6:ce:61:7f:5c:33:74:07: e9:b5:ff:40:75:90:eb:d7:9a:69:56:0e:00:91:7e:60: ba:b6:e2:88:9f:3a:f3:de:72:71:4c:d9:cb:ab:58:84: 92:6f:b7:73:44:76:f6:0c:9d:1d:e5:ba:57:c5:2f:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:42:82:96:e2:b1:53:b2:d2:f7:2a:eb:07:b8:74:46: fb:14:24:d7:56:c4:fd:a4:25:43:70:1e:ee:06:61:d0: 90:4c:f2:fb:9e:ca:f5:ad:0c:c5:87:ca:fa:c1:eb:8d: 1b:a1:3d:6e:cc:d3:a9:9a:20:c0:c0:71:1c:8b:27:59: 8c:cc:bd:bf:d4:ce:6a:b8:d1:07:27:cd:7c:19:ed:53: a3:b6:8d:28:34:26:62:45:f0:92:44:77:df:53:f8:a8: 4b:97:11:cc:86:9e:e2:83:8a:c0:94:1e:5b:ad:01:ec: 6f:c1:3c:61:6a:cc:1f:97:ec:30:60:35:da:b4:b7:30: 9d:ce:f5:55:65:9b:fe:fe:0a:88:e6:ff:17:b1:93:73: 49:07:2b:7b:f9:33:c9:1e:13:1c:70:30:c4:c3:a2:3a: 92:4c:4c:38:43:13:a1:f6:bd:14:d4:64:27:b9:86:c9: 60:66:7a:07:15:61:8d:f8:94:92:ae:23:9d:7e:2e:79: 60:0a:38:9e:54:bf:69:8d:2f:34:3d:86:b0:91:55:5b: 49:0c:e8:98:72:34:81:54:e9:2f:35:3e:ab:3f:d9:9b: 73:50:f6:2b:90:ab:02:87:73:8f:ec:bf:89:0c:b4:eb: 73:5e:ae:90:78:e4:7e:95:58:50:a4:6e:ab:89:90:e9 Fingerprint (SHA-256): 92:72:83:9B:03:40:DC:A7:31:06:12:DD:10:B6:8C:FD:EB:E8:B2:A1:0D:D3:2B:40:85:46:00:79:D7:F3:DD:06 Fingerprint (SHA1): FC:5D:02:13:E3:BF:B6:29:2F:1E:94:18:15:46:F9:40:19:9D:53:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174493 (0x3cb01c1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:33 2023 Not After : Wed Oct 18 17:53:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:d6:1e:16:e4:71:e3:30:b8:5c:fc:54:5d:14:ba:53: e0:a0:95:bd:8d:64:5d:4b:2f:07:bc:b1:dc:92:44:71: 39:bd:6f:9c:de:42:59:65:09:da:7c:9c:9e:08:80:aa: 3f:fc:73:49:3e:ef:61:a6:e7:49:e9:87:17:b1:25:37: c2:b7:27:79:75:57:44:06:3e:b8:7a:f0:d5:84:04:71: 8e:9d:92:2b:3e:85:7f:af:c0:71:92:19:b3:3d:e7:63: bd:3e:3b:3c:a7:89:7b:6f:44:62:2b:54:3c:81:84:73: 1b:1b:4a:32:78:b3:7a:e0:f0:e7:d6:6c:84:ae:8c:9a: c8:88:e6:17:73:62:62:66:7e:69:48:5b:ce:d5:4b:1b: 9d:4c:ba:87:82:43:e0:f5:4f:78:b5:cc:f3:22:90:eb: 24:30:0d:c3:b9:9c:88:f9:6f:ad:b7:3e:c6:04:fa:3d: 08:b4:85:f0:87:b2:34:94:28:c5:6b:8a:60:e1:c6:76: ae:bc:56:cf:db:be:08:1b:39:eb:a5:8f:0e:98:53:ad: c6:ec:26:db:88:9e:e9:0e:27:de:66:b8:5b:7f:14:c1: 33:2c:29:8c:9a:3b:d5:93:a7:a8:7f:10:ee:05:c8:45: 8a:87:be:df:00:5a:cd:fa:99:d0:6a:2d:fa:06:e8:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:87:f6:ef:0a:04:fa:88:04:49:a8:13:ba:66:70:64: 60:56:ae:11:9f:1d:da:b7:4f:73:9b:f2:42:32:2c:a6: 8b:32:0e:96:99:f5:ae:db:6d:54:92:54:fd:aa:cd:7d: fb:50:e7:2e:84:bc:0b:a7:e5:ba:63:7d:2a:ce:32:7b: 3f:4f:a2:5e:a3:a0:82:53:2a:8d:f8:94:3f:66:42:df: ab:88:44:13:f1:d0:14:35:af:16:f1:a9:47:e3:ec:45: 01:b4:93:7e:bf:f1:d8:99:88:b2:05:dc:0b:b1:6f:d8: eb:8c:71:ca:4b:0c:29:6c:2e:dc:76:3d:89:bf:c6:44: 21:ae:76:22:bb:c8:17:1d:5f:c6:81:69:c3:dd:e1:ae: f2:c9:18:68:c8:46:40:66:9f:66:a9:77:b2:db:76:fa: 2b:ef:a3:94:ba:a9:6b:fd:3c:ae:4e:cc:91:6b:e8:e9: db:c7:20:cc:ee:7f:77:05:f1:66:e0:0c:75:b4:59:1c: 0b:fc:fd:75:db:ff:6c:98:ee:1e:ed:0c:cd:b1:02:b0: 32:90:e4:ee:a0:b7:20:d5:17:51:80:5c:78:64:42:a2: db:83:ba:b1:7e:cd:35:7f:6d:16:d2:a2:5d:53:58:a5: c0:a8:a6:55:95:5f:27:b1:af:2d:63:6d:5c:50:1b:f2 Fingerprint (SHA-256): 2D:70:B4:67:DE:0A:4C:4A:1F:EC:D4:BD:54:E7:F0:07:C9:93:36:28:F4:39:0F:9A:C3:31:B8:0A:9D:34:13:7E Fingerprint (SHA1): 73:4B:9B:3B:CD:31:27:51:F5:44:D8:5D:96:DA:3A:F2:E3:F7:BE:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174491 (0x3cb01c1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:28 2023 Not After : Wed Oct 18 17:53:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:05:3a:4d:d8:68:ba:fc:e6:ff:55:d2:3a:c7:ba:de: 8d:6b:07:90:ea:19:93:6f:f9:89:a0:37:a6:96:c4:0b: 9f:18:b2:67:27:40:6a:d2:0f:af:50:44:3b:ad:a5:a5: da:81:17:00:8c:f3:b9:0f:6d:03:b8:49:c1:02:bb:e6: 1f:65:45:0a:c4:b3:4a:db:3f:6e:00:4d:ad:f3:4b:eb: ff:89:f4:99:fe:b8:34:13:ca:88:6c:cf:39:ae:51:d2: 34:14:58:8b:ec:1d:e7:a0:7b:2f:10:76:51:68:fd:77: f7:95:28:f3:a8:71:64:e5:66:39:90:55:46:61:01:4d: 9e:fd:2d:59:0f:7a:ba:79:98:68:56:8b:07:8c:57:be: 26:f2:cf:e6:f4:20:fa:ac:9c:5e:cb:75:b8:2a:a4:53: 61:b0:f4:2e:63:d9:b4:42:1f:a2:f8:5b:0e:7e:83:3b: ea:4d:95:2b:c0:97:87:2f:b2:4f:ab:c4:95:f2:89:e5: 38:cc:3e:a9:52:d5:c8:05:5b:1f:05:17:2a:98:bb:27: 12:a3:49:49:30:6d:d1:ea:51:78:7b:32:6e:c8:59:af: 2b:02:5e:36:ab:86:cc:b4:62:2c:80:d9:41:32:f6:92: 8e:5f:56:37:3e:58:ff:a9:d0:6f:b3:ba:aa:e6:a7:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:15:57:0a:99:77:a1:a4:c7:40:6b:bb:33:46:03:6d: 6d:8a:ae:1a:cd:9d:66:90:f1:0e:d3:3d:68:02:ba:b9: fa:99:9f:7b:b3:9b:13:38:fb:75:29:d7:40:6e:d2:ac: 2b:0e:5a:91:c6:f2:84:40:5b:47:38:e7:b2:ac:f6:af: c3:53:44:a2:25:5d:17:42:3f:20:03:bb:1e:db:c3:63: 1b:a0:9f:4e:0e:b4:b8:83:b9:b6:26:f7:0b:25:2b:cd: 55:56:08:fe:a9:29:7b:42:f6:69:57:68:09:6d:2c:e5: 21:92:3f:b6:af:de:8b:6a:49:9e:a7:ba:13:2f:ff:79: 23:1a:30:5f:70:a0:c5:ec:40:a4:92:20:74:3d:8f:14: 73:b7:0b:79:51:81:12:6a:e9:89:db:15:64:34:95:b4: 3b:1c:df:6e:f7:e0:3e:dc:4f:e4:c3:43:e1:84:e0:5f: 37:12:e4:34:9d:8d:46:32:97:54:99:af:07:82:a7:c6: 33:36:20:94:04:bc:60:71:bc:49:60:95:1b:cf:2b:a3: f4:29:c9:98:48:d4:ae:f0:bd:04:f5:67:c9:11:44:80: bb:3f:c0:2e:e3:b0:ea:16:11:de:f0:a2:62:ee:9e:4c: 42:e6:24:33:27:2d:07:9d:74:3a:4c:66:3c:2c:3a:a0 Fingerprint (SHA-256): 60:A3:DB:83:67:AC:4C:19:7F:0A:A9:BE:73:F9:50:2E:98:D5:7E:03:EB:13:D4:49:7A:49:4B:E5:FA:5C:77:83 Fingerprint (SHA1): B6:A5:88:60:A7:F4:7F:65:02:DC:E7:8D:C8:7E:83:D6:5B:18:8A:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174491 (0x3cb01c1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:28 2023 Not After : Wed Oct 18 17:53:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:05:3a:4d:d8:68:ba:fc:e6:ff:55:d2:3a:c7:ba:de: 8d:6b:07:90:ea:19:93:6f:f9:89:a0:37:a6:96:c4:0b: 9f:18:b2:67:27:40:6a:d2:0f:af:50:44:3b:ad:a5:a5: da:81:17:00:8c:f3:b9:0f:6d:03:b8:49:c1:02:bb:e6: 1f:65:45:0a:c4:b3:4a:db:3f:6e:00:4d:ad:f3:4b:eb: ff:89:f4:99:fe:b8:34:13:ca:88:6c:cf:39:ae:51:d2: 34:14:58:8b:ec:1d:e7:a0:7b:2f:10:76:51:68:fd:77: f7:95:28:f3:a8:71:64:e5:66:39:90:55:46:61:01:4d: 9e:fd:2d:59:0f:7a:ba:79:98:68:56:8b:07:8c:57:be: 26:f2:cf:e6:f4:20:fa:ac:9c:5e:cb:75:b8:2a:a4:53: 61:b0:f4:2e:63:d9:b4:42:1f:a2:f8:5b:0e:7e:83:3b: ea:4d:95:2b:c0:97:87:2f:b2:4f:ab:c4:95:f2:89:e5: 38:cc:3e:a9:52:d5:c8:05:5b:1f:05:17:2a:98:bb:27: 12:a3:49:49:30:6d:d1:ea:51:78:7b:32:6e:c8:59:af: 2b:02:5e:36:ab:86:cc:b4:62:2c:80:d9:41:32:f6:92: 8e:5f:56:37:3e:58:ff:a9:d0:6f:b3:ba:aa:e6:a7:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:15:57:0a:99:77:a1:a4:c7:40:6b:bb:33:46:03:6d: 6d:8a:ae:1a:cd:9d:66:90:f1:0e:d3:3d:68:02:ba:b9: fa:99:9f:7b:b3:9b:13:38:fb:75:29:d7:40:6e:d2:ac: 2b:0e:5a:91:c6:f2:84:40:5b:47:38:e7:b2:ac:f6:af: c3:53:44:a2:25:5d:17:42:3f:20:03:bb:1e:db:c3:63: 1b:a0:9f:4e:0e:b4:b8:83:b9:b6:26:f7:0b:25:2b:cd: 55:56:08:fe:a9:29:7b:42:f6:69:57:68:09:6d:2c:e5: 21:92:3f:b6:af:de:8b:6a:49:9e:a7:ba:13:2f:ff:79: 23:1a:30:5f:70:a0:c5:ec:40:a4:92:20:74:3d:8f:14: 73:b7:0b:79:51:81:12:6a:e9:89:db:15:64:34:95:b4: 3b:1c:df:6e:f7:e0:3e:dc:4f:e4:c3:43:e1:84:e0:5f: 37:12:e4:34:9d:8d:46:32:97:54:99:af:07:82:a7:c6: 33:36:20:94:04:bc:60:71:bc:49:60:95:1b:cf:2b:a3: f4:29:c9:98:48:d4:ae:f0:bd:04:f5:67:c9:11:44:80: bb:3f:c0:2e:e3:b0:ea:16:11:de:f0:a2:62:ee:9e:4c: 42:e6:24:33:27:2d:07:9d:74:3a:4c:66:3c:2c:3a:a0 Fingerprint (SHA-256): 60:A3:DB:83:67:AC:4C:19:7F:0A:A9:BE:73:F9:50:2E:98:D5:7E:03:EB:13:D4:49:7A:49:4B:E5:FA:5C:77:83 Fingerprint (SHA1): B6:A5:88:60:A7:F4:7F:65:02:DC:E7:8D:C8:7E:83:D6:5B:18:8A:63 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174492 (0x3cb01c1c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:30 2023 Not After : Wed Oct 18 17:53:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:72:47:aa:34:08:a4:0b:c6:39:21:4a:18:0e:d2:9b: f0:05:3a:c4:5a:42:e3:a9:c8:1f:c3:86:78:7e:a4:bd: 10:c8:b2:4c:83:ef:d4:66:5c:fe:e9:da:77:1c:37:5d: 36:fe:14:67:db:bd:ce:3c:0c:ab:3f:49:c8:2c:35:00: f1:a9:38:e9:2e:d9:24:dd:9d:c1:57:54:88:a4:cd:84: 64:99:70:4a:d4:b3:51:49:91:da:c0:3d:5b:88:e1:da: 2a:83:53:9a:4f:3d:48:dd:96:43:17:9d:8a:29:16:2c: a7:0b:07:e9:45:da:32:8b:91:4e:30:ae:8d:7e:bc:25: 40:b7:b5:a8:fa:0b:9d:c3:c1:e9:ee:77:a6:51:15:51: 30:55:8c:a9:6a:ec:f3:ad:cc:f2:84:af:9f:5a:27:cc: 38:17:14:6b:19:bd:f8:32:62:0b:d8:64:58:d9:ca:f0: 06:cd:c1:64:7f:5b:cc:41:f3:c9:1c:29:1b:f9:86:82: 8c:88:b3:65:63:8b:64:e9:b6:ce:61:7f:5c:33:74:07: e9:b5:ff:40:75:90:eb:d7:9a:69:56:0e:00:91:7e:60: ba:b6:e2:88:9f:3a:f3:de:72:71:4c:d9:cb:ab:58:84: 92:6f:b7:73:44:76:f6:0c:9d:1d:e5:ba:57:c5:2f:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:42:82:96:e2:b1:53:b2:d2:f7:2a:eb:07:b8:74:46: fb:14:24:d7:56:c4:fd:a4:25:43:70:1e:ee:06:61:d0: 90:4c:f2:fb:9e:ca:f5:ad:0c:c5:87:ca:fa:c1:eb:8d: 1b:a1:3d:6e:cc:d3:a9:9a:20:c0:c0:71:1c:8b:27:59: 8c:cc:bd:bf:d4:ce:6a:b8:d1:07:27:cd:7c:19:ed:53: a3:b6:8d:28:34:26:62:45:f0:92:44:77:df:53:f8:a8: 4b:97:11:cc:86:9e:e2:83:8a:c0:94:1e:5b:ad:01:ec: 6f:c1:3c:61:6a:cc:1f:97:ec:30:60:35:da:b4:b7:30: 9d:ce:f5:55:65:9b:fe:fe:0a:88:e6:ff:17:b1:93:73: 49:07:2b:7b:f9:33:c9:1e:13:1c:70:30:c4:c3:a2:3a: 92:4c:4c:38:43:13:a1:f6:bd:14:d4:64:27:b9:86:c9: 60:66:7a:07:15:61:8d:f8:94:92:ae:23:9d:7e:2e:79: 60:0a:38:9e:54:bf:69:8d:2f:34:3d:86:b0:91:55:5b: 49:0c:e8:98:72:34:81:54:e9:2f:35:3e:ab:3f:d9:9b: 73:50:f6:2b:90:ab:02:87:73:8f:ec:bf:89:0c:b4:eb: 73:5e:ae:90:78:e4:7e:95:58:50:a4:6e:ab:89:90:e9 Fingerprint (SHA-256): 92:72:83:9B:03:40:DC:A7:31:06:12:DD:10:B6:8C:FD:EB:E8:B2:A1:0D:D3:2B:40:85:46:00:79:D7:F3:DD:06 Fingerprint (SHA1): FC:5D:02:13:E3:BF:B6:29:2F:1E:94:18:15:46:F9:40:19:9D:53:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174492 (0x3cb01c1c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:53:30 2023 Not After : Wed Oct 18 17:53:30 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:72:47:aa:34:08:a4:0b:c6:39:21:4a:18:0e:d2:9b: f0:05:3a:c4:5a:42:e3:a9:c8:1f:c3:86:78:7e:a4:bd: 10:c8:b2:4c:83:ef:d4:66:5c:fe:e9:da:77:1c:37:5d: 36:fe:14:67:db:bd:ce:3c:0c:ab:3f:49:c8:2c:35:00: f1:a9:38:e9:2e:d9:24:dd:9d:c1:57:54:88:a4:cd:84: 64:99:70:4a:d4:b3:51:49:91:da:c0:3d:5b:88:e1:da: 2a:83:53:9a:4f:3d:48:dd:96:43:17:9d:8a:29:16:2c: a7:0b:07:e9:45:da:32:8b:91:4e:30:ae:8d:7e:bc:25: 40:b7:b5:a8:fa:0b:9d:c3:c1:e9:ee:77:a6:51:15:51: 30:55:8c:a9:6a:ec:f3:ad:cc:f2:84:af:9f:5a:27:cc: 38:17:14:6b:19:bd:f8:32:62:0b:d8:64:58:d9:ca:f0: 06:cd:c1:64:7f:5b:cc:41:f3:c9:1c:29:1b:f9:86:82: 8c:88:b3:65:63:8b:64:e9:b6:ce:61:7f:5c:33:74:07: e9:b5:ff:40:75:90:eb:d7:9a:69:56:0e:00:91:7e:60: ba:b6:e2:88:9f:3a:f3:de:72:71:4c:d9:cb:ab:58:84: 92:6f:b7:73:44:76:f6:0c:9d:1d:e5:ba:57:c5:2f:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:42:82:96:e2:b1:53:b2:d2:f7:2a:eb:07:b8:74:46: fb:14:24:d7:56:c4:fd:a4:25:43:70:1e:ee:06:61:d0: 90:4c:f2:fb:9e:ca:f5:ad:0c:c5:87:ca:fa:c1:eb:8d: 1b:a1:3d:6e:cc:d3:a9:9a:20:c0:c0:71:1c:8b:27:59: 8c:cc:bd:bf:d4:ce:6a:b8:d1:07:27:cd:7c:19:ed:53: a3:b6:8d:28:34:26:62:45:f0:92:44:77:df:53:f8:a8: 4b:97:11:cc:86:9e:e2:83:8a:c0:94:1e:5b:ad:01:ec: 6f:c1:3c:61:6a:cc:1f:97:ec:30:60:35:da:b4:b7:30: 9d:ce:f5:55:65:9b:fe:fe:0a:88:e6:ff:17:b1:93:73: 49:07:2b:7b:f9:33:c9:1e:13:1c:70:30:c4:c3:a2:3a: 92:4c:4c:38:43:13:a1:f6:bd:14:d4:64:27:b9:86:c9: 60:66:7a:07:15:61:8d:f8:94:92:ae:23:9d:7e:2e:79: 60:0a:38:9e:54:bf:69:8d:2f:34:3d:86:b0:91:55:5b: 49:0c:e8:98:72:34:81:54:e9:2f:35:3e:ab:3f:d9:9b: 73:50:f6:2b:90:ab:02:87:73:8f:ec:bf:89:0c:b4:eb: 73:5e:ae:90:78:e4:7e:95:58:50:a4:6e:ab:89:90:e9 Fingerprint (SHA-256): 92:72:83:9B:03:40:DC:A7:31:06:12:DD:10:B6:8C:FD:EB:E8:B2:A1:0D:D3:2B:40:85:46:00:79:D7:F3:DD:06 Fingerprint (SHA1): FC:5D:02:13:E3:BF:B6:29:2F:1E:94:18:15:46:F9:40:19:9D:53:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174493 (0x3cb01c1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:33 2023 Not After : Wed Oct 18 17:53:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:d6:1e:16:e4:71:e3:30:b8:5c:fc:54:5d:14:ba:53: e0:a0:95:bd:8d:64:5d:4b:2f:07:bc:b1:dc:92:44:71: 39:bd:6f:9c:de:42:59:65:09:da:7c:9c:9e:08:80:aa: 3f:fc:73:49:3e:ef:61:a6:e7:49:e9:87:17:b1:25:37: c2:b7:27:79:75:57:44:06:3e:b8:7a:f0:d5:84:04:71: 8e:9d:92:2b:3e:85:7f:af:c0:71:92:19:b3:3d:e7:63: bd:3e:3b:3c:a7:89:7b:6f:44:62:2b:54:3c:81:84:73: 1b:1b:4a:32:78:b3:7a:e0:f0:e7:d6:6c:84:ae:8c:9a: c8:88:e6:17:73:62:62:66:7e:69:48:5b:ce:d5:4b:1b: 9d:4c:ba:87:82:43:e0:f5:4f:78:b5:cc:f3:22:90:eb: 24:30:0d:c3:b9:9c:88:f9:6f:ad:b7:3e:c6:04:fa:3d: 08:b4:85:f0:87:b2:34:94:28:c5:6b:8a:60:e1:c6:76: ae:bc:56:cf:db:be:08:1b:39:eb:a5:8f:0e:98:53:ad: c6:ec:26:db:88:9e:e9:0e:27:de:66:b8:5b:7f:14:c1: 33:2c:29:8c:9a:3b:d5:93:a7:a8:7f:10:ee:05:c8:45: 8a:87:be:df:00:5a:cd:fa:99:d0:6a:2d:fa:06:e8:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:87:f6:ef:0a:04:fa:88:04:49:a8:13:ba:66:70:64: 60:56:ae:11:9f:1d:da:b7:4f:73:9b:f2:42:32:2c:a6: 8b:32:0e:96:99:f5:ae:db:6d:54:92:54:fd:aa:cd:7d: fb:50:e7:2e:84:bc:0b:a7:e5:ba:63:7d:2a:ce:32:7b: 3f:4f:a2:5e:a3:a0:82:53:2a:8d:f8:94:3f:66:42:df: ab:88:44:13:f1:d0:14:35:af:16:f1:a9:47:e3:ec:45: 01:b4:93:7e:bf:f1:d8:99:88:b2:05:dc:0b:b1:6f:d8: eb:8c:71:ca:4b:0c:29:6c:2e:dc:76:3d:89:bf:c6:44: 21:ae:76:22:bb:c8:17:1d:5f:c6:81:69:c3:dd:e1:ae: f2:c9:18:68:c8:46:40:66:9f:66:a9:77:b2:db:76:fa: 2b:ef:a3:94:ba:a9:6b:fd:3c:ae:4e:cc:91:6b:e8:e9: db:c7:20:cc:ee:7f:77:05:f1:66:e0:0c:75:b4:59:1c: 0b:fc:fd:75:db:ff:6c:98:ee:1e:ed:0c:cd:b1:02:b0: 32:90:e4:ee:a0:b7:20:d5:17:51:80:5c:78:64:42:a2: db:83:ba:b1:7e:cd:35:7f:6d:16:d2:a2:5d:53:58:a5: c0:a8:a6:55:95:5f:27:b1:af:2d:63:6d:5c:50:1b:f2 Fingerprint (SHA-256): 2D:70:B4:67:DE:0A:4C:4A:1F:EC:D4:BD:54:E7:F0:07:C9:93:36:28:F4:39:0F:9A:C3:31:B8:0A:9D:34:13:7E Fingerprint (SHA1): 73:4B:9B:3B:CD:31:27:51:F5:44:D8:5D:96:DA:3A:F2:E3:F7:BE:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174493 (0x3cb01c1d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:53:33 2023 Not After : Wed Oct 18 17:53:33 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:d6:1e:16:e4:71:e3:30:b8:5c:fc:54:5d:14:ba:53: e0:a0:95:bd:8d:64:5d:4b:2f:07:bc:b1:dc:92:44:71: 39:bd:6f:9c:de:42:59:65:09:da:7c:9c:9e:08:80:aa: 3f:fc:73:49:3e:ef:61:a6:e7:49:e9:87:17:b1:25:37: c2:b7:27:79:75:57:44:06:3e:b8:7a:f0:d5:84:04:71: 8e:9d:92:2b:3e:85:7f:af:c0:71:92:19:b3:3d:e7:63: bd:3e:3b:3c:a7:89:7b:6f:44:62:2b:54:3c:81:84:73: 1b:1b:4a:32:78:b3:7a:e0:f0:e7:d6:6c:84:ae:8c:9a: c8:88:e6:17:73:62:62:66:7e:69:48:5b:ce:d5:4b:1b: 9d:4c:ba:87:82:43:e0:f5:4f:78:b5:cc:f3:22:90:eb: 24:30:0d:c3:b9:9c:88:f9:6f:ad:b7:3e:c6:04:fa:3d: 08:b4:85:f0:87:b2:34:94:28:c5:6b:8a:60:e1:c6:76: ae:bc:56:cf:db:be:08:1b:39:eb:a5:8f:0e:98:53:ad: c6:ec:26:db:88:9e:e9:0e:27:de:66:b8:5b:7f:14:c1: 33:2c:29:8c:9a:3b:d5:93:a7:a8:7f:10:ee:05:c8:45: 8a:87:be:df:00:5a:cd:fa:99:d0:6a:2d:fa:06:e8:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:87:f6:ef:0a:04:fa:88:04:49:a8:13:ba:66:70:64: 60:56:ae:11:9f:1d:da:b7:4f:73:9b:f2:42:32:2c:a6: 8b:32:0e:96:99:f5:ae:db:6d:54:92:54:fd:aa:cd:7d: fb:50:e7:2e:84:bc:0b:a7:e5:ba:63:7d:2a:ce:32:7b: 3f:4f:a2:5e:a3:a0:82:53:2a:8d:f8:94:3f:66:42:df: ab:88:44:13:f1:d0:14:35:af:16:f1:a9:47:e3:ec:45: 01:b4:93:7e:bf:f1:d8:99:88:b2:05:dc:0b:b1:6f:d8: eb:8c:71:ca:4b:0c:29:6c:2e:dc:76:3d:89:bf:c6:44: 21:ae:76:22:bb:c8:17:1d:5f:c6:81:69:c3:dd:e1:ae: f2:c9:18:68:c8:46:40:66:9f:66:a9:77:b2:db:76:fa: 2b:ef:a3:94:ba:a9:6b:fd:3c:ae:4e:cc:91:6b:e8:e9: db:c7:20:cc:ee:7f:77:05:f1:66:e0:0c:75:b4:59:1c: 0b:fc:fd:75:db:ff:6c:98:ee:1e:ed:0c:cd:b1:02:b0: 32:90:e4:ee:a0:b7:20:d5:17:51:80:5c:78:64:42:a2: db:83:ba:b1:7e:cd:35:7f:6d:16:d2:a2:5d:53:58:a5: c0:a8:a6:55:95:5f:27:b1:af:2d:63:6d:5c:50:1b:f2 Fingerprint (SHA-256): 2D:70:B4:67:DE:0A:4C:4A:1F:EC:D4:BD:54:E7:F0:07:C9:93:36:28:F4:39:0F:9A:C3:31:B8:0A:9D:34:13:7E Fingerprint (SHA1): 73:4B:9B:3B:CD:31:27:51:F5:44:D8:5D:96:DA:3A:F2:E3:F7:BE:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174496 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174497 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174498 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018174499 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018174500 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018174501 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018174502 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174496 (0x3cb01c20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:53:46 2023 Not After : Wed Oct 18 17:53:46 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c7:ea:92:bb:1e:ed:3f:20:68:18:e7:5c:5f:bf:a0: e3:b1:ec:62:7c:19:1c:c5:dd:fb:f3:93:e7:62:e4:79: f0:01:c9:8c:14:61:ed:42:c9:74:e4:df:65:fe:da:ce: cd:27:b1:ca:e6:83:97:53:f6:c1:03:a6:44:52:4d:26: 24:52:13:5e:17:db:23:0d:aa:b9:4f:75:f0:29:47:d9: 47:1a:98:a0:1e:85:4f:13:f7:6e:1f:14:e9:19:d4:0f: 34:15:ac:03:da:f4:8b:9d:69:18:bd:2e:18:0c:1a:88: e4:94:d8:85:7f:97:2e:9b:41:4e:ee:62:bb:64:26:39: be:fb:2e:92:48:82:01:98:52:a1:cb:b6:0f:bc:51:49: 39:77:b0:4e:67:ef:a2:a3:31:fa:ab:f8:7b:47:e7:08: d4:c4:0f:5f:20:cb:bc:43:e9:0f:c1:15:4f:6b:7e:15: 3c:1a:ab:23:e8:43:f3:29:75:13:4b:6f:7e:51:f0:5a: 92:32:2e:c1:a7:80:9f:b2:df:a4:d2:af:43:50:fc:5b: 8e:7d:d9:3c:d7:cb:d1:14:3c:bd:b6:52:c1:39:bd:52: c2:d6:01:39:ff:6d:8a:ab:16:e0:fe:ce:1d:fb:37:87: 40:89:1f:7b:95:99:4e:47:12:a4:c0:01:63:bc:72:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:90:71:c9:db:31:77:a1:94:34:3a:e3:8a:d3:b0:9d: b0:a1:43:87:f3:91:f6:4a:0f:8f:66:6b:8c:1e:d6:6c: a1:71:15:28:9c:60:40:a0:05:33:2a:7b:9a:02:d7:b4: 8b:3a:19:78:8a:e1:83:21:f6:0e:2a:f3:ad:20:f1:9c: a3:d6:d2:f4:8c:60:97:87:cb:5c:85:a0:2b:c6:d3:67: 06:98:0c:fe:cb:0c:98:f8:51:37:d3:6a:00:4d:e1:54: 2e:25:96:03:bd:7d:07:14:85:06:68:f9:bf:31:6f:f2: 6c:ff:9d:b0:c9:98:6a:b9:e4:2b:a8:4e:b9:82:80:d6: c7:fd:66:15:a5:99:1e:4d:ee:b2:2d:39:ed:b1:fb:1d: 39:ec:68:cf:4e:ec:73:31:d5:ef:10:9e:fc:10:34:0c: d4:91:01:cf:6c:cf:b1:32:ce:cb:b8:6b:e3:2d:f5:46: ff:a3:4e:95:64:0f:39:75:e2:cc:74:13:3e:2f:cd:43: ef:bc:b8:72:28:0f:af:31:63:c5:b0:be:f2:27:dc:2b: 98:5e:02:5b:90:73:07:f2:53:ce:5e:47:38:b4:c5:63: f7:c1:4d:25:e1:68:61:6e:b5:8c:66:20:fd:ed:17:14: b8:fd:b4:de:15:72:26:a1:be:48:09:c3:34:41:aa:46 Fingerprint (SHA-256): 8F:1E:DF:D7:B3:B6:72:69:C8:D5:C6:F8:DD:6B:AC:E7:B5:F3:33:01:A3:68:5A:C8:C5:00:9C:8B:6D:93:28:8E Fingerprint (SHA1): AE:A2:FE:9C:F0:42:A5:BD:E8:BB:CA:91:5B:72:F5:25:2A:A4:80:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174496 (0x3cb01c20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:53:46 2023 Not After : Wed Oct 18 17:53:46 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c7:ea:92:bb:1e:ed:3f:20:68:18:e7:5c:5f:bf:a0: e3:b1:ec:62:7c:19:1c:c5:dd:fb:f3:93:e7:62:e4:79: f0:01:c9:8c:14:61:ed:42:c9:74:e4:df:65:fe:da:ce: cd:27:b1:ca:e6:83:97:53:f6:c1:03:a6:44:52:4d:26: 24:52:13:5e:17:db:23:0d:aa:b9:4f:75:f0:29:47:d9: 47:1a:98:a0:1e:85:4f:13:f7:6e:1f:14:e9:19:d4:0f: 34:15:ac:03:da:f4:8b:9d:69:18:bd:2e:18:0c:1a:88: e4:94:d8:85:7f:97:2e:9b:41:4e:ee:62:bb:64:26:39: be:fb:2e:92:48:82:01:98:52:a1:cb:b6:0f:bc:51:49: 39:77:b0:4e:67:ef:a2:a3:31:fa:ab:f8:7b:47:e7:08: d4:c4:0f:5f:20:cb:bc:43:e9:0f:c1:15:4f:6b:7e:15: 3c:1a:ab:23:e8:43:f3:29:75:13:4b:6f:7e:51:f0:5a: 92:32:2e:c1:a7:80:9f:b2:df:a4:d2:af:43:50:fc:5b: 8e:7d:d9:3c:d7:cb:d1:14:3c:bd:b6:52:c1:39:bd:52: c2:d6:01:39:ff:6d:8a:ab:16:e0:fe:ce:1d:fb:37:87: 40:89:1f:7b:95:99:4e:47:12:a4:c0:01:63:bc:72:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:90:71:c9:db:31:77:a1:94:34:3a:e3:8a:d3:b0:9d: b0:a1:43:87:f3:91:f6:4a:0f:8f:66:6b:8c:1e:d6:6c: a1:71:15:28:9c:60:40:a0:05:33:2a:7b:9a:02:d7:b4: 8b:3a:19:78:8a:e1:83:21:f6:0e:2a:f3:ad:20:f1:9c: a3:d6:d2:f4:8c:60:97:87:cb:5c:85:a0:2b:c6:d3:67: 06:98:0c:fe:cb:0c:98:f8:51:37:d3:6a:00:4d:e1:54: 2e:25:96:03:bd:7d:07:14:85:06:68:f9:bf:31:6f:f2: 6c:ff:9d:b0:c9:98:6a:b9:e4:2b:a8:4e:b9:82:80:d6: c7:fd:66:15:a5:99:1e:4d:ee:b2:2d:39:ed:b1:fb:1d: 39:ec:68:cf:4e:ec:73:31:d5:ef:10:9e:fc:10:34:0c: d4:91:01:cf:6c:cf:b1:32:ce:cb:b8:6b:e3:2d:f5:46: ff:a3:4e:95:64:0f:39:75:e2:cc:74:13:3e:2f:cd:43: ef:bc:b8:72:28:0f:af:31:63:c5:b0:be:f2:27:dc:2b: 98:5e:02:5b:90:73:07:f2:53:ce:5e:47:38:b4:c5:63: f7:c1:4d:25:e1:68:61:6e:b5:8c:66:20:fd:ed:17:14: b8:fd:b4:de:15:72:26:a1:be:48:09:c3:34:41:aa:46 Fingerprint (SHA-256): 8F:1E:DF:D7:B3:B6:72:69:C8:D5:C6:F8:DD:6B:AC:E7:B5:F3:33:01:A3:68:5A:C8:C5:00:9C:8B:6D:93:28:8E Fingerprint (SHA1): AE:A2:FE:9C:F0:42:A5:BD:E8:BB:CA:91:5B:72:F5:25:2A:A4:80:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174503 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174504 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018174505 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018174506 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018174507 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018174508 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018174509 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018174510 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018174511 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018174512 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018174513 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018174514 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018174515 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018174516 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018174517 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018174518 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018174519 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018174520 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018174521 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018174522 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018174523 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018174524 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018174525 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018174526 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018174527 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018174528 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018174529 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018174530 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018174531 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018174532 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174503 (0x3cb01c27) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:54:06 2023 Not After : Wed Oct 18 17:54:06 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:7d:d1:1d:9a:f2:7e:60:0f:cb:65:db:18:18:df:3f: ab:60:4e:b4:fc:60:4d:47:40:78:88:02:8d:c6:dd:7e: 76:5b:03:f3:79:f3:2c:bd:b6:c8:db:17:8d:d4:79:de: d7:94:ff:47:db:cd:7b:26:59:cf:83:8f:e1:6b:6e:52: e8:b2:2c:25:d5:0e:90:f0:17:c5:69:01:e8:65:50:7c: 93:8e:d7:c3:d4:69:95:8e:a6:ab:66:9e:50:83:88:d1: 3b:d2:19:5f:b9:1f:f2:e8:19:96:2d:c4:4d:9b:1a:bd: 36:a3:fb:09:ba:aa:6a:a4:49:e2:d8:ab:98:5f:d1:54: 65:07:ae:4e:44:fa:ea:f9:f7:e5:34:0f:db:81:50:69: 0c:08:5c:9c:e5:0b:1d:26:ad:16:89:93:fb:2c:f0:74: af:83:e9:77:9a:c8:44:b1:28:2a:4b:a1:15:31:ad:fb: b5:78:a3:71:41:aa:dc:8c:42:34:92:9b:9e:01:57:02: c5:89:99:fe:f8:4b:84:15:5a:28:b9:33:df:39:5f:ba: c5:b8:00:0d:d6:a3:50:e3:59:20:dc:7b:3a:49:65:5c: 10:3b:19:2c:2c:c5:f1:50:8b:15:e4:90:85:2a:8b:48: 12:e2:aa:7a:b9:6f:50:c7:1c:4d:e2:2d:ed:00:41:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2c:95:b9:9f:59:df:c8:39:f0:6e:e8:cb:2c:32:54:08: ac:ab:f8:03:b2:c3:bc:a9:9b:b0:cb:49:6d:46:4b:ff: b7:4c:63:2e:fa:ea:19:4a:86:5e:56:a0:22:32:df:19: 85:66:95:8f:5f:37:15:73:1a:06:ba:1b:2b:a2:e4:01: 9a:6f:f3:bc:6b:f3:cb:6a:4b:f5:99:b6:00:c0:4c:ed: 35:21:10:e8:00:57:e0:c3:76:c3:2b:ca:c4:5d:3a:3a: cb:00:e9:86:52:39:c8:17:8f:96:ac:2f:75:c9:11:07: b5:3a:98:ff:5b:1f:20:dc:70:60:26:54:1b:9d:f8:c5: f9:ce:3d:33:6c:4b:90:bf:24:8e:f4:66:c2:c4:3b:c2: 96:86:63:89:66:16:3e:50:46:29:18:1e:19:cc:02:7c: 30:28:62:2b:4d:4f:e4:b8:f4:c1:b1:b0:71:fd:d4:c0: eb:af:4b:50:c2:ce:9e:9c:63:a7:f9:57:ed:34:8b:eb: eb:1d:34:a8:7f:0f:72:de:3b:29:45:ca:93:4a:48:0d: 96:5e:58:b5:34:22:7b:5f:11:21:bd:b6:6a:bb:2e:0d: e4:16:23:56:c5:77:83:d2:8d:fc:ad:6c:b8:98:07:f4: 82:58:2c:3f:15:14:24:ce:f0:a5:fd:02:b2:fe:14:b6 Fingerprint (SHA-256): BD:CD:0B:A2:C8:7F:81:23:24:A5:74:02:0C:C3:37:D3:DA:88:A0:1C:A4:58:45:D0:AA:B9:24:F0:DC:F7:78:B1 Fingerprint (SHA1): C3:C0:5A:BB:94:A4:9C:4A:1C:68:52:24:4C:87:26:E3:F8:51:F2:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174533 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018174534 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018174535 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018174536 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018174537 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018174538 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018174539 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174533 (0x3cb01c45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:55:29 2023 Not After : Wed Oct 18 17:55:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d3:68:c5:8d:35:49:65:70:4f:4c:ea:7b:f6:6f:91: 88:51:91:4c:de:08:6e:3d:9b:8b:6d:22:3a:3f:15:0b: 97:42:e3:d9:e1:0d:e9:05:33:62:f7:61:8f:34:e5:41: e3:ab:cc:33:bc:47:a2:6b:29:07:a6:da:30:84:ed:fe: 38:a6:a1:b1:b5:c6:89:ee:73:89:73:da:96:cc:d3:f2: f6:b3:12:55:98:90:f8:91:0b:07:05:f9:3f:cc:e4:b3: 97:4b:93:83:78:d3:ed:37:07:d4:85:82:03:bf:d0:74: fe:8b:3f:0d:cf:6f:47:40:a2:4a:f2:b9:dc:fa:67:63: 58:51:24:af:73:92:fa:41:53:7f:e8:5e:e7:54:09:d7: 3b:bb:92:dc:bf:26:22:f2:2d:92:a5:eb:90:ba:20:27: bf:2c:7f:88:4d:bc:19:60:68:0e:2d:ab:63:2f:cf:ac: e1:42:64:1a:ea:7e:42:2a:f2:be:bd:26:3e:a2:ae:0c: 5b:04:c5:14:13:32:6d:2d:e2:fb:f9:e2:ac:45:47:da: aa:19:b4:aa:d1:12:24:40:a3:ef:ea:29:d2:14:e1:e9: 6c:d7:b1:3e:52:0a:5a:e7:c6:ea:b0:32:30:3b:6d:9c: 94:06:54:89:bb:b2:2a:46:6b:cd:af:27:47:5e:e7:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:1a:b6:86:3c:72:cb:78:6c:aa:b8:e8:2f:78:55:2b: ac:09:69:13:66:ae:22:01:09:a6:67:f3:7b:47:d6:ff: 48:0b:7f:79:c2:b6:fa:48:c7:cf:52:53:3e:28:30:ce: a5:69:43:4c:0b:19:17:8e:05:ad:35:c9:5e:08:97:d2: 02:ed:14:9c:b2:6c:72:95:c0:92:bd:9e:40:ac:44:0d: e8:b1:b4:0b:ef:69:f5:cb:e8:b4:3a:dc:4e:86:35:90: 9a:d8:86:9b:a3:6b:db:fe:99:1c:d0:c3:ee:86:b8:0e: 04:36:78:b1:73:56:aa:1a:1b:1a:6e:68:47:3f:dd:af: 4c:41:b3:da:a4:d3:ef:9f:7d:69:26:32:b3:f9:12:e6: b5:c5:c8:17:21:20:40:93:10:1a:7c:37:66:ab:7f:83: a8:4a:f8:e8:b1:ba:00:9a:1e:0d:99:dd:6a:91:61:25: 12:1a:91:c2:50:64:e9:e7:80:b6:c1:df:7c:6e:88:a2: 6c:73:f1:f0:d4:f4:9b:c2:92:e2:96:52:69:fd:3d:ea: 32:15:d6:8b:71:98:f5:63:fe:29:fc:fe:61:21:fa:11: cd:26:1b:2d:67:f9:9e:0a:40:7d:d3:c7:7d:97:ec:ed: 7d:43:83:6b:76:8d:26:1f:07:02:c4:60:2e:a3:ee:52 Fingerprint (SHA-256): C7:B2:F9:CC:52:68:9B:80:5A:09:45:87:E2:33:81:1A:69:9C:76:AE:65:13:8E:B5:F8:18:41:7E:91:23:C7:CE Fingerprint (SHA1): 95:1A:03:A5:D3:64:28:85:C7:69:8F:35:5A:BD:5B:A2:54:23:20:8C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174533 (0x3cb01c45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:55:29 2023 Not After : Wed Oct 18 17:55:29 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:d3:68:c5:8d:35:49:65:70:4f:4c:ea:7b:f6:6f:91: 88:51:91:4c:de:08:6e:3d:9b:8b:6d:22:3a:3f:15:0b: 97:42:e3:d9:e1:0d:e9:05:33:62:f7:61:8f:34:e5:41: e3:ab:cc:33:bc:47:a2:6b:29:07:a6:da:30:84:ed:fe: 38:a6:a1:b1:b5:c6:89:ee:73:89:73:da:96:cc:d3:f2: f6:b3:12:55:98:90:f8:91:0b:07:05:f9:3f:cc:e4:b3: 97:4b:93:83:78:d3:ed:37:07:d4:85:82:03:bf:d0:74: fe:8b:3f:0d:cf:6f:47:40:a2:4a:f2:b9:dc:fa:67:63: 58:51:24:af:73:92:fa:41:53:7f:e8:5e:e7:54:09:d7: 3b:bb:92:dc:bf:26:22:f2:2d:92:a5:eb:90:ba:20:27: bf:2c:7f:88:4d:bc:19:60:68:0e:2d:ab:63:2f:cf:ac: e1:42:64:1a:ea:7e:42:2a:f2:be:bd:26:3e:a2:ae:0c: 5b:04:c5:14:13:32:6d:2d:e2:fb:f9:e2:ac:45:47:da: aa:19:b4:aa:d1:12:24:40:a3:ef:ea:29:d2:14:e1:e9: 6c:d7:b1:3e:52:0a:5a:e7:c6:ea:b0:32:30:3b:6d:9c: 94:06:54:89:bb:b2:2a:46:6b:cd:af:27:47:5e:e7:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:1a:b6:86:3c:72:cb:78:6c:aa:b8:e8:2f:78:55:2b: ac:09:69:13:66:ae:22:01:09:a6:67:f3:7b:47:d6:ff: 48:0b:7f:79:c2:b6:fa:48:c7:cf:52:53:3e:28:30:ce: a5:69:43:4c:0b:19:17:8e:05:ad:35:c9:5e:08:97:d2: 02:ed:14:9c:b2:6c:72:95:c0:92:bd:9e:40:ac:44:0d: e8:b1:b4:0b:ef:69:f5:cb:e8:b4:3a:dc:4e:86:35:90: 9a:d8:86:9b:a3:6b:db:fe:99:1c:d0:c3:ee:86:b8:0e: 04:36:78:b1:73:56:aa:1a:1b:1a:6e:68:47:3f:dd:af: 4c:41:b3:da:a4:d3:ef:9f:7d:69:26:32:b3:f9:12:e6: b5:c5:c8:17:21:20:40:93:10:1a:7c:37:66:ab:7f:83: a8:4a:f8:e8:b1:ba:00:9a:1e:0d:99:dd:6a:91:61:25: 12:1a:91:c2:50:64:e9:e7:80:b6:c1:df:7c:6e:88:a2: 6c:73:f1:f0:d4:f4:9b:c2:92:e2:96:52:69:fd:3d:ea: 32:15:d6:8b:71:98:f5:63:fe:29:fc:fe:61:21:fa:11: cd:26:1b:2d:67:f9:9e:0a:40:7d:d3:c7:7d:97:ec:ed: 7d:43:83:6b:76:8d:26:1f:07:02:c4:60:2e:a3:ee:52 Fingerprint (SHA-256): C7:B2:F9:CC:52:68:9B:80:5A:09:45:87:E2:33:81:1A:69:9C:76:AE:65:13:8E:B5:F8:18:41:7E:91:23:C7:CE Fingerprint (SHA1): 95:1A:03:A5:D3:64:28:85:C7:69:8F:35:5A:BD:5B:A2:54:23:20:8C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174540 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174541 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174542 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174543 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174540 (0x3cb01c4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:55:50 2023 Not After : Wed Oct 18 17:55:50 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:fc:6c:88:8d:90:8c:fa:3a:c2:48:69:31:b4:1e:da: fa:06:4e:a9:62:e4:cf:f6:14:d4:5a:4f:41:6e:c0:f6: 61:2e:be:9d:f7:7d:f1:ec:5a:e1:de:dd:31:e9:fe:b2: 07:c3:92:19:29:fe:75:9a:5c:72:f2:d0:9c:bd:5c:02: 1c:d7:16:01:36:8a:f4:a7:97:97:84:6e:e9:de:b0:08: e9:8c:7f:5e:e1:b3:84:7c:6d:07:94:ce:2a:eb:4f:8f: 67:60:c9:cc:be:97:93:a5:4e:0b:8a:9b:07:97:76:39: 80:e1:47:84:85:3c:7f:0c:ea:15:01:d4:13:73:19:04: 1e:14:ed:d5:4d:87:30:c8:27:9c:fb:3e:86:29:cd:45: 34:a6:9b:d5:e1:10:9e:33:b9:92:5a:67:f7:74:ff:be: 9b:b0:f6:37:f7:57:d3:71:f8:08:14:a3:0e:65:ec:df: d6:96:e3:7d:83:6c:e8:14:a3:95:92:65:33:da:ea:0c: 46:e4:78:eb:32:d9:b9:1d:aa:af:1a:c5:c2:72:fc:9c: 81:44:6a:1d:6f:07:0b:d1:aa:29:c5:ca:b2:5f:f9:ed: 1c:8e:f3:ac:2a:48:7a:90:34:ac:48:34:ad:62:aa:5d: 2b:2c:0a:47:b8:b4:14:a1:39:1b:24:c0:69:01:d4:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:67:81:5e:84:0b:a4:cf:42:c7:48:a7:4c:a6:14:97: f4:a3:4b:7b:9f:19:f0:4e:37:df:50:5b:7c:b2:4d:ac: d1:31:18:52:37:05:2c:96:0b:98:78:51:09:3c:91:59: bb:c4:1a:08:b7:ed:38:30:59:87:5f:f2:ec:32:22:a1: 21:49:b7:08:6d:b7:c7:01:38:c7:6b:cd:86:92:90:2b: 9c:48:70:b6:84:10:f5:63:fb:ce:3b:7e:c8:e8:1b:f5: 0c:52:0e:c3:fb:0e:cf:8d:8b:56:ba:13:f8:81:b7:5a: 4d:99:02:16:23:6f:d8:3a:d2:ca:8c:c0:8f:41:b6:6c: f3:87:f2:9e:58:7a:ec:68:c3:3d:83:09:9d:fe:3a:76: e7:87:79:d7:4e:e1:db:f6:cd:63:cb:d4:54:8c:03:ed: 47:06:97:8e:74:ad:cd:f7:06:a0:82:7c:f4:32:4a:bc: c6:0e:0e:e3:5f:7e:7a:28:6c:fd:d3:b3:b0:c2:a4:1f: 27:ee:db:c6:25:70:38:e9:58:72:33:c1:ab:b9:d7:62: 0e:60:b6:cd:9d:ad:47:41:85:cd:08:bc:da:5a:2c:65: 05:e4:48:71:d0:7b:81:fa:0c:c9:c4:47:82:b4:66:10: a1:01:f6:e0:d3:d3:30:d1:41:02:d7:c8:bf:17:19:3d Fingerprint (SHA-256): 25:1C:C3:58:05:0B:7D:F1:B2:90:0F:3E:55:39:7B:38:8A:BD:5A:1C:C0:EC:BD:82:B6:3D:A7:15:9E:F3:72:A5 Fingerprint (SHA1): 90:FC:CE:19:95:9A:E7:DE:ED:28:00:FD:EB:7C:A1:69:70:F4:DC:BB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174541 (0x3cb01c4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:55:53 2023 Not After : Wed Oct 18 17:55:53 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f8:e5:12:85:71:b6:ee:c0:58:dd:6a:9e:e9:f6:bc:09: 7d:c3:2b:72:ca:a4:85:c1:48:64:28:6e:64:7e:7c:1e: a0:6b:f3:1e:1d:88:8e:3a:0e:f5:35:f8:cf:02:4b:69: e8:58:18:f3:ac:36:32:f1:7e:c4:6e:4e:f8:85:e8:bb: 2f:0b:3f:52:bb:48:c6:94:d3:ae:01:c6:e4:64:a3:f3: ac:4e:d0:9e:8d:6a:d5:6f:d4:46:1f:c5:71:ea:28:b5: 3c:27:3a:fe:c1:ed:4c:f4:7d:54:55:00:1e:4d:38:fd: 0e:e6:f2:47:d8:89:cd:99:ab:4e:cc:be:a5:fe:a0:11: 6c:a5:15:de:b7:f6:b6:b2:c5:80:18:cf:7a:09:9c:04: 2c:f8:47:4a:0a:a9:ab:f9:61:00:e3:f5:85:ba:40:d4: db:52:9a:34:01:6b:d1:33:e9:a0:1f:8e:2f:8e:c0:af: e3:8e:29:67:de:94:63:e5:c0:ba:a3:15:e7:0f:32:0b: 15:b8:cb:56:a5:08:8e:4d:90:de:59:f5:7d:83:8b:ff: 55:0c:b6:20:f4:1b:ce:73:06:06:26:0b:f9:ac:db:5d: 37:ce:f7:70:11:22:fe:50:c2:68:aa:68:32:0a:42:bd: de:3c:51:4c:32:06:34:d9:ae:17:a4:6e:cc:f9:6b:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:54:11:27:b3:f6:bc:ff:b3:6c:33:a0:da:64:3d:84: 39:8d:42:9a:ec:08:87:09:4a:44:9e:70:2c:ed:82:2e: 25:a8:9e:7b:a3:4e:e6:5e:dc:a9:24:d5:36:38:f8:40: 4c:ed:f1:30:d8:48:42:17:1b:61:14:96:23:d9:65:ff: f4:6e:07:0f:83:2d:44:bd:19:a4:af:80:ed:2d:77:97: 57:30:66:7e:92:3d:22:fa:b5:0b:be:b4:ed:16:b9:da: af:48:a5:50:15:64:2a:5b:c1:c3:c3:df:9a:02:16:9a: d7:3d:91:0f:bc:e9:bc:ae:00:18:a8:b0:39:33:a4:8e: c0:34:5a:1d:fc:1a:10:73:3d:95:d2:c1:20:cd:44:73: 15:2d:e2:de:6b:39:9e:cb:45:6a:09:62:25:9c:b8:2d: a0:db:86:1b:20:b3:fa:7d:83:90:e5:03:ca:ab:ca:11: f1:31:38:ca:21:1f:0d:d6:bd:de:e9:ef:42:de:33:c5: b2:41:56:89:c7:53:2d:2a:4f:29:a2:ca:a2:c8:d1:fe: c5:80:6d:3e:3d:a0:2b:03:b3:6d:0e:c5:72:a7:ba:dc: 14:83:a4:93:d4:0d:de:2f:de:22:71:2d:7f:5a:37:97: b9:7f:ac:38:41:3e:6d:e6:8c:52:4d:ec:2c:9a:62:42 Fingerprint (SHA-256): FA:0C:82:EF:5A:D3:4E:89:0A:47:A1:5B:9D:7A:9F:78:34:07:E8:C8:C2:A5:2B:55:82:A4:54:83:A2:C2:0F:5E Fingerprint (SHA1): 2E:87:B3:BD:B5:5D:B7:83:C8:4A:6E:55:E6:CB:DC:24:AA:48:37:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174542 (0x3cb01c4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:55:55 2023 Not After : Wed Oct 18 17:55:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:8b:97:81:f5:33:9d:12:11:0c:50:d0:90:43:ce:15: 3d:5c:93:e7:61:94:21:79:50:0b:5c:d4:4e:01:0a:ba: ee:a7:52:2e:e7:9f:8b:79:97:e3:0f:c8:fb:e6:c0:e6: 21:ff:cf:f8:c2:90:69:55:bb:56:14:f4:1b:37:80:72: d2:83:1b:5d:a6:da:bd:46:9c:3f:e5:6c:be:3a:99:9a: 7f:9d:a6:bb:8c:7b:9d:d6:98:d6:63:ac:ed:04:e7:69: c6:1b:ca:a7:e8:1a:49:e3:ad:da:ec:6e:fd:aa:59:c2: f5:a2:a6:01:b8:7f:cf:9d:57:7b:da:97:ea:87:b3:8e: 66:1a:d3:cd:ef:1f:e5:7d:9d:7e:62:08:96:23:91:e6: e4:e0:20:80:e8:87:d6:06:04:9f:74:cc:1c:d4:f8:b6: ab:3c:72:c4:a7:b3:ec:61:96:1d:05:af:cb:6c:7f:59: 32:fb:5b:bb:64:70:d3:51:e4:91:23:9c:7c:c8:75:7d: d2:d9:67:0e:55:a3:6b:bf:97:e3:bd:5a:78:40:b4:dc: 6c:cc:9e:0c:8a:f2:95:13:6e:4b:fd:a1:ae:9d:18:d4: 4f:23:a6:d0:68:a0:49:d6:f1:0d:3c:d7:1c:f7:de:70: aa:3b:71:30:2f:06:93:2d:fd:ec:75:41:10:e5:03:8d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:22:15:bb:3f:9c:ad:91:7d:52:46:98:b4:40:60:99: 89:11:c4:e8:76:06:a0:0f:80:56:9b:bb:10:6d:7a:e8: 92:d9:37:19:e0:3a:0b:90:e2:d2:d6:7e:fb:f2:01:c5: 06:60:50:7c:c4:0a:d8:67:ba:5e:1c:43:a8:30:bb:36: ff:a3:e5:f2:1e:8f:98:a1:44:1b:ff:9a:af:cc:0e:d9: 7e:bd:b2:7a:36:90:c7:a6:22:9e:45:9e:bc:2a:39:9c: 35:bd:fe:44:d0:be:23:7d:81:0c:3f:68:83:e8:63:d2: d0:65:75:50:b0:41:f6:31:2b:78:3b:7f:34:4d:36:63: 1f:23:ba:09:44:ef:52:51:b3:51:9b:75:70:5e:e8:03: b6:09:d6:2e:3e:81:b4:80:7f:66:f8:3b:4e:6e:9d:a7: a4:3b:21:b8:d2:2e:fc:67:bd:07:86:3c:8a:d0:bd:1b: bc:e2:7a:5b:36:1f:7a:c2:ad:ec:08:45:d5:c8:19:69: ef:ad:74:28:78:f8:7a:af:8d:14:63:0e:ed:1a:f4:fb: 19:8a:b8:c9:d3:3d:e5:a7:5a:f9:3c:3f:a9:97:cd:74: f4:97:19:1d:24:6f:ef:7e:17:9a:f7:53:2a:64:f3:bb: 52:73:8f:cc:8a:8a:32:76:3b:9b:a2:9e:94:41:d0:96 Fingerprint (SHA-256): 66:AE:12:BA:78:60:91:28:4B:E2:D0:58:CC:36:58:93:4F:FB:41:9B:7B:EB:3B:18:F1:46:42:69:8D:28:C6:54 Fingerprint (SHA1): 28:15:C0:38:86:64:21:56:A7:DD:A3:DF:B8:86:C2:C6:CC:82:B6:15 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174544 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174545 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174546 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018174547 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018174548 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174544 (0x3cb01c50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:56:02 2023 Not After : Wed Oct 18 17:56:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:1c:a7:0d:9c:ab:d0:6b:8a:ad:5f:9d:b9:55:c8:6a: db:e0:26:85:09:e7:7f:5c:00:a6:35:2b:85:a6:1f:24: 8f:40:63:3b:23:94:4f:3a:30:2a:27:41:77:9a:40:31: ff:f2:21:a8:95:83:0c:4c:1b:36:58:e4:13:66:13:3a: 50:79:36:b6:3b:f6:d0:80:f2:a6:d5:60:e9:6f:b6:08: a7:b7:b7:c2:06:e5:48:82:af:d0:e9:ab:25:0e:eb:f0: 39:27:a0:a7:9b:50:8d:06:9f:36:6d:60:c9:8b:6e:9e: f4:18:12:61:a3:eb:14:79:95:5f:fa:30:db:ec:6e:5c: 86:a4:28:b2:77:95:6f:5c:03:2b:c6:89:eb:5e:1b:a9: 92:d9:ac:a4:2e:c6:10:b9:f4:1d:a9:c6:f5:24:a2:ef: 7e:e9:d0:55:5e:8e:30:5e:38:a8:de:52:e7:cc:9d:dc: 6a:ac:a5:29:88:cd:19:5c:3f:cc:81:bf:7c:ac:aa:45: da:86:f3:48:32:5b:51:8f:06:d9:de:0a:ec:bd:8b:74: 66:a4:ff:b3:9a:3c:38:a9:21:ec:09:08:89:49:c8:dd: dd:c7:b6:68:53:f3:b6:f4:b4:95:91:10:b3:2b:dc:c7: f7:80:ad:fa:2a:f1:74:c4:8d:49:2a:3f:30:a7:5a:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:ab:7c:34:a7:ee:2f:9d:cd:62:59:d3:2f:57:fb:3b: 46:c9:aa:29:6a:7c:43:2d:fe:eb:c4:1e:15:79:0d:3b: ae:f9:43:95:9e:46:f5:36:c4:8b:4b:0b:0f:cf:c4:42: aa:e4:3e:a1:73:c2:72:c7:64:55:07:42:b6:88:10:d9: 71:ee:49:b0:e2:cb:cb:ee:c1:71:c1:78:e0:20:1d:37: 2e:db:55:c7:e1:24:eb:55:6e:12:54:69:29:c9:88:38: 72:bc:e1:e4:40:d0:37:6e:70:fb:4b:9b:6b:e5:6e:55: 2a:51:95:56:b0:7d:68:6e:0d:0d:fa:c5:10:72:5a:9e: 58:bc:41:6f:45:cf:b8:15:df:a9:1d:af:ca:f5:fb:75: 0e:73:c5:35:75:2d:8b:a7:f3:ec:a1:15:f4:3a:21:68: d1:91:0b:c9:51:c7:e9:d2:6c:07:e0:6f:7f:62:f0:79: e1:b9:67:87:f9:91:c6:b3:cd:d7:88:44:2a:06:74:15: 0e:4e:57:3e:85:99:8b:2a:bd:70:96:b1:11:9c:37:74: d3:41:be:e2:71:59:f2:8e:d8:25:e5:0d:c2:77:7e:1e: 02:83:b2:d4:fb:d4:cf:f8:96:eb:f2:2f:27:b4:23:f9: b0:b7:3e:00:96:dd:8d:93:a5:67:04:0d:99:dc:b2:4f Fingerprint (SHA-256): F4:33:74:96:C4:D8:09:2F:06:13:26:77:A7:53:52:E0:78:D8:00:04:C9:7E:F2:63:27:2E:92:66:FC:45:EE:42 Fingerprint (SHA1): 11:7F:66:2E:E7:45:82:CD:A4:F2:46:96:82:A9:E3:C9:98:DE:FF:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174545 (0x3cb01c51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:56:05 2023 Not After : Wed Oct 18 17:56:05 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:64:09:ef:89:2c:23:71:34:be:6a:65:5f:22:fd:9a: e6:70:77:89:b2:5b:c4:fc:a2:d2:bd:23:0a:05:bb:b3: 2a:52:35:1c:36:0b:9b:b4:e2:7a:b0:b9:62:fb:16:b1: c6:0d:9b:36:5c:99:80:e4:e3:1c:7c:6b:5f:7e:56:be: 00:42:39:8a:2b:74:15:2c:9f:db:ff:df:5d:fa:a7:ba: 49:1d:20:fc:23:88:6f:ac:d7:64:f5:35:38:6d:d2:a4: 25:e3:4c:63:38:7a:87:2a:92:ad:85:13:ab:62:73:e4: 65:7e:49:d8:a4:40:7c:42:6a:32:86:ef:7c:e0:fc:8e: fb:df:c6:f0:d6:5f:bd:a9:0d:e2:d7:09:d8:ab:1d:23: 65:c5:1c:b9:84:c8:52:cf:a3:65:1e:52:02:f4:32:cc: 99:8b:a7:ed:f7:79:83:fe:f4:85:43:55:04:48:a9:88: 45:31:3f:a2:9f:2c:16:82:13:60:04:d9:7a:72:32:a5: 8d:50:14:68:3c:cf:ea:1a:d2:0b:4b:da:8a:bb:1e:9e: cf:f1:46:1f:e3:f4:26:a4:28:80:5c:06:3a:89:17:48: 6b:15:dd:8f:17:cf:de:b6:18:60:39:67:6c:29:c9:af: 85:5d:d6:87:0f:74:c3:2e:0c:db:bb:f9:80:30:bd:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:e2:3a:26:88:9b:f7:c3:04:fa:6e:23:a9:9d:58:06: a0:16:34:5f:6d:6f:ca:bb:27:f9:44:52:03:72:b4:3a: fe:c0:ee:4f:63:4a:91:4b:62:b5:04:50:9a:a2:ca:b5: 52:8e:43:89:46:6b:a4:de:a3:77:8c:0f:f6:9b:c6:a2: b1:03:c2:df:2d:0c:5d:97:c5:dc:e8:4e:2c:eb:d1:ea: bd:fb:f5:93:8b:49:40:d5:7d:27:5a:ce:f4:5e:e0:10: 78:28:3e:5f:c1:ec:ca:48:89:e2:a9:bd:50:c1:6d:59: ce:6b:e2:35:eb:f1:c8:cb:d4:8e:22:bb:8b:8c:76:e1: e9:4d:03:01:c7:1b:fb:76:e1:4b:cc:02:23:0d:b6:7f: a4:5e:3f:48:35:42:ae:c9:f6:87:42:ef:60:b5:34:6c: af:2e:b7:ea:1e:2a:5b:31:0c:fd:c3:c1:c4:ef:5e:60: 4d:91:d2:d2:8c:11:92:11:14:05:29:93:aa:a6:f2:6e: db:4a:3f:60:12:b6:63:ed:fa:8e:76:ea:c0:81:9c:50: 48:81:aa:fb:f2:91:be:a4:d0:f2:1d:aa:c4:8f:f3:b1: f8:9c:93:c0:34:2c:b4:52:59:17:eb:e0:5b:fa:03:9a: 70:4f:45:c6:be:be:52:46:6d:af:99:98:4e:63:13:8a Fingerprint (SHA-256): B6:B0:CC:2F:3F:C1:F8:3C:76:6C:43:B8:DC:E0:5B:1D:4E:29:DD:10:A7:2D:84:3F:84:91:92:5F:92:BA:60:DD Fingerprint (SHA1): B3:CD:18:46:70:B8:80:8F:77:2C:D7:F0:10:D5:B0:E1:5C:DF:C7:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174546 (0x3cb01c52) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:56:07 2023 Not After : Wed Oct 18 17:56:07 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:58:70:c6:a3:36:21:02:7a:1a:8f:02:ed:17:61:e7: 96:23:e7:8e:e2:82:64:ad:39:22:45:0d:e2:41:a7:97: 2a:31:7f:de:fe:84:01:0a:09:ee:c3:f9:13:28:7f:3b: d7:9a:d6:cd:c9:45:92:dd:68:a4:39:2a:cd:8f:4a:86: 11:87:fe:c6:cf:54:a0:2a:e9:79:1d:df:d3:72:30:b1: 45:2c:67:3f:14:1b:f9:92:9d:ee:aa:f1:bb:f6:8b:98: 12:9b:79:bf:f8:a2:c1:de:28:e6:43:01:33:12:36:72: ad:ee:8d:5f:01:68:b7:a6:d1:a6:24:32:e2:6a:e6:6f: bc:fc:2d:16:57:57:16:27:8a:66:d4:7b:eb:ac:3c:22: f7:0f:45:62:49:ad:b8:75:b9:a6:50:19:dc:37:72:4a: bc:39:6d:2f:1b:59:da:7d:fa:ff:4d:5b:c9:72:19:80: 4a:02:07:ea:7b:2c:74:d5:96:f8:ad:2a:6e:b0:e1:0e: 08:f0:6d:15:e2:ca:8f:a9:0a:97:f6:3c:29:46:9d:91: a6:de:33:fd:64:d3:e2:1e:ca:dd:a2:4e:bf:bc:93:9f: f7:2e:39:e9:50:15:b2:3f:ad:81:13:48:62:f5:25:2e: 8f:78:c5:d8:6c:d6:1b:63:53:e9:3a:8e:8d:aa:f7:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0b:44:4e:8b:b1:5c:36:bc:04:eb:dd:1d:a2:85:fb:d9: 40:f6:6a:b6:63:ca:57:34:8e:be:3e:3e:4e:db:70:0e: e0:4a:67:a0:96:16:c6:12:9c:b0:6b:7f:0a:d2:d1:3f: ed:66:de:77:cb:3d:16:96:bb:cb:a8:b3:3f:a1:37:df: b7:43:7c:30:3f:35:37:44:3a:fe:e9:f9:d4:60:fc:59: ca:5a:13:9a:d2:43:b3:7b:c6:e4:4c:d0:fe:b0:56:c1: 2f:e7:05:c5:de:ee:e6:6b:56:d1:4c:eb:78:dc:29:30: 71:59:b5:90:e9:04:11:87:64:13:62:f1:27:bb:48:11: 2b:c2:55:1a:62:fa:d5:12:f4:ab:e8:50:02:6b:ea:f5: 23:f9:48:a3:99:1b:22:ff:85:18:c6:73:01:62:8b:1a: d3:3e:fd:90:84:9a:02:f0:eb:46:26:b8:90:5d:f9:c5: 04:e1:25:2d:a9:e9:6c:09:1e:54:de:88:aa:e1:a9:be: 8b:49:20:12:b0:8c:33:18:75:32:b6:de:63:c0:ba:40: e8:26:10:64:e4:d1:68:7f:28:30:92:bd:d5:71:d1:e8: 6b:e0:cc:5d:08:53:e3:0b:6a:22:6a:61:af:ab:c5:91: 94:a4:7a:7a:81:32:c1:91:bf:a9:48:f5:a9:b6:2b:48 Fingerprint (SHA-256): FB:57:CF:CD:7C:24:9F:31:F8:C9:52:88:D1:6B:9A:31:80:34:9D:C3:08:C7:F4:E8:4E:F2:EE:6D:FC:78:AB:4F Fingerprint (SHA1): 4A:22:39:DA:BE:6A:B4:66:7A:A2:EE:C5:79:C2:2A:08:46:D9:D6:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174549 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174550 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174551 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA1Root-1018174312.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018174552 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174549 (0x3cb01c55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:56:17 2023 Not After : Wed Oct 18 17:56:17 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:9d:64:2a:5f:34:c5:a0:dd:1c:56:6e:8e:c2:93:8a: 59:da:02:b5:fd:3a:18:7d:5c:bd:16:2a:8e:85:4d:b9: 7d:b3:9b:0d:9e:7a:9f:9f:cf:d4:50:fc:39:54:07:47: ff:91:b3:99:03:91:92:37:72:f6:0d:b3:ec:3d:a2:91: 51:b2:a0:7f:42:77:35:02:8a:9d:f6:6f:5c:8e:b5:05: 0f:52:03:d9:f8:6f:76:63:2b:0e:c8:c4:6c:8e:a3:67: ce:be:5f:a5:e5:f9:82:c2:e3:8c:86:4e:f6:f5:a0:cc: ac:27:ef:cb:d0:40:c7:d1:e0:be:3b:2f:b3:9f:16:df: e0:e9:83:93:1e:0c:ea:ec:d1:db:e2:ad:73:03:8b:77: a8:0b:90:52:1c:ab:c6:a0:65:4a:49:57:fd:7d:91:03: a4:00:47:04:37:68:8b:e5:0e:18:22:bc:c8:fd:b0:9f: f5:44:e3:7c:7d:1f:90:9b:b7:94:11:5c:35:9c:3c:2e: 11:3e:4d:13:65:c1:2e:30:5f:cd:86:76:5d:19:ab:fc: 86:48:a2:0c:0c:1c:03:2e:e0:6c:23:07:a5:e2:bd:44: ee:3e:00:b6:70:bd:fc:36:21:8b:ae:d6:4a:99:32:a3: 8b:5d:22:45:60:0e:6f:6a:4b:29:75:67:0c:0b:fb:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:d5:3b:ae:65:66:aa:b9:1e:bc:c5:9f:e8:7d:29:46: 55:01:b1:ff:30:ea:e2:2d:59:1d:9e:24:aa:75:2b:0f: af:69:20:90:34:1b:2a:15:64:ce:5d:06:34:67:34:2d: d2:53:59:73:55:84:f1:a3:2e:99:6d:b2:fb:a2:c9:c5: da:2f:97:9c:d3:0b:6f:c5:db:1e:c0:20:86:a0:4e:d5: 01:0c:b3:b6:df:ea:eb:62:89:f6:9a:3c:83:b4:c9:a8: f9:3f:f0:05:cb:3a:ba:e8:8c:98:fc:4b:89:8e:8d:5b: 62:be:bc:50:90:70:73:8b:77:90:d9:93:84:31:4b:8b: ae:4b:84:09:ce:5c:58:6c:9d:2f:dd:55:cf:26:d2:f2: 6c:c0:41:13:dd:ab:71:06:75:d7:7e:46:15:6e:8b:2d: 38:52:52:38:eb:bf:69:dd:33:fb:51:66:8a:51:d3:1f: c5:1d:da:78:20:8f:4f:a3:1b:9a:f1:fa:af:69:e1:80: 4a:35:9e:82:c6:26:50:30:45:f5:13:92:f1:f6:b5:96: 9e:10:95:a4:a1:cb:df:d8:7e:4e:d1:4c:0c:86:3e:42: e6:b4:2e:c9:04:51:1b:8d:5e:77:79:e8:f0:81:8f:9b: 86:86:e5:ee:96:5f:48:08:fd:8a:e5:ae:c5:93:7b:c4 Fingerprint (SHA-256): FB:04:46:9E:84:7D:9F:12:73:5B:10:6D:6E:73:C8:0D:92:E0:CE:61:BB:21:11:00:5C:75:90:72:73:EC:0E:DB Fingerprint (SHA1): 25:A5:30:8D:D5:C1:78:80:F9:7F:18:01:64:0C:63:38:9C:82:E5:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174553 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174554 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174555 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174556 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174557 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018174313.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174558 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174553 (0x3cb01c59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:56:27 2023 Not After : Wed Oct 18 17:56:27 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:cb:69:1c:ab:b6:a1:1b:d3:53:e8:b0:b4:4b:2c:4d: 4d:0e:87:28:01:01:8c:84:ad:27:21:51:64:1d:55:0e: f7:e4:50:60:ce:6f:05:a4:92:32:18:1e:d1:85:85:27: ea:13:19:ce:9c:8f:25:2b:d0:f5:d0:93:04:63:b0:f5: 50:cc:45:c1:ef:23:39:0b:4d:9c:04:b7:ad:93:f4:00: e0:24:f6:c1:2e:b3:b3:35:d8:6b:71:83:65:c1:8e:ed: 58:8d:ba:dd:c3:e5:ea:45:26:d6:36:83:e7:7b:33:31: e6:88:54:74:4c:ef:d6:96:c5:55:ce:95:7a:25:0f:37: e5:0b:3e:e2:b9:b2:e0:06:f5:2c:83:ab:b0:1b:d5:f3: 72:25:92:89:86:70:e3:a9:c7:c3:86:aa:68:e6:07:58: 75:59:2d:60:9a:22:79:2d:2c:b8:2b:c5:a1:6b:19:ab: 55:cf:70:09:6c:f7:42:da:e4:ed:e8:4d:41:fb:42:0a: 66:50:02:e6:7e:d9:ae:76:c5:d3:73:3b:79:f5:22:2b: 22:7a:2c:12:a5:0d:58:43:08:fe:22:24:c7:ef:f0:8e: 0c:b5:0b:3f:98:d1:fc:cd:2e:1f:30:7a:4a:37:28:d8: b5:8a:28:1b:52:93:b4:82:fa:d1:9d:71:42:25:8d:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:28:e5:8c:b1:b5:23:84:e6:b8:60:b8:e1:ad:bd:16: 57:fb:e1:37:7c:e4:58:2d:f7:d0:c7:ed:aa:eb:0d:a5: 64:55:b2:e7:85:9b:37:7b:a1:31:21:22:b5:cf:1c:93: c1:d8:24:b1:48:87:e7:8d:4d:42:5f:5c:33:d4:6e:bd: e1:d5:3d:49:5c:8a:99:f3:06:6f:b9:49:c8:82:35:cd: 45:8c:f8:57:6a:d6:c4:ac:a6:f7:13:f5:75:9c:ec:a8: 9c:9e:91:c5:79:ca:b5:dc:16:d2:9a:00:06:0b:11:1c: b6:1d:c8:2c:12:22:32:ec:00:f4:f6:e4:69:8e:ea:46: 79:1b:13:70:d4:4c:fa:27:34:84:1f:4a:bc:a1:bc:d8: 77:c0:8d:09:c3:cf:fc:0b:21:9d:f5:0d:fc:8d:70:4d: 09:e6:6c:d1:3a:75:c8:a6:29:0b:af:8a:57:64:6f:69: 0a:39:4d:b8:90:f3:b3:9d:79:6b:53:4e:cf:d0:d1:96: 54:f8:59:a0:fa:6f:5b:29:8d:07:70:75:76:19:97:8e: b5:86:ef:ff:9a:59:4c:bb:8e:c1:28:a6:f6:6d:09:98: 0f:0c:fb:a5:0d:73:6b:ef:94:dc:e8:4f:ba:47:c0:56: 66:23:c5:df:bd:e0:7c:95:f7:47:18:55:ea:02:a0:3d Fingerprint (SHA-256): D2:C8:DC:CB:21:33:3D:19:E5:5D:99:83:91:9F:90:68:D8:50:89:15:53:83:AB:9F:A1:8D:8E:9D:D8:51:83:0E Fingerprint (SHA1): 46:C8:86:6A:27:9F:89:7C:32:70:DA:AE:6A:36:18:21:03:FC:61:81 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174554 (0x3cb01c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:30 2023 Not After : Wed Oct 18 17:56:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:70:cb:c3:da:24:c1:33:1d:a4:41:af:b6:7d:4e:4d: 9f:26:57:3d:22:d1:11:d7:d2:06:95:3f:59:70:f2:3b: ae:f0:5e:ef:9f:e7:46:ca:84:93:1b:25:dd:c5:df:ac: da:7b:7b:ad:7c:18:d4:71:f7:f5:76:d9:43:aa:a0:d4: 06:41:cc:21:ef:24:8b:a2:db:83:a7:c2:de:ab:f8:03: e5:22:07:e7:4f:ad:74:1a:55:3d:c2:cf:16:fa:22:4e: 1f:f6:fe:02:ce:e1:96:64:9b:fd:28:e8:64:07:3e:de: 3e:58:28:a0:4a:7c:43:73:ec:cb:a7:74:c5:81:77:10: b5:93:a8:7d:2c:8c:02:a1:58:99:cd:d0:0c:90:1f:9b: 2f:df:90:70:a4:6a:b9:0d:a4:a8:a5:59:b1:0b:63:82: 07:64:2d:93:2f:c5:f9:2f:5e:93:fe:58:29:cc:e8:f5: 02:43:12:ef:50:7d:14:ad:a8:0b:e8:33:85:bc:4a:80: e9:ee:ef:d0:5d:0d:28:1d:b4:c5:66:a9:1d:c5:f0:b9: d4:18:2c:03:66:55:43:09:66:d8:a8:35:d3:2d:08:eb: 4d:b4:ee:29:7a:78:2b:0c:07:8d:ed:7d:e0:36:89:af: 0e:74:82:06:ff:5e:56:8d:28:8f:3a:dc:c3:1b:53:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:50:36:6d:19:87:06:a6:2f:75:36:00:13:ff:f6:54: db:51:a2:b8:52:2a:e5:07:9b:41:d9:f7:7f:dc:90:75: 97:35:0c:03:17:f1:9e:5b:a7:64:2f:20:21:d3:31:e3: 1c:60:f9:78:15:03:37:1e:64:59:0a:83:d9:47:c1:55: a9:f0:3b:c8:c5:4f:dd:fb:4b:dd:b8:d4:ba:7a:35:37: 85:e5:97:6a:e1:e9:6c:a1:1d:59:1e:26:02:4e:b5:3f: ba:de:72:28:72:b5:f3:9e:f9:4c:40:4e:49:45:54:59: d7:a9:49:10:15:fe:5f:d3:51:30:04:50:11:f7:ea:59: 45:02:2d:d6:b5:8b:2f:9f:57:cd:65:c6:84:ce:c5:5c: 1e:d3:2c:df:04:32:b1:41:55:cb:d6:30:a6:c4:cd:4f: 99:67:cd:4e:73:d1:68:26:1e:fd:4b:c9:d6:81:08:f6: 96:6c:db:de:44:87:a4:fd:12:58:09:c8:ba:20:87:5c: e5:f2:54:d5:cb:86:a5:e1:8b:4c:97:71:77:da:0d:c9: 2e:c4:26:e0:2c:b6:19:d5:3a:14:d6:1f:88:02:54:de: 50:03:6a:e0:53:b1:c1:f7:2d:13:c1:6a:43:0c:80:c2: c3:f0:13:7d:e5:32:30:08:88:c5:2c:81:74:d3:ef:48 Fingerprint (SHA-256): F1:DC:CF:9C:F3:4D:A2:16:43:F1:BA:A6:29:59:D9:3B:33:D3:5F:21:E4:31:CD:A8:DE:CC:1F:97:00:E4:FC:FA Fingerprint (SHA1): 2B:A6:E4:07:D9:AD:5C:D6:08:32:61:4B:B7:EF:9A:EC:34:3C:8C:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174554 (0x3cb01c5a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:30 2023 Not After : Wed Oct 18 17:56:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9f:70:cb:c3:da:24:c1:33:1d:a4:41:af:b6:7d:4e:4d: 9f:26:57:3d:22:d1:11:d7:d2:06:95:3f:59:70:f2:3b: ae:f0:5e:ef:9f:e7:46:ca:84:93:1b:25:dd:c5:df:ac: da:7b:7b:ad:7c:18:d4:71:f7:f5:76:d9:43:aa:a0:d4: 06:41:cc:21:ef:24:8b:a2:db:83:a7:c2:de:ab:f8:03: e5:22:07:e7:4f:ad:74:1a:55:3d:c2:cf:16:fa:22:4e: 1f:f6:fe:02:ce:e1:96:64:9b:fd:28:e8:64:07:3e:de: 3e:58:28:a0:4a:7c:43:73:ec:cb:a7:74:c5:81:77:10: b5:93:a8:7d:2c:8c:02:a1:58:99:cd:d0:0c:90:1f:9b: 2f:df:90:70:a4:6a:b9:0d:a4:a8:a5:59:b1:0b:63:82: 07:64:2d:93:2f:c5:f9:2f:5e:93:fe:58:29:cc:e8:f5: 02:43:12:ef:50:7d:14:ad:a8:0b:e8:33:85:bc:4a:80: e9:ee:ef:d0:5d:0d:28:1d:b4:c5:66:a9:1d:c5:f0:b9: d4:18:2c:03:66:55:43:09:66:d8:a8:35:d3:2d:08:eb: 4d:b4:ee:29:7a:78:2b:0c:07:8d:ed:7d:e0:36:89:af: 0e:74:82:06:ff:5e:56:8d:28:8f:3a:dc:c3:1b:53:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:50:36:6d:19:87:06:a6:2f:75:36:00:13:ff:f6:54: db:51:a2:b8:52:2a:e5:07:9b:41:d9:f7:7f:dc:90:75: 97:35:0c:03:17:f1:9e:5b:a7:64:2f:20:21:d3:31:e3: 1c:60:f9:78:15:03:37:1e:64:59:0a:83:d9:47:c1:55: a9:f0:3b:c8:c5:4f:dd:fb:4b:dd:b8:d4:ba:7a:35:37: 85:e5:97:6a:e1:e9:6c:a1:1d:59:1e:26:02:4e:b5:3f: ba:de:72:28:72:b5:f3:9e:f9:4c:40:4e:49:45:54:59: d7:a9:49:10:15:fe:5f:d3:51:30:04:50:11:f7:ea:59: 45:02:2d:d6:b5:8b:2f:9f:57:cd:65:c6:84:ce:c5:5c: 1e:d3:2c:df:04:32:b1:41:55:cb:d6:30:a6:c4:cd:4f: 99:67:cd:4e:73:d1:68:26:1e:fd:4b:c9:d6:81:08:f6: 96:6c:db:de:44:87:a4:fd:12:58:09:c8:ba:20:87:5c: e5:f2:54:d5:cb:86:a5:e1:8b:4c:97:71:77:da:0d:c9: 2e:c4:26:e0:2c:b6:19:d5:3a:14:d6:1f:88:02:54:de: 50:03:6a:e0:53:b1:c1:f7:2d:13:c1:6a:43:0c:80:c2: c3:f0:13:7d:e5:32:30:08:88:c5:2c:81:74:d3:ef:48 Fingerprint (SHA-256): F1:DC:CF:9C:F3:4D:A2:16:43:F1:BA:A6:29:59:D9:3B:33:D3:5F:21:E4:31:CD:A8:DE:CC:1F:97:00:E4:FC:FA Fingerprint (SHA1): 2B:A6:E4:07:D9:AD:5C:D6:08:32:61:4B:B7:EF:9A:EC:34:3C:8C:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174559 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174560 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018174561 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018174562 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174563 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-Bridge-1018174314.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174564 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018174565 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-BridgeNavy-1018174315.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174566 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174559 (0x3cb01c5f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:56:41 2023 Not After : Wed Oct 18 17:56:41 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:50:c6:01:d5:cc:84:a6:af:35:9d:f0:8b:36:09:9a: e3:dd:4a:d5:67:1d:65:a4:7b:61:b0:bb:8a:c1:1a:29: 6a:f3:79:15:a9:14:39:c2:35:04:05:c7:1a:37:15:c1: 74:73:e8:94:da:89:0c:91:fd:c4:f0:a6:eb:fe:2e:91: 47:d6:38:2b:23:54:77:e8:a6:08:e7:c8:8a:05:0d:cc: 0f:0a:54:b4:67:2a:24:20:25:3e:53:18:12:19:1d:ba: 33:01:63:0d:a5:99:33:62:85:58:9b:13:0a:50:4b:73: bb:cb:b5:79:7f:41:82:af:7a:e9:65:75:dd:d2:8c:85: 73:22:12:fe:ef:04:c9:b3:9f:92:ba:35:6a:7e:ac:36: 64:96:bb:85:6b:d5:49:e6:b9:81:f7:3e:92:4f:aa:af: 07:6c:c8:ae:30:4a:2a:21:54:d7:ba:46:bb:32:8d:af: 6f:2c:5e:4c:4a:33:56:b0:dd:eb:63:79:66:c1:cb:f0: 6d:56:3e:f5:41:87:57:c9:79:b9:0d:81:7f:b3:d2:52: 18:cf:0d:3d:79:43:86:56:d4:0e:53:18:a2:e4:2e:c8: 6a:66:d1:e8:32:08:4f:e0:59:d8:8a:96:77:2b:2c:9a: 05:8c:76:95:ca:be:2f:a1:b1:26:99:eb:af:93:27:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:a4:23:09:fe:a6:2e:1e:95:07:46:83:8e:b3:50:53: 9b:ac:d7:b4:a9:b5:25:fb:dc:80:5d:10:13:7a:15:7f: ca:94:90:60:fa:77:53:d4:1e:d2:fd:4a:32:3b:9e:48: 98:5f:dc:b2:53:b0:02:5c:f1:d7:d3:b3:83:c5:8a:80: fc:5d:28:e5:41:15:26:b3:ca:5e:a9:49:63:05:59:4b: 87:ad:87:86:9c:ec:81:c3:f7:d4:39:af:d9:1b:eb:16: 2c:a6:f3:64:57:dc:a7:8f:6b:6e:1e:7c:00:37:99:55: 6a:f1:cc:1e:51:d4:0c:10:c6:4b:3e:a9:73:a8:da:26: df:90:ea:8e:d1:6a:19:15:02:7d:fd:7f:9a:40:8a:d4: b9:c3:ae:f8:39:51:76:f0:1b:51:42:e3:1d:0c:88:57: 59:c8:50:5d:59:e2:d0:89:30:51:78:95:0e:71:91:80: 4d:a0:19:46:27:73:e9:d8:6f:59:79:bf:b5:af:27:7a: a0:da:89:1e:3d:21:5f:ea:fe:08:62:8c:55:49:86:ef: 35:05:80:5e:db:60:93:9b:3d:9f:a5:20:11:74:a2:97: cf:15:ff:5d:8a:08:6d:53:fd:af:a4:53:75:f3:4d:5f: ba:ef:2c:7f:84:62:22:bd:6f:bb:cd:fc:65:3d:a8:ef Fingerprint (SHA-256): DB:64:F7:34:FA:01:5B:2C:F1:2F:B5:11:A7:69:F5:AB:3E:A4:7C:05:68:E4:46:B1:48:D2:1E:F3:2D:45:1E:37 Fingerprint (SHA1): A6:E7:0C:5D:06:9E:0C:09:F6:DF:49:45:EF:DC:F3:C1:F4:AD:E5:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174560 (0x3cb01c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:43 2023 Not After : Wed Oct 18 17:56:43 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1c:2f:ae:f8:f0:be:30:26:0d:a4:f9:cf:a2:d2:f0: 03:e7:02:a7:75:73:ea:cb:a8:e1:0c:d7:9e:c4:fe:4a: 8f:60:3b:3f:b0:2c:94:67:58:d4:4c:2a:48:1b:af:89: 3a:4f:30:c0:d3:6f:64:89:37:f4:6e:5f:0f:78:27:cd: dc:5d:dc:0e:97:c3:aa:4c:94:ca:84:85:59:58:3e:d3: b0:7f:5b:b2:78:4e:68:67:df:e7:78:8f:17:fd:9e:a4: b7:5b:80:2a:2e:11:d1:0a:c5:c9:d0:08:db:0b:95:5d: be:90:c0:ca:ec:3c:8b:35:30:68:40:04:5b:48:6e:d1: 4f:4c:66:3e:8b:b2:0d:ff:20:59:d2:12:0a:f7:6f:bb: b2:b7:fc:24:89:4f:f9:6f:f8:5b:28:d0:6b:c1:14:6a: 9b:bc:36:da:f5:14:d3:dd:6d:09:9e:69:1c:60:0e:26: 43:ca:e6:4d:cb:df:30:44:ca:33:61:d3:c3:91:00:93: df:b4:70:fc:eb:70:83:ca:ac:e7:6f:1d:ce:29:d5:3b: ff:ce:a2:d1:02:59:24:91:76:a3:18:8c:d6:3f:00:f6: 57:e7:96:f2:c9:44:b3:b3:e6:43:40:89:b9:4c:80:09: bd:5d:4a:f6:eb:1a:ce:c2:27:08:8d:a5:5c:1a:10:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:66:d4:a7:1c:19:bf:b3:d8:c5:0c:d8:89:64:e4:18: f8:e3:25:00:bb:55:8c:68:9d:56:5f:4e:f3:e6:cd:c2: 2c:43:ed:ba:95:82:af:4d:28:90:d4:60:67:5a:d9:c2: 2a:bf:4a:22:4f:d9:5d:d0:ee:70:92:fd:c4:79:a1:fb: 9e:b5:58:9a:62:45:32:78:1e:40:8d:e9:c0:32:60:1f: f4:9f:c5:aa:e6:c6:8c:29:06:16:a6:4e:10:90:ce:8b: b5:e9:c7:ea:c9:aa:2b:b7:35:cf:46:be:90:c2:4c:d4: ef:b7:4e:fb:bb:c7:3d:b4:30:1f:db:3e:36:5e:e9:a3: 3e:12:8f:d4:88:f1:06:c0:2c:75:92:cc:8a:27:c1:2b: 2e:dd:92:ea:ac:8b:c5:7d:27:f2:0e:88:39:be:66:f2: 76:a4:84:0a:af:26:bf:e9:3a:a0:0d:e3:18:ce:df:44: de:0e:da:af:02:ce:c9:d8:5e:1f:cd:dd:aa:7b:da:4f: 8f:05:41:5e:cc:2d:01:70:d2:fc:b5:d5:1a:a4:79:fa: c7:46:e6:62:d4:f9:eb:ea:06:02:e7:75:a9:63:3a:3e: 3d:62:8d:36:5c:6b:ec:c5:3b:c8:12:e0:e3:3d:31:fa: 6d:ef:7f:13:56:c0:6f:85:66:94:50:99:37:ab:63:12 Fingerprint (SHA-256): FA:FA:DF:06:65:59:3A:73:89:CF:73:70:18:04:8B:41:85:5A:0D:D4:AB:BA:75:16:94:F5:52:39:83:1C:21:64 Fingerprint (SHA1): 98:9C:A6:3A:63:28:4F:52:BD:FD:6A:CD:B9:50:D5:D2:9D:C8:10:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174560 (0x3cb01c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:43 2023 Not After : Wed Oct 18 17:56:43 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1c:2f:ae:f8:f0:be:30:26:0d:a4:f9:cf:a2:d2:f0: 03:e7:02:a7:75:73:ea:cb:a8:e1:0c:d7:9e:c4:fe:4a: 8f:60:3b:3f:b0:2c:94:67:58:d4:4c:2a:48:1b:af:89: 3a:4f:30:c0:d3:6f:64:89:37:f4:6e:5f:0f:78:27:cd: dc:5d:dc:0e:97:c3:aa:4c:94:ca:84:85:59:58:3e:d3: b0:7f:5b:b2:78:4e:68:67:df:e7:78:8f:17:fd:9e:a4: b7:5b:80:2a:2e:11:d1:0a:c5:c9:d0:08:db:0b:95:5d: be:90:c0:ca:ec:3c:8b:35:30:68:40:04:5b:48:6e:d1: 4f:4c:66:3e:8b:b2:0d:ff:20:59:d2:12:0a:f7:6f:bb: b2:b7:fc:24:89:4f:f9:6f:f8:5b:28:d0:6b:c1:14:6a: 9b:bc:36:da:f5:14:d3:dd:6d:09:9e:69:1c:60:0e:26: 43:ca:e6:4d:cb:df:30:44:ca:33:61:d3:c3:91:00:93: df:b4:70:fc:eb:70:83:ca:ac:e7:6f:1d:ce:29:d5:3b: ff:ce:a2:d1:02:59:24:91:76:a3:18:8c:d6:3f:00:f6: 57:e7:96:f2:c9:44:b3:b3:e6:43:40:89:b9:4c:80:09: bd:5d:4a:f6:eb:1a:ce:c2:27:08:8d:a5:5c:1a:10:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:66:d4:a7:1c:19:bf:b3:d8:c5:0c:d8:89:64:e4:18: f8:e3:25:00:bb:55:8c:68:9d:56:5f:4e:f3:e6:cd:c2: 2c:43:ed:ba:95:82:af:4d:28:90:d4:60:67:5a:d9:c2: 2a:bf:4a:22:4f:d9:5d:d0:ee:70:92:fd:c4:79:a1:fb: 9e:b5:58:9a:62:45:32:78:1e:40:8d:e9:c0:32:60:1f: f4:9f:c5:aa:e6:c6:8c:29:06:16:a6:4e:10:90:ce:8b: b5:e9:c7:ea:c9:aa:2b:b7:35:cf:46:be:90:c2:4c:d4: ef:b7:4e:fb:bb:c7:3d:b4:30:1f:db:3e:36:5e:e9:a3: 3e:12:8f:d4:88:f1:06:c0:2c:75:92:cc:8a:27:c1:2b: 2e:dd:92:ea:ac:8b:c5:7d:27:f2:0e:88:39:be:66:f2: 76:a4:84:0a:af:26:bf:e9:3a:a0:0d:e3:18:ce:df:44: de:0e:da:af:02:ce:c9:d8:5e:1f:cd:dd:aa:7b:da:4f: 8f:05:41:5e:cc:2d:01:70:d2:fc:b5:d5:1a:a4:79:fa: c7:46:e6:62:d4:f9:eb:ea:06:02:e7:75:a9:63:3a:3e: 3d:62:8d:36:5c:6b:ec:c5:3b:c8:12:e0:e3:3d:31:fa: 6d:ef:7f:13:56:c0:6f:85:66:94:50:99:37:ab:63:12 Fingerprint (SHA-256): FA:FA:DF:06:65:59:3A:73:89:CF:73:70:18:04:8B:41:85:5A:0D:D4:AB:BA:75:16:94:F5:52:39:83:1C:21:64 Fingerprint (SHA1): 98:9C:A6:3A:63:28:4F:52:BD:FD:6A:CD:B9:50:D5:D2:9D:C8:10:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174559 (0x3cb01c5f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:56:41 2023 Not After : Wed Oct 18 17:56:41 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:50:c6:01:d5:cc:84:a6:af:35:9d:f0:8b:36:09:9a: e3:dd:4a:d5:67:1d:65:a4:7b:61:b0:bb:8a:c1:1a:29: 6a:f3:79:15:a9:14:39:c2:35:04:05:c7:1a:37:15:c1: 74:73:e8:94:da:89:0c:91:fd:c4:f0:a6:eb:fe:2e:91: 47:d6:38:2b:23:54:77:e8:a6:08:e7:c8:8a:05:0d:cc: 0f:0a:54:b4:67:2a:24:20:25:3e:53:18:12:19:1d:ba: 33:01:63:0d:a5:99:33:62:85:58:9b:13:0a:50:4b:73: bb:cb:b5:79:7f:41:82:af:7a:e9:65:75:dd:d2:8c:85: 73:22:12:fe:ef:04:c9:b3:9f:92:ba:35:6a:7e:ac:36: 64:96:bb:85:6b:d5:49:e6:b9:81:f7:3e:92:4f:aa:af: 07:6c:c8:ae:30:4a:2a:21:54:d7:ba:46:bb:32:8d:af: 6f:2c:5e:4c:4a:33:56:b0:dd:eb:63:79:66:c1:cb:f0: 6d:56:3e:f5:41:87:57:c9:79:b9:0d:81:7f:b3:d2:52: 18:cf:0d:3d:79:43:86:56:d4:0e:53:18:a2:e4:2e:c8: 6a:66:d1:e8:32:08:4f:e0:59:d8:8a:96:77:2b:2c:9a: 05:8c:76:95:ca:be:2f:a1:b1:26:99:eb:af:93:27:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:a4:23:09:fe:a6:2e:1e:95:07:46:83:8e:b3:50:53: 9b:ac:d7:b4:a9:b5:25:fb:dc:80:5d:10:13:7a:15:7f: ca:94:90:60:fa:77:53:d4:1e:d2:fd:4a:32:3b:9e:48: 98:5f:dc:b2:53:b0:02:5c:f1:d7:d3:b3:83:c5:8a:80: fc:5d:28:e5:41:15:26:b3:ca:5e:a9:49:63:05:59:4b: 87:ad:87:86:9c:ec:81:c3:f7:d4:39:af:d9:1b:eb:16: 2c:a6:f3:64:57:dc:a7:8f:6b:6e:1e:7c:00:37:99:55: 6a:f1:cc:1e:51:d4:0c:10:c6:4b:3e:a9:73:a8:da:26: df:90:ea:8e:d1:6a:19:15:02:7d:fd:7f:9a:40:8a:d4: b9:c3:ae:f8:39:51:76:f0:1b:51:42:e3:1d:0c:88:57: 59:c8:50:5d:59:e2:d0:89:30:51:78:95:0e:71:91:80: 4d:a0:19:46:27:73:e9:d8:6f:59:79:bf:b5:af:27:7a: a0:da:89:1e:3d:21:5f:ea:fe:08:62:8c:55:49:86:ef: 35:05:80:5e:db:60:93:9b:3d:9f:a5:20:11:74:a2:97: cf:15:ff:5d:8a:08:6d:53:fd:af:a4:53:75:f3:4d:5f: ba:ef:2c:7f:84:62:22:bd:6f:bb:cd:fc:65:3d:a8:ef Fingerprint (SHA-256): DB:64:F7:34:FA:01:5B:2C:F1:2F:B5:11:A7:69:F5:AB:3E:A4:7C:05:68:E4:46:B1:48:D2:1E:F3:2D:45:1E:37 Fingerprint (SHA1): A6:E7:0C:5D:06:9E:0C:09:F6:DF:49:45:EF:DC:F3:C1:F4:AD:E5:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174560 (0x3cb01c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:43 2023 Not After : Wed Oct 18 17:56:43 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1c:2f:ae:f8:f0:be:30:26:0d:a4:f9:cf:a2:d2:f0: 03:e7:02:a7:75:73:ea:cb:a8:e1:0c:d7:9e:c4:fe:4a: 8f:60:3b:3f:b0:2c:94:67:58:d4:4c:2a:48:1b:af:89: 3a:4f:30:c0:d3:6f:64:89:37:f4:6e:5f:0f:78:27:cd: dc:5d:dc:0e:97:c3:aa:4c:94:ca:84:85:59:58:3e:d3: b0:7f:5b:b2:78:4e:68:67:df:e7:78:8f:17:fd:9e:a4: b7:5b:80:2a:2e:11:d1:0a:c5:c9:d0:08:db:0b:95:5d: be:90:c0:ca:ec:3c:8b:35:30:68:40:04:5b:48:6e:d1: 4f:4c:66:3e:8b:b2:0d:ff:20:59:d2:12:0a:f7:6f:bb: b2:b7:fc:24:89:4f:f9:6f:f8:5b:28:d0:6b:c1:14:6a: 9b:bc:36:da:f5:14:d3:dd:6d:09:9e:69:1c:60:0e:26: 43:ca:e6:4d:cb:df:30:44:ca:33:61:d3:c3:91:00:93: df:b4:70:fc:eb:70:83:ca:ac:e7:6f:1d:ce:29:d5:3b: ff:ce:a2:d1:02:59:24:91:76:a3:18:8c:d6:3f:00:f6: 57:e7:96:f2:c9:44:b3:b3:e6:43:40:89:b9:4c:80:09: bd:5d:4a:f6:eb:1a:ce:c2:27:08:8d:a5:5c:1a:10:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:66:d4:a7:1c:19:bf:b3:d8:c5:0c:d8:89:64:e4:18: f8:e3:25:00:bb:55:8c:68:9d:56:5f:4e:f3:e6:cd:c2: 2c:43:ed:ba:95:82:af:4d:28:90:d4:60:67:5a:d9:c2: 2a:bf:4a:22:4f:d9:5d:d0:ee:70:92:fd:c4:79:a1:fb: 9e:b5:58:9a:62:45:32:78:1e:40:8d:e9:c0:32:60:1f: f4:9f:c5:aa:e6:c6:8c:29:06:16:a6:4e:10:90:ce:8b: b5:e9:c7:ea:c9:aa:2b:b7:35:cf:46:be:90:c2:4c:d4: ef:b7:4e:fb:bb:c7:3d:b4:30:1f:db:3e:36:5e:e9:a3: 3e:12:8f:d4:88:f1:06:c0:2c:75:92:cc:8a:27:c1:2b: 2e:dd:92:ea:ac:8b:c5:7d:27:f2:0e:88:39:be:66:f2: 76:a4:84:0a:af:26:bf:e9:3a:a0:0d:e3:18:ce:df:44: de:0e:da:af:02:ce:c9:d8:5e:1f:cd:dd:aa:7b:da:4f: 8f:05:41:5e:cc:2d:01:70:d2:fc:b5:d5:1a:a4:79:fa: c7:46:e6:62:d4:f9:eb:ea:06:02:e7:75:a9:63:3a:3e: 3d:62:8d:36:5c:6b:ec:c5:3b:c8:12:e0:e3:3d:31:fa: 6d:ef:7f:13:56:c0:6f:85:66:94:50:99:37:ab:63:12 Fingerprint (SHA-256): FA:FA:DF:06:65:59:3A:73:89:CF:73:70:18:04:8B:41:85:5A:0D:D4:AB:BA:75:16:94:F5:52:39:83:1C:21:64 Fingerprint (SHA1): 98:9C:A6:3A:63:28:4F:52:BD:FD:6A:CD:B9:50:D5:D2:9D:C8:10:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174560 (0x3cb01c60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:56:43 2023 Not After : Wed Oct 18 17:56:43 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:1c:2f:ae:f8:f0:be:30:26:0d:a4:f9:cf:a2:d2:f0: 03:e7:02:a7:75:73:ea:cb:a8:e1:0c:d7:9e:c4:fe:4a: 8f:60:3b:3f:b0:2c:94:67:58:d4:4c:2a:48:1b:af:89: 3a:4f:30:c0:d3:6f:64:89:37:f4:6e:5f:0f:78:27:cd: dc:5d:dc:0e:97:c3:aa:4c:94:ca:84:85:59:58:3e:d3: b0:7f:5b:b2:78:4e:68:67:df:e7:78:8f:17:fd:9e:a4: b7:5b:80:2a:2e:11:d1:0a:c5:c9:d0:08:db:0b:95:5d: be:90:c0:ca:ec:3c:8b:35:30:68:40:04:5b:48:6e:d1: 4f:4c:66:3e:8b:b2:0d:ff:20:59:d2:12:0a:f7:6f:bb: b2:b7:fc:24:89:4f:f9:6f:f8:5b:28:d0:6b:c1:14:6a: 9b:bc:36:da:f5:14:d3:dd:6d:09:9e:69:1c:60:0e:26: 43:ca:e6:4d:cb:df:30:44:ca:33:61:d3:c3:91:00:93: df:b4:70:fc:eb:70:83:ca:ac:e7:6f:1d:ce:29:d5:3b: ff:ce:a2:d1:02:59:24:91:76:a3:18:8c:d6:3f:00:f6: 57:e7:96:f2:c9:44:b3:b3:e6:43:40:89:b9:4c:80:09: bd:5d:4a:f6:eb:1a:ce:c2:27:08:8d:a5:5c:1a:10:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:66:d4:a7:1c:19:bf:b3:d8:c5:0c:d8:89:64:e4:18: f8:e3:25:00:bb:55:8c:68:9d:56:5f:4e:f3:e6:cd:c2: 2c:43:ed:ba:95:82:af:4d:28:90:d4:60:67:5a:d9:c2: 2a:bf:4a:22:4f:d9:5d:d0:ee:70:92:fd:c4:79:a1:fb: 9e:b5:58:9a:62:45:32:78:1e:40:8d:e9:c0:32:60:1f: f4:9f:c5:aa:e6:c6:8c:29:06:16:a6:4e:10:90:ce:8b: b5:e9:c7:ea:c9:aa:2b:b7:35:cf:46:be:90:c2:4c:d4: ef:b7:4e:fb:bb:c7:3d:b4:30:1f:db:3e:36:5e:e9:a3: 3e:12:8f:d4:88:f1:06:c0:2c:75:92:cc:8a:27:c1:2b: 2e:dd:92:ea:ac:8b:c5:7d:27:f2:0e:88:39:be:66:f2: 76:a4:84:0a:af:26:bf:e9:3a:a0:0d:e3:18:ce:df:44: de:0e:da:af:02:ce:c9:d8:5e:1f:cd:dd:aa:7b:da:4f: 8f:05:41:5e:cc:2d:01:70:d2:fc:b5:d5:1a:a4:79:fa: c7:46:e6:62:d4:f9:eb:ea:06:02:e7:75:a9:63:3a:3e: 3d:62:8d:36:5c:6b:ec:c5:3b:c8:12:e0:e3:3d:31:fa: 6d:ef:7f:13:56:c0:6f:85:66:94:50:99:37:ab:63:12 Fingerprint (SHA-256): FA:FA:DF:06:65:59:3A:73:89:CF:73:70:18:04:8B:41:85:5A:0D:D4:AB:BA:75:16:94:F5:52:39:83:1C:21:64 Fingerprint (SHA1): 98:9C:A6:3A:63:28:4F:52:BD:FD:6A:CD:B9:50:D5:D2:9D:C8:10:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174567 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174568 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018174569 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018174570 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018174571 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018174572 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018174573 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018174574 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174575 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174576 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174567 (0x3cb01c67) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:57:01 2023 Not After : Wed Oct 18 17:57:01 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:bf:60:82:15:b1:29:90:88:c6:dc:cc:77:7e:3a:25: dd:55:78:61:91:46:d0:d9:ee:b6:43:c7:47:f9:82:64: 95:57:39:4c:e4:15:bb:90:cd:97:ef:19:b7:b8:60:b4: 24:cd:f3:88:93:ad:55:c2:60:e0:00:44:7c:7e:04:ff: 9c:e2:19:28:46:5c:ec:7e:7c:82:25:7e:31:45:13:a7: 73:c2:79:ad:09:54:e2:27:bd:f3:e1:b9:fa:b5:b3:dc: 71:e2:fb:b8:69:eb:0c:32:83:85:30:ab:aa:d7:cc:23: db:f0:33:0c:80:f9:8b:ca:05:04:23:00:13:20:40:94: 51:4b:be:8d:a6:8b:fc:f0:03:fb:2e:30:b9:8b:eb:40: 56:99:77:e4:6b:e2:dd:00:00:21:bd:7b:62:e6:ed:f2: 07:26:56:fb:3d:ee:5d:39:44:33:c1:07:73:a1:0e:b7: 32:52:fb:51:d9:0c:0f:74:dd:4e:3c:18:af:88:78:3d: fd:b2:8c:eb:7e:d9:87:9b:d9:f2:9b:4c:e8:3a:21:22: 6f:de:eb:8d:3b:b9:70:86:be:08:4e:b6:13:56:0b:54: 2b:57:99:1e:56:d6:41:5b:a6:8c:d6:75:ed:9c:12:4c: 96:9d:82:db:7e:8d:5b:91:81:27:4b:e1:1d:b3:6c:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:0f:cf:38:fe:6d:54:19:9d:97:5d:6e:09:13:44:27: e4:d6:20:45:04:9a:35:09:0e:59:34:3b:77:e2:6e:fb: 5b:5f:ec:00:bf:45:42:dc:4f:e7:1e:c3:ed:17:ae:29: 49:38:c2:79:c4:6e:43:2b:81:cf:03:3f:54:93:10:d9: 6f:08:0f:45:f8:2b:d8:c6:40:00:ce:f2:e8:59:a4:78: 44:f4:da:3e:46:e3:6a:1c:62:f4:55:b4:b3:7e:a6:2d: 6d:e5:57:4a:f7:22:59:ee:cc:3e:a0:d5:f2:02:11:a1: 17:0a:5d:5b:58:cb:e4:06:d9:20:c4:4f:64:40:61:9b: e1:3e:c8:74:d7:b4:fd:c1:a4:2f:a5:a1:70:03:fb:72: f1:e6:16:7b:6b:fe:7b:0c:11:82:1c:fa:7b:c3:83:67: bd:4e:87:4f:5e:b9:4b:14:71:84:aa:bf:84:4f:4e:bc: 41:78:63:88:b7:64:d9:3c:4d:db:f3:39:71:7f:ad:df: c7:85:fe:51:d1:f6:f3:cb:00:15:5c:14:28:09:9c:15: 3b:38:20:cf:3d:90:3f:3d:29:2a:b0:23:11:16:c5:13: 67:17:f3:5e:32:36:aa:99:2d:f7:a3:27:c2:97:67:db: 68:db:32:1b:4d:7a:90:83:2c:39:48:43:56:ab:1a:94 Fingerprint (SHA-256): 8E:07:A1:A7:4A:9F:CF:CC:2F:F5:0E:AD:D5:8E:D3:B2:C1:4A:C9:E1:58:AA:B0:00:A2:F0:AD:4B:A8:D4:D4:A8 Fingerprint (SHA1): F1:F4:03:38:AC:C8:15:78:87:C0:B6:55:65:15:69:90:90:08:F0:97 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174568 (0x3cb01c68) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:57:03 2023 Not After : Wed Oct 18 17:57:03 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:5b:9e:f3:1c:dd:11:a2:d8:b1:98:b0:34:b1:7e:2e: 2d:14:f4:c5:6c:dd:29:6f:33:89:03:91:24:76:22:95: 14:be:35:a4:55:65:5a:dd:74:32:11:b7:99:be:28:dd: 18:da:44:cf:e5:f0:20:5f:9f:9b:10:37:20:fd:58:e8: 7e:15:01:6b:df:4e:67:71:84:9f:e5:49:66:6b:9e:79: bd:28:ed:15:4e:81:0d:e2:0a:ef:6e:ac:07:9d:f6:2f: f0:3a:40:27:e4:9a:de:37:08:d9:a2:fa:ab:0f:89:d7: fe:59:b7:b3:2a:d7:7a:47:c0:d2:0c:74:5c:a1:d0:fd: a4:f9:03:0b:3c:53:ef:5e:ca:0d:76:27:af:71:ad:9b: 01:82:d2:1f:0f:ef:c6:a4:97:7a:2c:c9:3a:a8:cb:94: 37:08:68:4a:13:27:f3:d7:9c:7f:f0:b0:d1:a1:48:54: b4:4e:22:5d:6f:15:ab:51:5e:75:b4:75:34:ca:f3:b3: 4c:95:2c:54:7e:74:bd:85:02:6b:2f:41:af:a5:86:a2: 95:2a:54:c9:25:1b:78:29:ba:d4:5b:3a:db:2d:f5:12: fc:5e:75:94:46:84:5c:da:d4:11:31:ed:35:31:42:26: 14:2c:67:76:0e:66:eb:86:25:b1:99:9f:9f:1e:39:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e2:7f:0b:0b:90:5b:8f:f9:f5:43:4f:0b:66:cb:73:06: 2f:2b:3e:a0:e7:6b:60:e2:4c:82:ab:62:7c:64:53:43: 3f:08:61:96:2d:36:cc:f4:62:09:3d:03:cd:77:35:d3: 52:1c:68:2f:c9:42:25:3c:92:25:35:71:e4:20:95:c6: fe:3c:90:30:ef:40:15:cb:6c:3f:6e:39:d5:c2:ef:31: 86:57:38:41:54:df:c5:5f:c0:df:8f:5d:75:79:36:f9: 0c:c5:c9:5f:79:d4:8c:f4:20:83:27:7f:87:3f:96:f7: df:72:87:d9:b1:5f:5a:6d:f5:18:4c:eb:5e:9e:69:9d: 2f:b0:b1:17:30:30:bc:52:28:df:bb:58:57:77:48:be: 68:4b:e9:82:3f:15:53:f4:bb:68:60:1a:41:8f:e5:c4: f2:2b:7a:59:be:37:a6:d9:28:27:68:01:8a:e6:d6:5b: 06:c2:83:d7:a4:ad:f7:ed:20:90:bb:3b:fd:80:ee:6a: 3b:5d:aa:63:a1:c0:0c:08:0a:18:07:d0:1b:8c:d5:9f: af:b5:2e:86:fc:4e:b1:a8:ca:f1:ad:25:58:c3:29:ae: fa:5e:fb:d7:b0:b0:bd:f2:f5:8a:a5:47:b0:e8:0f:e1: 34:02:29:7b:cf:6d:bd:16:cd:e9:d5:79:a8:59:61:df Fingerprint (SHA-256): 32:10:E1:FD:7C:77:69:1E:0D:C3:5E:7D:FA:E0:57:EC:1B:85:0F:33:86:68:A9:40:6C:95:E0:BC:E2:C7:41:7A Fingerprint (SHA1): 8C:F8:6A:22:B3:04:77:F0:26:3A:9B:BB:82:61:02:C7:D0:6F:7D:90 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174577 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018174578 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018174579 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018174580 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018174581 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018174582 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018174583 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018174584 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018174585 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174577 (0x3cb01c71) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:30 2023 Not After : Wed Oct 18 17:57:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a4:a6:b6:d2:89:13:59:14:ba:6b:3d:47:05:6c:cb:d6: 42:3a:ca:87:4b:05:32:4b:d9:22:db:9a:93:33:60:69: 4c:1b:e8:1a:08:c3:00:25:30:0a:02:c9:b6:e3:cf:c3: bf:f3:be:d3:db:03:b1:e3:30:2b:05:4c:1f:0c:8b:c0: c7:b2:33:4a:d5:be:62:fd:c4:85:9e:e8:13:93:63:e7: 04:c8:44:db:ce:5b:c5:c4:27:e4:22:33:ff:32:d1:12: 78:92:21:03:bc:e7:24:40:06:a4:c7:67:e4:a6:df:42: 35:a4:39:d0:54:47:c8:8b:6b:36:36:88:03:75:32:f1: 0b:19:af:1e:a6:8e:66:44:96:3f:e2:d9:2a:d0:ee:03: 80:6f:be:94:7f:45:e3:c0:95:bb:3f:77:c5:90:77:8e: 65:cd:e2:ca:f3:d5:61:c7:b3:13:fa:66:d9:48:90:ef: ce:f0:11:b5:2e:c3:49:30:33:ee:b9:a9:4f:4d:93:aa: e0:34:c2:8d:0e:dc:a4:68:30:6c:cb:c9:d2:76:2b:cf: 91:96:10:69:2d:f7:2b:db:d1:88:69:ab:e5:54:e6:1c: 85:2c:6c:9e:9e:31:33:3d:b7:f5:3d:69:48:9e:f8:8f: c8:ba:f3:41:a4:89:3d:a2:f4:c6:00:91:75:d3:f8:28 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:39:b0:75:27:c8:ac:6c:3a:90:d6:a8:64: 44:3a:2d:ae:04:c9:5d:fb:fc:35:58:be:55:03:56:8b: 02:1c:22:30:e2:48:71:2d:e4:71:47:cb:d8:3b:b7:6d: cd:d5:23:b9:3a:a2:a7:be:56:ed:06:7a:df:7f Fingerprint (SHA-256): B5:92:7F:E8:25:E4:17:50:82:85:34:04:C7:DC:59:38:68:7B:4A:F0:AD:1E:24:72:C6:88:BE:51:6C:EC:03:F8 Fingerprint (SHA1): 95:FC:7E:8E:F2:A0:E6:01:6C:6D:E9:28:DB:90:89:37:E8:40:83:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174577 (0x3cb01c71) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:30 2023 Not After : Wed Oct 18 17:57:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a4:a6:b6:d2:89:13:59:14:ba:6b:3d:47:05:6c:cb:d6: 42:3a:ca:87:4b:05:32:4b:d9:22:db:9a:93:33:60:69: 4c:1b:e8:1a:08:c3:00:25:30:0a:02:c9:b6:e3:cf:c3: bf:f3:be:d3:db:03:b1:e3:30:2b:05:4c:1f:0c:8b:c0: c7:b2:33:4a:d5:be:62:fd:c4:85:9e:e8:13:93:63:e7: 04:c8:44:db:ce:5b:c5:c4:27:e4:22:33:ff:32:d1:12: 78:92:21:03:bc:e7:24:40:06:a4:c7:67:e4:a6:df:42: 35:a4:39:d0:54:47:c8:8b:6b:36:36:88:03:75:32:f1: 0b:19:af:1e:a6:8e:66:44:96:3f:e2:d9:2a:d0:ee:03: 80:6f:be:94:7f:45:e3:c0:95:bb:3f:77:c5:90:77:8e: 65:cd:e2:ca:f3:d5:61:c7:b3:13:fa:66:d9:48:90:ef: ce:f0:11:b5:2e:c3:49:30:33:ee:b9:a9:4f:4d:93:aa: e0:34:c2:8d:0e:dc:a4:68:30:6c:cb:c9:d2:76:2b:cf: 91:96:10:69:2d:f7:2b:db:d1:88:69:ab:e5:54:e6:1c: 85:2c:6c:9e:9e:31:33:3d:b7:f5:3d:69:48:9e:f8:8f: c8:ba:f3:41:a4:89:3d:a2:f4:c6:00:91:75:d3:f8:28 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:39:b0:75:27:c8:ac:6c:3a:90:d6:a8:64: 44:3a:2d:ae:04:c9:5d:fb:fc:35:58:be:55:03:56:8b: 02:1c:22:30:e2:48:71:2d:e4:71:47:cb:d8:3b:b7:6d: cd:d5:23:b9:3a:a2:a7:be:56:ed:06:7a:df:7f Fingerprint (SHA-256): B5:92:7F:E8:25:E4:17:50:82:85:34:04:C7:DC:59:38:68:7B:4A:F0:AD:1E:24:72:C6:88:BE:51:6C:EC:03:F8 Fingerprint (SHA1): 95:FC:7E:8E:F2:A0:E6:01:6C:6D:E9:28:DB:90:89:37:E8:40:83:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174577 (0x3cb01c71) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:30 2023 Not After : Wed Oct 18 17:57:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a4:a6:b6:d2:89:13:59:14:ba:6b:3d:47:05:6c:cb:d6: 42:3a:ca:87:4b:05:32:4b:d9:22:db:9a:93:33:60:69: 4c:1b:e8:1a:08:c3:00:25:30:0a:02:c9:b6:e3:cf:c3: bf:f3:be:d3:db:03:b1:e3:30:2b:05:4c:1f:0c:8b:c0: c7:b2:33:4a:d5:be:62:fd:c4:85:9e:e8:13:93:63:e7: 04:c8:44:db:ce:5b:c5:c4:27:e4:22:33:ff:32:d1:12: 78:92:21:03:bc:e7:24:40:06:a4:c7:67:e4:a6:df:42: 35:a4:39:d0:54:47:c8:8b:6b:36:36:88:03:75:32:f1: 0b:19:af:1e:a6:8e:66:44:96:3f:e2:d9:2a:d0:ee:03: 80:6f:be:94:7f:45:e3:c0:95:bb:3f:77:c5:90:77:8e: 65:cd:e2:ca:f3:d5:61:c7:b3:13:fa:66:d9:48:90:ef: ce:f0:11:b5:2e:c3:49:30:33:ee:b9:a9:4f:4d:93:aa: e0:34:c2:8d:0e:dc:a4:68:30:6c:cb:c9:d2:76:2b:cf: 91:96:10:69:2d:f7:2b:db:d1:88:69:ab:e5:54:e6:1c: 85:2c:6c:9e:9e:31:33:3d:b7:f5:3d:69:48:9e:f8:8f: c8:ba:f3:41:a4:89:3d:a2:f4:c6:00:91:75:d3:f8:28 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:39:b0:75:27:c8:ac:6c:3a:90:d6:a8:64: 44:3a:2d:ae:04:c9:5d:fb:fc:35:58:be:55:03:56:8b: 02:1c:22:30:e2:48:71:2d:e4:71:47:cb:d8:3b:b7:6d: cd:d5:23:b9:3a:a2:a7:be:56:ed:06:7a:df:7f Fingerprint (SHA-256): B5:92:7F:E8:25:E4:17:50:82:85:34:04:C7:DC:59:38:68:7B:4A:F0:AD:1E:24:72:C6:88:BE:51:6C:EC:03:F8 Fingerprint (SHA1): 95:FC:7E:8E:F2:A0:E6:01:6C:6D:E9:28:DB:90:89:37:E8:40:83:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174577 (0x3cb01c71) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:30 2023 Not After : Wed Oct 18 17:57:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: a4:a6:b6:d2:89:13:59:14:ba:6b:3d:47:05:6c:cb:d6: 42:3a:ca:87:4b:05:32:4b:d9:22:db:9a:93:33:60:69: 4c:1b:e8:1a:08:c3:00:25:30:0a:02:c9:b6:e3:cf:c3: bf:f3:be:d3:db:03:b1:e3:30:2b:05:4c:1f:0c:8b:c0: c7:b2:33:4a:d5:be:62:fd:c4:85:9e:e8:13:93:63:e7: 04:c8:44:db:ce:5b:c5:c4:27:e4:22:33:ff:32:d1:12: 78:92:21:03:bc:e7:24:40:06:a4:c7:67:e4:a6:df:42: 35:a4:39:d0:54:47:c8:8b:6b:36:36:88:03:75:32:f1: 0b:19:af:1e:a6:8e:66:44:96:3f:e2:d9:2a:d0:ee:03: 80:6f:be:94:7f:45:e3:c0:95:bb:3f:77:c5:90:77:8e: 65:cd:e2:ca:f3:d5:61:c7:b3:13:fa:66:d9:48:90:ef: ce:f0:11:b5:2e:c3:49:30:33:ee:b9:a9:4f:4d:93:aa: e0:34:c2:8d:0e:dc:a4:68:30:6c:cb:c9:d2:76:2b:cf: 91:96:10:69:2d:f7:2b:db:d1:88:69:ab:e5:54:e6:1c: 85:2c:6c:9e:9e:31:33:3d:b7:f5:3d:69:48:9e:f8:8f: c8:ba:f3:41:a4:89:3d:a2:f4:c6:00:91:75:d3:f8:28 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:39:b0:75:27:c8:ac:6c:3a:90:d6:a8:64: 44:3a:2d:ae:04:c9:5d:fb:fc:35:58:be:55:03:56:8b: 02:1c:22:30:e2:48:71:2d:e4:71:47:cb:d8:3b:b7:6d: cd:d5:23:b9:3a:a2:a7:be:56:ed:06:7a:df:7f Fingerprint (SHA-256): B5:92:7F:E8:25:E4:17:50:82:85:34:04:C7:DC:59:38:68:7B:4A:F0:AD:1E:24:72:C6:88:BE:51:6C:EC:03:F8 Fingerprint (SHA1): 95:FC:7E:8E:F2:A0:E6:01:6C:6D:E9:28:DB:90:89:37:E8:40:83:7A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018175803Z nextupdate=20241018175803Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:58:03 2023 Next Update: Fri Oct 18 17:58:03 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175804Z nextupdate=20241018175804Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:58:04 2023 Next Update: Fri Oct 18 17:58:04 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175805Z nextupdate=20241018175805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:58:05 2023 Next Update: Fri Oct 18 17:58:05 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018175805Z nextupdate=20241018175805Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:58:05 2023 Next Update: Fri Oct 18 17:58:05 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175806Z addcert 14 20231018175806Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:58:06 2023 Next Update: Fri Oct 18 17:58:05 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 17:58:06 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175807Z addcert 15 20231018175807Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:58:07 2023 Next Update: Fri Oct 18 17:58:04 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 17:58:07 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:48 2023 Not After : Wed Oct 18 17:57:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:cf:a1:99:29:75:2d:c1:de:64:0e:13:03:62:ed:cb: f6:d3:e7:38:26:d1:0c:bc:6d:f1:91:36:51:ac:74:b7: bf:b1:b3:94:01:5f:32:39:d8:66:54:7f:b6:22:f3:98: e0:7f:ee:5d:90:f2:21:30:47:8c:bc:cc:89:fe:e6:9b: 55:0a:69:73:f0:dd:4a:48:0d:da:ab:83:cf:9d:33:3b: 9a:2a:8f:ba:2e:62:22:b0:23:1d:5a:58:1a:95:77:65: be:9a:ff:06:6f:35:76:92:91:56:61:73:08:01:eb:bf: 99:3b:8a:65:d9:0e:e1:26:00:7a:f6:e1:4b:4e:9f:10: 4c:fc:48:5f:9a:f2:73:3b:6c:de:fb:4f:3c:9c:4d:bb: d9:88:fa:6f:2a:37:c3:12:d4:2f:6e:b0:c5:d7:d5:f2: 74:2f:27:74:97:8c:b9:dc:d7:ea:09:d7:ec:bd:da:f6: f4:00:52:b3:8a:98:9c:6e:1b:d4:97:ca:81:2b:14:1e: 6f:48:12:be:52:f7:e1:d0:41:ff:87:84:15:86:51:ca: 87:13:a7:e5:1b:36:8a:7a:f5:47:e8:e3:9c:f1:57:d1: ba:4c:3a:f6:ab:7d:f7:d3:0e:e4:4f:bd:bf:c8:78:18: 4e:5e:ac:07:cb:a4:5f:ad:4d:40:ad:b9:39:9d:fd:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:85:e0:f3:32:40:99:2b:60:15:1e:0f:6e:7d:ea:1b: 7c:fe:be:c4:93:b2:a3:b4:87:d4:9f:e3:cb:6d:cb:56: d1:dc:cb:39:9e:90:7e:d6:c9:92:f6:52:95:c0:73:e7: 87:65:5e:34:53:15:36:d7:42:17:ad:60:64:62:c0:ce: 99:f5:05:8f:28:d1:2f:e6:56:d1:8c:c3:e3:5a:40:91: 7c:96:c9:b8:fe:be:d6:73:cc:4b:3f:ee:e4:f7:81:aa: c0:ee:8a:4c:32:d8:62:5c:d8:d1:5b:d3:18:fb:ec:80: f7:0f:a5:bc:31:dc:a9:1f:81:a6:72:ea:ac:2d:92:4f: 64:aa:af:03:e8:b0:65:0b:f4:11:72:e7:01:21:54:99: 6c:a4:f9:70:db:af:79:11:99:8a:b2:9c:a4:e8:f4:cd: 32:34:81:43:c9:a1:84:78:55:64:27:61:a1:51:5d:a7: 8e:0f:ea:d5:da:59:57:84:eb:a0:ce:ed:57:5a:00:d1: 90:91:ce:16:70:57:3c:1a:6c:57:46:8f:ae:25:d0:1e: 2a:cf:5d:ce:f3:26:93:76:99:76:d9:df:cc:0e:c9:58: 4a:5d:50:2f:d9:a9:d5:54:41:e0:84:99:31:31:82:4a: 22:b1:8f:13:3f:84:8d:9e:be:fc:d2:0f:64:2f:7b:fc Fingerprint (SHA-256): 63:E4:57:3F:A2:FB:08:50:21:C1:3E:D8:C9:02:7B:6F:CD:5E:BC:DC:5E:BB:2A:31:20:77:86:E2:A1:2F:27:4A Fingerprint (SHA1): 18:CE:B2:E8:25:D7:49:50:63:8C:DA:CD:FD:72:66:5A:15:CB:30:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:57:48 2023 Not After : Wed Oct 18 17:57:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:cf:a1:99:29:75:2d:c1:de:64:0e:13:03:62:ed:cb: f6:d3:e7:38:26:d1:0c:bc:6d:f1:91:36:51:ac:74:b7: bf:b1:b3:94:01:5f:32:39:d8:66:54:7f:b6:22:f3:98: e0:7f:ee:5d:90:f2:21:30:47:8c:bc:cc:89:fe:e6:9b: 55:0a:69:73:f0:dd:4a:48:0d:da:ab:83:cf:9d:33:3b: 9a:2a:8f:ba:2e:62:22:b0:23:1d:5a:58:1a:95:77:65: be:9a:ff:06:6f:35:76:92:91:56:61:73:08:01:eb:bf: 99:3b:8a:65:d9:0e:e1:26:00:7a:f6:e1:4b:4e:9f:10: 4c:fc:48:5f:9a:f2:73:3b:6c:de:fb:4f:3c:9c:4d:bb: d9:88:fa:6f:2a:37:c3:12:d4:2f:6e:b0:c5:d7:d5:f2: 74:2f:27:74:97:8c:b9:dc:d7:ea:09:d7:ec:bd:da:f6: f4:00:52:b3:8a:98:9c:6e:1b:d4:97:ca:81:2b:14:1e: 6f:48:12:be:52:f7:e1:d0:41:ff:87:84:15:86:51:ca: 87:13:a7:e5:1b:36:8a:7a:f5:47:e8:e3:9c:f1:57:d1: ba:4c:3a:f6:ab:7d:f7:d3:0e:e4:4f:bd:bf:c8:78:18: 4e:5e:ac:07:cb:a4:5f:ad:4d:40:ad:b9:39:9d:fd:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:85:e0:f3:32:40:99:2b:60:15:1e:0f:6e:7d:ea:1b: 7c:fe:be:c4:93:b2:a3:b4:87:d4:9f:e3:cb:6d:cb:56: d1:dc:cb:39:9e:90:7e:d6:c9:92:f6:52:95:c0:73:e7: 87:65:5e:34:53:15:36:d7:42:17:ad:60:64:62:c0:ce: 99:f5:05:8f:28:d1:2f:e6:56:d1:8c:c3:e3:5a:40:91: 7c:96:c9:b8:fe:be:d6:73:cc:4b:3f:ee:e4:f7:81:aa: c0:ee:8a:4c:32:d8:62:5c:d8:d1:5b:d3:18:fb:ec:80: f7:0f:a5:bc:31:dc:a9:1f:81:a6:72:ea:ac:2d:92:4f: 64:aa:af:03:e8:b0:65:0b:f4:11:72:e7:01:21:54:99: 6c:a4:f9:70:db:af:79:11:99:8a:b2:9c:a4:e8:f4:cd: 32:34:81:43:c9:a1:84:78:55:64:27:61:a1:51:5d:a7: 8e:0f:ea:d5:da:59:57:84:eb:a0:ce:ed:57:5a:00:d1: 90:91:ce:16:70:57:3c:1a:6c:57:46:8f:ae:25:d0:1e: 2a:cf:5d:ce:f3:26:93:76:99:76:d9:df:cc:0e:c9:58: 4a:5d:50:2f:d9:a9:d5:54:41:e0:84:99:31:31:82:4a: 22:b1:8f:13:3f:84:8d:9e:be:fc:d2:0f:64:2f:7b:fc Fingerprint (SHA-256): 63:E4:57:3F:A2:FB:08:50:21:C1:3E:D8:C9:02:7B:6F:CD:5E:BC:DC:5E:BB:2A:31:20:77:86:E2:A1:2F:27:4A Fingerprint (SHA1): 18:CE:B2:E8:25:D7:49:50:63:8C:DA:CD:FD:72:66:5A:15:CB:30:18 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174586 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018174587 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174343.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174316.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174343.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018174588 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174343.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174317.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018174589 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174343.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174318.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9365/localhost-27434-CA0-1018174343.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9365/localhost-27434-CA0Root-1018174319.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018175832Z nextupdate=20241018175832Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:58:32 2023 Next Update: Fri Oct 18 17:58:32 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175833Z nextupdate=20241018175833Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:58:33 2023 Next Update: Fri Oct 18 17:58:33 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018175833Z nextupdate=20241018175833Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:58:33 2023 Next Update: Fri Oct 18 17:58:33 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018175834Z nextupdate=20241018175834Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:58:34 2023 Next Update: Fri Oct 18 17:58:34 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175835Z addcert 20 20231018175835Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:58:35 2023 Next Update: Fri Oct 18 17:58:33 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:58:35 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018175836Z addcert 40 20231018175836Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:58:36 2023 Next Update: Fri Oct 18 17:58:33 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:58:35 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 17:58:36 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174586 (0x3cb01c7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:58:13 2023 Not After : Wed Oct 18 17:58:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:60:9f:22:1b:be:38:49:72:76:6c:19:5c:93:41:1e: 02:e7:89:15:a2:d2:d7:cb:ef:3d:43:fa:e2:ef:5f:82: fd:40:67:b0:0a:7d:84:8a:fa:09:69:5e:46:f9:67:61: bc:11:76:27:b3:87:1b:2b:24:3d:da:1a:3b:1e:49:46: 4e:2c:0a:ef:46:65:a6:c7:c6:04:24:a2:b5:ea:8c:a0: 33:b1:10:57:48:6f:38:e5:c6:a1:2a:41:c1:15:31:bc: 11:ea:b0:43:ef:85:2d:9b:6e:52:1f:de:09:69:5a:be: b6:c6:eb:9d:61:d6:52:56:7e:ad:b1:4e:06:79:ae:c2: 05:4d:a7:e6:2f:69:17:ce:f1:28:13:89:8f:eb:89:60: 19:7d:9d:84:e7:db:65:81:b9:3c:3d:b4:3b:d8:98:eb: 83:2e:fd:f0:56:11:8d:a4:61:15:98:6d:6a:42:3a:64: a8:b4:b3:4b:b7:f1:d3:29:05:8c:58:e8:5d:56:b0:d6: 0b:bb:01:b0:bd:2a:bc:ec:6f:3f:5e:fc:74:0f:00:53: b0:99:57:38:dd:40:24:23:ff:a8:ca:9d:64:bb:9a:66: 0b:46:85:b8:31:d5:8d:e5:08:a0:8d:cd:fa:b7:94:40: e8:5f:a5:9d:53:73:76:88:4a:5c:38:ee:ee:43:44:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:2e:a3:8e:6e:36:00:9f:69:5c:82:25:7f:92:7d:40: 1b:ff:9d:67:36:93:78:04:06:0f:86:5e:81:cd:fa:e5: e0:d4:c9:af:85:e1:13:13:84:56:4c:9b:b6:00:f5:77: b1:84:5a:c7:4f:75:cf:e9:f8:37:80:e4:dc:a2:ef:cd: fe:19:bc:98:cf:bc:18:4d:8b:b1:db:26:e1:90:fe:97: ac:cc:0b:41:5f:62:29:34:f3:26:e0:9e:3e:59:26:8f: b1:7a:16:50:9d:a7:da:41:10:d3:aa:3b:57:a7:70:08: 7a:61:ef:c6:14:c9:5e:ad:d9:ea:7e:ca:6a:f5:ea:da: d2:bd:ed:f4:15:32:2a:e2:f1:d6:79:ea:fb:94:25:69: df:0a:e4:35:cf:08:44:7c:dc:1b:30:75:d1:58:9b:e1: 3f:ae:64:09:0f:35:f7:bc:58:3e:47:cf:c5:10:2a:63: 52:51:a8:89:3d:c2:f9:0d:ac:d7:f4:fa:7e:6c:c0:ed: d9:f2:3b:82:8f:a1:87:a0:ef:7f:f1:39:c9:6a:34:a4: 1a:22:ca:97:63:56:ee:d4:64:1e:60:07:66:44:d2:01: f5:91:23:53:0e:3c:08:98:b6:2d:e1:ee:c4:b4:de:eb: 4a:44:99:5b:a9:7b:78:5f:58:6f:e3:52:e9:73:3b:d2 Fingerprint (SHA-256): E0:C6:57:75:BD:2E:F5:B8:6B:FE:E6:A9:11:65:AA:0E:8F:72:04:0D:68:B3:D1:45:EB:47:E8:5A:28:23:DB:1D Fingerprint (SHA1): AC:2C:3D:B1:10:54:42:8F:DB:9D:10:4C:FA:DB:65:E0:23:64:90:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174586 (0x3cb01c7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:58:13 2023 Not After : Wed Oct 18 17:58:13 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:60:9f:22:1b:be:38:49:72:76:6c:19:5c:93:41:1e: 02:e7:89:15:a2:d2:d7:cb:ef:3d:43:fa:e2:ef:5f:82: fd:40:67:b0:0a:7d:84:8a:fa:09:69:5e:46:f9:67:61: bc:11:76:27:b3:87:1b:2b:24:3d:da:1a:3b:1e:49:46: 4e:2c:0a:ef:46:65:a6:c7:c6:04:24:a2:b5:ea:8c:a0: 33:b1:10:57:48:6f:38:e5:c6:a1:2a:41:c1:15:31:bc: 11:ea:b0:43:ef:85:2d:9b:6e:52:1f:de:09:69:5a:be: b6:c6:eb:9d:61:d6:52:56:7e:ad:b1:4e:06:79:ae:c2: 05:4d:a7:e6:2f:69:17:ce:f1:28:13:89:8f:eb:89:60: 19:7d:9d:84:e7:db:65:81:b9:3c:3d:b4:3b:d8:98:eb: 83:2e:fd:f0:56:11:8d:a4:61:15:98:6d:6a:42:3a:64: a8:b4:b3:4b:b7:f1:d3:29:05:8c:58:e8:5d:56:b0:d6: 0b:bb:01:b0:bd:2a:bc:ec:6f:3f:5e:fc:74:0f:00:53: b0:99:57:38:dd:40:24:23:ff:a8:ca:9d:64:bb:9a:66: 0b:46:85:b8:31:d5:8d:e5:08:a0:8d:cd:fa:b7:94:40: e8:5f:a5:9d:53:73:76:88:4a:5c:38:ee:ee:43:44:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 01:2e:a3:8e:6e:36:00:9f:69:5c:82:25:7f:92:7d:40: 1b:ff:9d:67:36:93:78:04:06:0f:86:5e:81:cd:fa:e5: e0:d4:c9:af:85:e1:13:13:84:56:4c:9b:b6:00:f5:77: b1:84:5a:c7:4f:75:cf:e9:f8:37:80:e4:dc:a2:ef:cd: fe:19:bc:98:cf:bc:18:4d:8b:b1:db:26:e1:90:fe:97: ac:cc:0b:41:5f:62:29:34:f3:26:e0:9e:3e:59:26:8f: b1:7a:16:50:9d:a7:da:41:10:d3:aa:3b:57:a7:70:08: 7a:61:ef:c6:14:c9:5e:ad:d9:ea:7e:ca:6a:f5:ea:da: d2:bd:ed:f4:15:32:2a:e2:f1:d6:79:ea:fb:94:25:69: df:0a:e4:35:cf:08:44:7c:dc:1b:30:75:d1:58:9b:e1: 3f:ae:64:09:0f:35:f7:bc:58:3e:47:cf:c5:10:2a:63: 52:51:a8:89:3d:c2:f9:0d:ac:d7:f4:fa:7e:6c:c0:ed: d9:f2:3b:82:8f:a1:87:a0:ef:7f:f1:39:c9:6a:34:a4: 1a:22:ca:97:63:56:ee:d4:64:1e:60:07:66:44:d2:01: f5:91:23:53:0e:3c:08:98:b6:2d:e1:ee:c4:b4:de:eb: 4a:44:99:5b:a9:7b:78:5f:58:6f:e3:52:e9:73:3b:d2 Fingerprint (SHA-256): E0:C6:57:75:BD:2E:F5:B8:6B:FE:E6:A9:11:65:AA:0E:8F:72:04:0D:68:B3:D1:45:EB:47:E8:5A:28:23:DB:1D Fingerprint (SHA1): AC:2C:3D:B1:10:54:42:8F:DB:9D:10:4C:FA:DB:65:E0:23:64:90:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174590 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018174591 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018174592 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018174593 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018174594 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018174595 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018174596 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174590 (0x3cb01c7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:58:41 2023 Not After : Wed Oct 18 17:58:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ca:e3:29:85:39:c1:90:93:a7:ad:29:21:7e:cc:32: 31:6f:19:d0:b7:1f:5f:4d:4e:bd:9b:90:05:58:a7:8a: db:68:06:68:27:c1:53:55:3f:88:c7:1b:c4:bb:8f:23: cb:00:37:3f:38:0a:dd:b3:8a:b9:fc:3a:d6:e1:63:8d: 3a:e4:ae:b7:0d:f1:73:09:0d:09:a6:e8:77:ed:53:a5: 7a:eb:84:04:9a:b7:a3:26:95:30:bf:81:e0:b0:7a:d2: 46:76:c8:72:94:35:de:0c:33:a0:8e:94:72:5d:7a:6c: 34:66:8d:7f:3f:67:74:c7:07:dd:bb:88:21:cb:73:be: 38:62:a2:94:7d:ab:2a:97:1a:d5:22:5a:82:10:0e:34: 91:a2:42:fc:f6:0e:ce:1b:e1:dd:9d:e3:8e:59:d1:f5: 20:46:e9:5f:a8:b6:f9:38:9a:98:07:e8:b4:2d:e4:16: 16:af:d5:bb:aa:3c:1c:22:48:7b:3a:1d:14:ad:75:8a: 84:3b:b2:7c:39:1c:7a:cf:fe:e4:81:be:48:9a:53:d6: 9c:69:65:7b:6e:a3:1e:94:5c:c1:6a:f4:29:81:97:d6: d8:84:6a:5e:00:87:89:de:eb:df:c3:c9:7a:42:82:0d: cf:53:c7:51:dc:d6:e2:55:ec:72:47:84:3c:24:a4:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:be:2b:1a:7e:8e:42:ca:da:a0:6a:43:6e:5c:d8:42: ba:d6:58:e0:0a:77:23:57:be:c3:a2:89:ed:36:af:a7: 6d:33:1d:fc:c3:e1:5a:91:79:d9:e1:38:c5:d4:35:59: fd:2e:6a:bb:00:53:d5:7f:3f:6e:f3:08:c9:d0:b6:9a: 2a:65:97:4f:0c:63:53:6c:5b:88:31:e6:93:a3:a9:83: f6:4f:65:dd:f0:71:b3:5c:1a:a1:aa:d0:82:ce:8a:2b: 33:b2:1e:b8:02:2f:08:c5:8f:28:56:36:04:a4:0d:ae: 2a:0a:2c:d7:4e:51:52:13:57:18:c9:d3:e8:77:95:8f: ca:c1:30:8d:56:68:fa:08:84:47:12:44:0f:a2:2d:b6: a0:8a:26:bb:8d:14:af:13:17:7c:5b:0f:b8:20:00:24: 3e:bd:9d:85:8f:a4:fe:65:4e:ae:a8:10:29:72:4a:ad: a0:19:16:98:e0:7d:2a:d9:ee:92:95:b6:72:94:7b:f4: 79:5c:82:3b:84:4c:90:a3:68:0a:b3:83:00:db:82:ef: 92:cd:fc:b6:ac:50:09:93:86:d9:67:39:8d:02:c4:b6: 6d:c4:89:a0:be:ae:26:f9:c2:e0:b5:e6:d3:21:84:0b: ee:78:af:94:40:f2:2c:33:23:89:79:4f:98:31:dd:1b Fingerprint (SHA-256): 61:66:51:EF:B8:4E:3E:1A:72:97:3F:3D:A1:5A:AA:E2:00:CB:BE:14:EA:04:7E:FC:EE:CE:E6:BC:A7:3B:89:05 Fingerprint (SHA1): 27:52:2F:30:63:B5:48:42:A5:42:41:5F:C8:D5:BC:D1:E2:FF:0A:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174592 (0x3cb01c80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:58:46 2023 Not After : Wed Oct 18 17:58:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:2e:51:f3:29:ba:b0:9b:2e:94:5b:c7:08:2a:b7:43: 59:a2:9f:fa:c8:d1:12:70:7c:05:0c:26:b8:be:6c:00: e1:63:a9:b6:fe:ea:5f:37:33:6e:a2:f1:64:1b:d0:dc: b8:62:23:5f:76:51:66:38:fa:70:c5:fd:52:d9:79:d3: 47:ce:22:ae:9b:be:d6:8f:02:d6:04:3b:02:0d:83:5f: 7c:35:44:a9:a9:b6:59:83:69:2f:a3:81:26:4b:d8:35: a0:d5:fc:e2:90:2f:c4:a0:bb:26:71:a2:ae:d2:a2:d6: fc:f0:97:1a:f9:d2:fc:0e:d3:46:dd:06:09:a0:d9:0a: af:84:1a:38:a4:23:10:fa:fc:4d:6a:ec:32:74:cc:71: 52:3d:52:19:4a:b6:f0:5d:c2:60:36:ae:65:7e:12:9b: 45:b5:5a:a1:a9:0a:75:35:21:3c:21:18:b6:2c:12:2b: 0a:cc:b0:2e:36:cf:a1:42:46:4c:ec:bc:dc:dd:cb:f1: a3:8e:fb:9f:da:f1:44:0f:d2:cb:70:db:75:e8:cc:5c: d6:3a:7d:10:0c:d0:2f:78:53:c0:4d:c7:27:cf:97:47: 1f:7d:e3:6b:b3:2b:1f:c3:b2:60:77:77:d5:31:dc:88: 64:0d:75:de:a2:e6:89:6a:ca:c6:83:24:e1:e9:20:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:20:cf:9c:4c:b1:c4:ff:1b:1e:78:52:76:bb:d6:50: 2a:3d:dc:35:fe:a2:e1:c4:1f:3c:b0:e5:d4:20:9b:1d: 00:21:5f:62:f6:32:a5:44:3d:e4:d3:60:67:ee:0a:68: 55:e8:4b:42:a5:a8:fa:25:40:00:98:91:39:b6:7d:30: dd:73:52:23:9e:53:ea:1c:75:59:1e:41:fd:2b:63:cb: 13:79:83:65:16:2e:76:c2:71:d8:fb:dd:59:59:0f:1a: 53:6c:a6:4a:22:9c:12:b5:f0:b6:9f:c0:ec:ac:75:4f: fa:4e:b0:2e:7a:e9:00:79:42:76:51:7d:5b:f1:1f:e2: 2d:c7:bb:ec:0e:3f:35:2d:8b:14:c9:6c:00:50:41:a4: 7d:fd:d8:0a:66:db:4c:32:75:83:27:bb:a0:59:cd:44: f1:89:7e:92:ca:09:09:36:69:8e:d0:e6:fa:a9:9d:33: 2f:bd:e0:7d:ce:23:62:82:d7:c2:8f:13:55:78:86:ea: 0f:f4:1a:2a:2b:cb:52:2c:0e:e6:13:a2:3d:ee:6f:c1: 89:89:43:ea:ba:39:11:05:6a:14:10:37:b6:b3:49:31: ef:44:9d:74:3b:0f:6b:07:8e:c5:3c:8f:8d:05:a9:29: d4:f4:95:e8:ac:e9:dc:49:38:8c:29:f1:d4:0a:1f:68 Fingerprint (SHA-256): A7:7E:44:42:4E:79:BE:04:BD:84:3D:F1:C7:54:4F:DC:69:43:A6:E7:9E:AF:45:4A:94:5D:9A:EC:BD:EB:A8:2D Fingerprint (SHA1): F6:48:18:38:9C:95:33:65:25:1E:43:8E:E5:23:22:D3:FA:5F:A5:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174590 (0x3cb01c7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:58:41 2023 Not After : Wed Oct 18 17:58:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ca:e3:29:85:39:c1:90:93:a7:ad:29:21:7e:cc:32: 31:6f:19:d0:b7:1f:5f:4d:4e:bd:9b:90:05:58:a7:8a: db:68:06:68:27:c1:53:55:3f:88:c7:1b:c4:bb:8f:23: cb:00:37:3f:38:0a:dd:b3:8a:b9:fc:3a:d6:e1:63:8d: 3a:e4:ae:b7:0d:f1:73:09:0d:09:a6:e8:77:ed:53:a5: 7a:eb:84:04:9a:b7:a3:26:95:30:bf:81:e0:b0:7a:d2: 46:76:c8:72:94:35:de:0c:33:a0:8e:94:72:5d:7a:6c: 34:66:8d:7f:3f:67:74:c7:07:dd:bb:88:21:cb:73:be: 38:62:a2:94:7d:ab:2a:97:1a:d5:22:5a:82:10:0e:34: 91:a2:42:fc:f6:0e:ce:1b:e1:dd:9d:e3:8e:59:d1:f5: 20:46:e9:5f:a8:b6:f9:38:9a:98:07:e8:b4:2d:e4:16: 16:af:d5:bb:aa:3c:1c:22:48:7b:3a:1d:14:ad:75:8a: 84:3b:b2:7c:39:1c:7a:cf:fe:e4:81:be:48:9a:53:d6: 9c:69:65:7b:6e:a3:1e:94:5c:c1:6a:f4:29:81:97:d6: d8:84:6a:5e:00:87:89:de:eb:df:c3:c9:7a:42:82:0d: cf:53:c7:51:dc:d6:e2:55:ec:72:47:84:3c:24:a4:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:be:2b:1a:7e:8e:42:ca:da:a0:6a:43:6e:5c:d8:42: ba:d6:58:e0:0a:77:23:57:be:c3:a2:89:ed:36:af:a7: 6d:33:1d:fc:c3:e1:5a:91:79:d9:e1:38:c5:d4:35:59: fd:2e:6a:bb:00:53:d5:7f:3f:6e:f3:08:c9:d0:b6:9a: 2a:65:97:4f:0c:63:53:6c:5b:88:31:e6:93:a3:a9:83: f6:4f:65:dd:f0:71:b3:5c:1a:a1:aa:d0:82:ce:8a:2b: 33:b2:1e:b8:02:2f:08:c5:8f:28:56:36:04:a4:0d:ae: 2a:0a:2c:d7:4e:51:52:13:57:18:c9:d3:e8:77:95:8f: ca:c1:30:8d:56:68:fa:08:84:47:12:44:0f:a2:2d:b6: a0:8a:26:bb:8d:14:af:13:17:7c:5b:0f:b8:20:00:24: 3e:bd:9d:85:8f:a4:fe:65:4e:ae:a8:10:29:72:4a:ad: a0:19:16:98:e0:7d:2a:d9:ee:92:95:b6:72:94:7b:f4: 79:5c:82:3b:84:4c:90:a3:68:0a:b3:83:00:db:82:ef: 92:cd:fc:b6:ac:50:09:93:86:d9:67:39:8d:02:c4:b6: 6d:c4:89:a0:be:ae:26:f9:c2:e0:b5:e6:d3:21:84:0b: ee:78:af:94:40:f2:2c:33:23:89:79:4f:98:31:dd:1b Fingerprint (SHA-256): 61:66:51:EF:B8:4E:3E:1A:72:97:3F:3D:A1:5A:AA:E2:00:CB:BE:14:EA:04:7E:FC:EE:CE:E6:BC:A7:3B:89:05 Fingerprint (SHA1): 27:52:2F:30:63:B5:48:42:A5:42:41:5F:C8:D5:BC:D1:E2:FF:0A:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174590 (0x3cb01c7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:58:41 2023 Not After : Wed Oct 18 17:58:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ca:e3:29:85:39:c1:90:93:a7:ad:29:21:7e:cc:32: 31:6f:19:d0:b7:1f:5f:4d:4e:bd:9b:90:05:58:a7:8a: db:68:06:68:27:c1:53:55:3f:88:c7:1b:c4:bb:8f:23: cb:00:37:3f:38:0a:dd:b3:8a:b9:fc:3a:d6:e1:63:8d: 3a:e4:ae:b7:0d:f1:73:09:0d:09:a6:e8:77:ed:53:a5: 7a:eb:84:04:9a:b7:a3:26:95:30:bf:81:e0:b0:7a:d2: 46:76:c8:72:94:35:de:0c:33:a0:8e:94:72:5d:7a:6c: 34:66:8d:7f:3f:67:74:c7:07:dd:bb:88:21:cb:73:be: 38:62:a2:94:7d:ab:2a:97:1a:d5:22:5a:82:10:0e:34: 91:a2:42:fc:f6:0e:ce:1b:e1:dd:9d:e3:8e:59:d1:f5: 20:46:e9:5f:a8:b6:f9:38:9a:98:07:e8:b4:2d:e4:16: 16:af:d5:bb:aa:3c:1c:22:48:7b:3a:1d:14:ad:75:8a: 84:3b:b2:7c:39:1c:7a:cf:fe:e4:81:be:48:9a:53:d6: 9c:69:65:7b:6e:a3:1e:94:5c:c1:6a:f4:29:81:97:d6: d8:84:6a:5e:00:87:89:de:eb:df:c3:c9:7a:42:82:0d: cf:53:c7:51:dc:d6:e2:55:ec:72:47:84:3c:24:a4:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:be:2b:1a:7e:8e:42:ca:da:a0:6a:43:6e:5c:d8:42: ba:d6:58:e0:0a:77:23:57:be:c3:a2:89:ed:36:af:a7: 6d:33:1d:fc:c3:e1:5a:91:79:d9:e1:38:c5:d4:35:59: fd:2e:6a:bb:00:53:d5:7f:3f:6e:f3:08:c9:d0:b6:9a: 2a:65:97:4f:0c:63:53:6c:5b:88:31:e6:93:a3:a9:83: f6:4f:65:dd:f0:71:b3:5c:1a:a1:aa:d0:82:ce:8a:2b: 33:b2:1e:b8:02:2f:08:c5:8f:28:56:36:04:a4:0d:ae: 2a:0a:2c:d7:4e:51:52:13:57:18:c9:d3:e8:77:95:8f: ca:c1:30:8d:56:68:fa:08:84:47:12:44:0f:a2:2d:b6: a0:8a:26:bb:8d:14:af:13:17:7c:5b:0f:b8:20:00:24: 3e:bd:9d:85:8f:a4:fe:65:4e:ae:a8:10:29:72:4a:ad: a0:19:16:98:e0:7d:2a:d9:ee:92:95:b6:72:94:7b:f4: 79:5c:82:3b:84:4c:90:a3:68:0a:b3:83:00:db:82:ef: 92:cd:fc:b6:ac:50:09:93:86:d9:67:39:8d:02:c4:b6: 6d:c4:89:a0:be:ae:26:f9:c2:e0:b5:e6:d3:21:84:0b: ee:78:af:94:40:f2:2c:33:23:89:79:4f:98:31:dd:1b Fingerprint (SHA-256): 61:66:51:EF:B8:4E:3E:1A:72:97:3F:3D:A1:5A:AA:E2:00:CB:BE:14:EA:04:7E:FC:EE:CE:E6:BC:A7:3B:89:05 Fingerprint (SHA1): 27:52:2F:30:63:B5:48:42:A5:42:41:5F:C8:D5:BC:D1:E2:FF:0A:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174592 (0x3cb01c80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:58:46 2023 Not After : Wed Oct 18 17:58:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:2e:51:f3:29:ba:b0:9b:2e:94:5b:c7:08:2a:b7:43: 59:a2:9f:fa:c8:d1:12:70:7c:05:0c:26:b8:be:6c:00: e1:63:a9:b6:fe:ea:5f:37:33:6e:a2:f1:64:1b:d0:dc: b8:62:23:5f:76:51:66:38:fa:70:c5:fd:52:d9:79:d3: 47:ce:22:ae:9b:be:d6:8f:02:d6:04:3b:02:0d:83:5f: 7c:35:44:a9:a9:b6:59:83:69:2f:a3:81:26:4b:d8:35: a0:d5:fc:e2:90:2f:c4:a0:bb:26:71:a2:ae:d2:a2:d6: fc:f0:97:1a:f9:d2:fc:0e:d3:46:dd:06:09:a0:d9:0a: af:84:1a:38:a4:23:10:fa:fc:4d:6a:ec:32:74:cc:71: 52:3d:52:19:4a:b6:f0:5d:c2:60:36:ae:65:7e:12:9b: 45:b5:5a:a1:a9:0a:75:35:21:3c:21:18:b6:2c:12:2b: 0a:cc:b0:2e:36:cf:a1:42:46:4c:ec:bc:dc:dd:cb:f1: a3:8e:fb:9f:da:f1:44:0f:d2:cb:70:db:75:e8:cc:5c: d6:3a:7d:10:0c:d0:2f:78:53:c0:4d:c7:27:cf:97:47: 1f:7d:e3:6b:b3:2b:1f:c3:b2:60:77:77:d5:31:dc:88: 64:0d:75:de:a2:e6:89:6a:ca:c6:83:24:e1:e9:20:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:20:cf:9c:4c:b1:c4:ff:1b:1e:78:52:76:bb:d6:50: 2a:3d:dc:35:fe:a2:e1:c4:1f:3c:b0:e5:d4:20:9b:1d: 00:21:5f:62:f6:32:a5:44:3d:e4:d3:60:67:ee:0a:68: 55:e8:4b:42:a5:a8:fa:25:40:00:98:91:39:b6:7d:30: dd:73:52:23:9e:53:ea:1c:75:59:1e:41:fd:2b:63:cb: 13:79:83:65:16:2e:76:c2:71:d8:fb:dd:59:59:0f:1a: 53:6c:a6:4a:22:9c:12:b5:f0:b6:9f:c0:ec:ac:75:4f: fa:4e:b0:2e:7a:e9:00:79:42:76:51:7d:5b:f1:1f:e2: 2d:c7:bb:ec:0e:3f:35:2d:8b:14:c9:6c:00:50:41:a4: 7d:fd:d8:0a:66:db:4c:32:75:83:27:bb:a0:59:cd:44: f1:89:7e:92:ca:09:09:36:69:8e:d0:e6:fa:a9:9d:33: 2f:bd:e0:7d:ce:23:62:82:d7:c2:8f:13:55:78:86:ea: 0f:f4:1a:2a:2b:cb:52:2c:0e:e6:13:a2:3d:ee:6f:c1: 89:89:43:ea:ba:39:11:05:6a:14:10:37:b6:b3:49:31: ef:44:9d:74:3b:0f:6b:07:8e:c5:3c:8f:8d:05:a9:29: d4:f4:95:e8:ac:e9:dc:49:38:8c:29:f1:d4:0a:1f:68 Fingerprint (SHA-256): A7:7E:44:42:4E:79:BE:04:BD:84:3D:F1:C7:54:4F:DC:69:43:A6:E7:9E:AF:45:4A:94:5D:9A:EC:BD:EB:A8:2D Fingerprint (SHA1): F6:48:18:38:9C:95:33:65:25:1E:43:8E:E5:23:22:D3:FA:5F:A5:DD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174590 (0x3cb01c7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:58:41 2023 Not After : Wed Oct 18 17:58:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ca:e3:29:85:39:c1:90:93:a7:ad:29:21:7e:cc:32: 31:6f:19:d0:b7:1f:5f:4d:4e:bd:9b:90:05:58:a7:8a: db:68:06:68:27:c1:53:55:3f:88:c7:1b:c4:bb:8f:23: cb:00:37:3f:38:0a:dd:b3:8a:b9:fc:3a:d6:e1:63:8d: 3a:e4:ae:b7:0d:f1:73:09:0d:09:a6:e8:77:ed:53:a5: 7a:eb:84:04:9a:b7:a3:26:95:30:bf:81:e0:b0:7a:d2: 46:76:c8:72:94:35:de:0c:33:a0:8e:94:72:5d:7a:6c: 34:66:8d:7f:3f:67:74:c7:07:dd:bb:88:21:cb:73:be: 38:62:a2:94:7d:ab:2a:97:1a:d5:22:5a:82:10:0e:34: 91:a2:42:fc:f6:0e:ce:1b:e1:dd:9d:e3:8e:59:d1:f5: 20:46:e9:5f:a8:b6:f9:38:9a:98:07:e8:b4:2d:e4:16: 16:af:d5:bb:aa:3c:1c:22:48:7b:3a:1d:14:ad:75:8a: 84:3b:b2:7c:39:1c:7a:cf:fe:e4:81:be:48:9a:53:d6: 9c:69:65:7b:6e:a3:1e:94:5c:c1:6a:f4:29:81:97:d6: d8:84:6a:5e:00:87:89:de:eb:df:c3:c9:7a:42:82:0d: cf:53:c7:51:dc:d6:e2:55:ec:72:47:84:3c:24:a4:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:be:2b:1a:7e:8e:42:ca:da:a0:6a:43:6e:5c:d8:42: ba:d6:58:e0:0a:77:23:57:be:c3:a2:89:ed:36:af:a7: 6d:33:1d:fc:c3:e1:5a:91:79:d9:e1:38:c5:d4:35:59: fd:2e:6a:bb:00:53:d5:7f:3f:6e:f3:08:c9:d0:b6:9a: 2a:65:97:4f:0c:63:53:6c:5b:88:31:e6:93:a3:a9:83: f6:4f:65:dd:f0:71:b3:5c:1a:a1:aa:d0:82:ce:8a:2b: 33:b2:1e:b8:02:2f:08:c5:8f:28:56:36:04:a4:0d:ae: 2a:0a:2c:d7:4e:51:52:13:57:18:c9:d3:e8:77:95:8f: ca:c1:30:8d:56:68:fa:08:84:47:12:44:0f:a2:2d:b6: a0:8a:26:bb:8d:14:af:13:17:7c:5b:0f:b8:20:00:24: 3e:bd:9d:85:8f:a4:fe:65:4e:ae:a8:10:29:72:4a:ad: a0:19:16:98:e0:7d:2a:d9:ee:92:95:b6:72:94:7b:f4: 79:5c:82:3b:84:4c:90:a3:68:0a:b3:83:00:db:82:ef: 92:cd:fc:b6:ac:50:09:93:86:d9:67:39:8d:02:c4:b6: 6d:c4:89:a0:be:ae:26:f9:c2:e0:b5:e6:d3:21:84:0b: ee:78:af:94:40:f2:2c:33:23:89:79:4f:98:31:dd:1b Fingerprint (SHA-256): 61:66:51:EF:B8:4E:3E:1A:72:97:3F:3D:A1:5A:AA:E2:00:CB:BE:14:EA:04:7E:FC:EE:CE:E6:BC:A7:3B:89:05 Fingerprint (SHA1): 27:52:2F:30:63:B5:48:42:A5:42:41:5F:C8:D5:BC:D1:E2:FF:0A:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174594 (0x3cb01c82) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:58:51 2023 Not After : Wed Oct 18 17:58:51 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:0c:69:43:e8:61:c0:3d:89:4a:d2:3e:ba:47:19:84: 84:ef:8e:bf:a4:98:95:1c:52:cf:55:67:32:a6:3e:05: 86:08:f6:a3:37:42:9d:82:48:e7:0e:ed:1e:0f:be:93: 3e:fe:70:80:09:eb:80:91:ac:27:e9:23:02:5f:11:17: a3:13:59:56:f6:bc:3d:5d:b1:69:9c:aa:b4:47:81:ed: 7f:e8:1d:e2:4a:42:11:d1:bb:b3:22:a8:9e:5d:0f:0c: 90:96:44:19:5e:4a:e9:88:79:8f:e5:bb:7f:dd:b2:a1: a4:4c:78:4e:ad:40:b9:d6:22:19:a9:5f:95:e8:1b:be: 3c:8c:f6:26:66:9a:08:b7:98:5d:0f:e4:e9:8a:9e:80: 40:27:93:00:5a:f6:cc:29:aa:83:0b:4f:4f:81:b7:b5: 37:96:93:47:32:f9:60:ad:16:5e:37:db:61:5c:3f:ca: 89:83:02:76:0e:0f:76:3a:bd:62:01:5e:8c:50:69:c7: 61:c5:38:56:c1:e8:bc:62:f6:93:af:35:c7:07:95:bb: 6c:96:1c:48:6f:2b:5a:9d:38:8f:a5:9f:9a:69:65:39: d6:a3:1c:df:ab:50:b2:ad:f9:49:f8:1a:a9:ff:5a:a6: be:3a:22:86:fb:3a:d8:2a:38:2d:6d:1c:18:86:59:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:6e:61:8c:bb:e5:f7:f5:2a:ba:44:0f:57:b2:68:c4: 15:d8:5e:67:6e:cb:46:8e:46:5d:61:74:a0:c7:09:41: d3:c6:d2:e4:3a:1d:50:b8:ea:6f:e8:a6:26:e1:62:29: d9:84:32:72:d9:9c:b1:5c:a5:e5:de:33:48:d2:88:a2: 92:03:16:d9:6d:b6:17:c6:5a:07:38:ca:39:83:cf:98: 79:47:9d:bc:46:50:bb:99:eb:4b:04:f4:a7:7a:0f:c2: 46:dd:e4:39:f6:8c:da:ff:06:91:4c:15:b1:03:da:35: 7a:de:9c:e4:26:3d:8f:dc:8a:71:c6:05:2c:b7:cc:46: 99:da:ba:0c:3a:97:51:07:cc:ff:bc:0a:c3:30:80:5c: b9:6a:c8:f3:70:cc:e4:ed:95:65:d0:78:4f:4f:be:93: 5f:45:c2:3b:30:c3:e8:a8:22:77:e9:1c:28:d9:d5:02: ae:7d:63:8c:21:5f:32:3d:dd:76:95:3d:4f:2a:6e:cf: c6:60:90:cf:c3:07:76:5d:5f:96:87:fd:30:72:6e:8c: 80:2f:87:66:2a:b4:eb:17:30:64:d6:71:d4:0e:66:d3: 08:cd:21:3d:2b:8c:bf:70:fa:d7:ea:b2:d3:52:b5:61: 51:1a:54:85:05:c2:3e:07:3a:08:ff:f2:14:e1:16:eb Fingerprint (SHA-256): B3:24:4B:C5:2F:D6:C7:9F:95:4B:68:90:9D:5D:13:87:0D:3A:1D:0B:1A:CA:A5:C1:3E:74:45:2B:A0:07:94:A6 Fingerprint (SHA1): 8A:9E:BC:33:DD:4A:FC:B8:69:F2:12:B3:66:B7:5E:14:23:33:E3:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174590 (0x3cb01c7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:58:41 2023 Not After : Wed Oct 18 17:58:41 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ca:e3:29:85:39:c1:90:93:a7:ad:29:21:7e:cc:32: 31:6f:19:d0:b7:1f:5f:4d:4e:bd:9b:90:05:58:a7:8a: db:68:06:68:27:c1:53:55:3f:88:c7:1b:c4:bb:8f:23: cb:00:37:3f:38:0a:dd:b3:8a:b9:fc:3a:d6:e1:63:8d: 3a:e4:ae:b7:0d:f1:73:09:0d:09:a6:e8:77:ed:53:a5: 7a:eb:84:04:9a:b7:a3:26:95:30:bf:81:e0:b0:7a:d2: 46:76:c8:72:94:35:de:0c:33:a0:8e:94:72:5d:7a:6c: 34:66:8d:7f:3f:67:74:c7:07:dd:bb:88:21:cb:73:be: 38:62:a2:94:7d:ab:2a:97:1a:d5:22:5a:82:10:0e:34: 91:a2:42:fc:f6:0e:ce:1b:e1:dd:9d:e3:8e:59:d1:f5: 20:46:e9:5f:a8:b6:f9:38:9a:98:07:e8:b4:2d:e4:16: 16:af:d5:bb:aa:3c:1c:22:48:7b:3a:1d:14:ad:75:8a: 84:3b:b2:7c:39:1c:7a:cf:fe:e4:81:be:48:9a:53:d6: 9c:69:65:7b:6e:a3:1e:94:5c:c1:6a:f4:29:81:97:d6: d8:84:6a:5e:00:87:89:de:eb:df:c3:c9:7a:42:82:0d: cf:53:c7:51:dc:d6:e2:55:ec:72:47:84:3c:24:a4:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:be:2b:1a:7e:8e:42:ca:da:a0:6a:43:6e:5c:d8:42: ba:d6:58:e0:0a:77:23:57:be:c3:a2:89:ed:36:af:a7: 6d:33:1d:fc:c3:e1:5a:91:79:d9:e1:38:c5:d4:35:59: fd:2e:6a:bb:00:53:d5:7f:3f:6e:f3:08:c9:d0:b6:9a: 2a:65:97:4f:0c:63:53:6c:5b:88:31:e6:93:a3:a9:83: f6:4f:65:dd:f0:71:b3:5c:1a:a1:aa:d0:82:ce:8a:2b: 33:b2:1e:b8:02:2f:08:c5:8f:28:56:36:04:a4:0d:ae: 2a:0a:2c:d7:4e:51:52:13:57:18:c9:d3:e8:77:95:8f: ca:c1:30:8d:56:68:fa:08:84:47:12:44:0f:a2:2d:b6: a0:8a:26:bb:8d:14:af:13:17:7c:5b:0f:b8:20:00:24: 3e:bd:9d:85:8f:a4:fe:65:4e:ae:a8:10:29:72:4a:ad: a0:19:16:98:e0:7d:2a:d9:ee:92:95:b6:72:94:7b:f4: 79:5c:82:3b:84:4c:90:a3:68:0a:b3:83:00:db:82:ef: 92:cd:fc:b6:ac:50:09:93:86:d9:67:39:8d:02:c4:b6: 6d:c4:89:a0:be:ae:26:f9:c2:e0:b5:e6:d3:21:84:0b: ee:78:af:94:40:f2:2c:33:23:89:79:4f:98:31:dd:1b Fingerprint (SHA-256): 61:66:51:EF:B8:4E:3E:1A:72:97:3F:3D:A1:5A:AA:E2:00:CB:BE:14:EA:04:7E:FC:EE:CE:E6:BC:A7:3B:89:05 Fingerprint (SHA1): 27:52:2F:30:63:B5:48:42:A5:42:41:5F:C8:D5:BC:D1:E2:FF:0A:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018174595 (0x3cb01c83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:58:54 2023 Not After : Wed Oct 18 17:58:54 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f7:5c:51:98:1b:98:c1:2b:5e:6f:4b:4e:fc:a3:ed:d2: 36:9b:6d:0a:77:ff:0a:07:25:e2:ad:73:43:46:0a:6a: c7:93:96:8f:68:7a:5f:2c:a3:ce:9e:11:4b:77:e8:f7: 4e:cd:a7:58:d3:1e:84:8b:60:a6:e4:3e:d1:10:17:8b: c1:ca:1b:5f:b1:13:71:15:ef:e6:59:fa:3e:dc:81:e1: 57:8a:33:c1:a6:4e:05:ce:b7:ef:33:b2:dc:5a:95:01: fb:54:ce:13:4d:f5:81:e6:2e:a1:74:f7:1c:05:1e:3e: fa:bb:df:34:b0:1a:70:e7:38:48:5e:6e:f1:09:fb:8a: 38:a0:f4:55:8a:9c:95:35:f2:59:1e:cf:f8:a5:9b:19: 3f:77:43:9d:55:1a:67:89:80:36:3d:c5:58:59:9a:13: b7:83:6d:8d:83:6b:21:09:91:66:90:08:b5:5c:4e:98: 42:b3:f1:54:e7:71:79:47:f3:ba:a0:d8:0d:4d:39:0a: b7:10:88:db:a4:ce:07:1d:7e:f3:a4:b9:b1:ef:f4:b4: 64:ed:6e:ac:09:ec:e1:9c:f0:ba:c9:2f:6e:e1:5b:0a: c2:6a:0c:59:8e:69:68:56:ef:1f:c1:23:8c:58:81:ef: b3:04:da:64:63:99:fe:eb:94:bc:28:38:bf:a3:c6:13 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:b9:05:3c:ad:78:14:25:d3:54:3e:50:32:3a:2d:80: ec:4e:22:21:eb:9b:cb:78:df:64:50:c7:23:3f:17:91: 44:9b:92:bf:31:70:51:c1:d0:b8:66:e4:64:9f:87:3b: c9:25:b4:2f:46:25:13:6b:9b:eb:67:11:d1:34:88:45: a0:09:0b:e5:f7:83:70:0f:99:a9:01:95:d3:c4:65:c4: 4a:09:09:8d:77:9e:dc:20:d4:fe:de:96:17:ec:ac:ba: be:8b:a6:66:53:95:f6:27:ed:eb:21:d1:7f:ae:7d:3f: c7:46:4a:7f:5f:98:0d:c7:91:eb:ed:83:b4:3c:dd:ba: 31:ca:6d:d5:74:7d:6b:b0:e9:dd:b3:ff:57:c6:5a:b7: df:b9:44:ae:cc:ac:27:5d:55:27:7c:dc:b5:e8:01:f8: b4:1e:c1:d9:d4:84:b5:38:b9:89:e0:29:5c:10:0d:5e: 65:78:4c:75:21:82:cd:7e:e1:f9:d5:85:d2:89:d2:19: 73:8e:1b:7d:06:c3:39:e5:10:74:f8:b5:51:74:a9:7a: d3:f4:24:9c:89:c9:a1:c1:e5:2c:e4:2d:d6:2f:4a:72: cf:9a:7a:be:cc:ba:b8:1b:66:9f:52:c4:53:13:9c:e5: ec:44:5b:44:3d:8a:ab:f5:a7:aa:a8:a9:5c:40:73:59 Fingerprint (SHA-256): 45:C3:B0:67:17:A4:72:5C:75:BC:A6:F9:C9:13:CE:D1:B6:80:6E:5D:4C:6A:C1:95:91:5B:5E:38:71:FC:45:53 Fingerprint (SHA1): 24:71:A3:82:FB:DA:44:C4:CA:01:E9:86:69:FE:88:5D:BC:69:EC:C1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 31979 at Wed Oct 18 17:59:12 UTC 2023 kill -USR1 31979 httpserv: normal termination httpserv -b -p 9365 2>/dev/null; httpserv with PID 31979 killed at Wed Oct 18 17:59:12 UTC 2023 TIMESTAMP chains END: Wed Oct 18 17:59:12 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 17:59:12 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 17:59:12 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 17:59:12 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 17:59:12 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 17:59:14 UTC 2023 TIMESTAMP ec END: Wed Oct 18 17:59:14 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 17:59:14 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 17:59:14 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 17:59:14 UTC 2023 ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 17:59:14 UTC 2023 %{do_ssl_gtests}.sh: Testing with non-threadsafe softoken =============================== Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 17:59:14 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #81: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #84: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #109: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #110: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #111: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #114: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 8695e0097fa6cec024306bbe0d1a3abbc23a5320 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k a6db172fc26048a3a5d4e4e27e4834bcb434b0f6 -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:05:ec:73:92:83:32:c5:4b:f0:1e:65:3d:0d:71:0d: 52:b9:09:19:3c:0c:dc:11:e9:6a:47:36:93:2a:e9:e7: 58:e3:84:67:cc:fa:93:ac:7d:19:b1:b9:35:9d:6e:40: 99:9f:69:68:93:14:80:a0:8f:98:2c:39:a4:76:ee:b1: 62:d5:dc:b8:a5:3a:c4:bc:99:a3:c0:a0:75:46:54:9c: 3d:03:88:cb:91:56:49:8a:f1:9e:10:4e:b3:eb:70:5f: ca:61:37:79:bb:36:7e:34:0c:18:78:6b:4a:72:3d:b1: 01:52:cb:0b:bb:fc:62:59:4a:7a:76:44:b3:4a:df:b4: 56:29:e5:99:e5:5d:3f:5b:f9:66:47:d3:ec:70:f1:ae: 7e:48:89:2e:6d:a4:d2:4a:bf:36:2a:5a:30:ba:b7:07: d5:12:d2:6a:f7:cc:c6:c3:6d:17:82:c1:ce:3a:38:e5: 9d:3f:56:c0:9a:79:4e:d1:e8:ea:ee:41:a5:77:cf:64: 62:12:df:f2:e0:19:c1:e8:81:9b:c2:61:63:06:5a:82: 6f:b9:f7:63:41:51:b3:4f:0d:a4:83:2f:2b:54:cb:b0: 6c:c9:f5:69:05:80:11:c1:57:90:5a:51:ad:ab:3b:3c: 21:d8:2a:28:47:5c:82:0e:98:f3:ec:52:9a:94:d8:39 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cb:58:c5:5a:3a:b9:e2:13:4c:3a:56:9b:d1:b6:43:a8: 43:7f:94:56:c8:3f:a0:33:06:ed:9f:be:8f:ba:82:63: b8:ec:03:68:f4:2f:6c:20:84:74:4b:91:4e:57:57:e8: b6:9f:e0:a0:c8:37:f1:a0:41:ce:12:50:70:3c:34:ba: 68:78:31:e4:58:6e:7e:5e:57:f2:a5:07:1f:a4:64:a4: e4:19:da:14:22:5f:53:2b:d8:d6:e3:95:f7:52:77:2d: 41:35:ea:76:91:e5:c8:26:78:c8:44:11:84:c6:ab:d8: 89:7e:c1:e6:40:e0:98:57:aa:3d:d1:a7:c8:bc:b1:2f: 1c:e9:e2:08:15:61:3f:a9:a1:19:f1:61:0d:44:32:63: a0:bb:f1:09:22:c5:64:af:c1:aa:50:90:0b:6c:ec:bc: 70:98:66:fd:09:4f:db:fe:9b:33:3f:8d:0e:84:3e:87: cb:94:86:4a:22:aa:8c:68:13:9c:67:69:c7:5d:34:f8: f4:54:10:d9:99:2f:52:8b:cb:de:68:a4:3d:31:62:3f: 8a:76:ac:95:b3:1a:d4:33:dd:0d:70:2c:66:fe:fc:91: f3:90:de:54:23:12:d7:da:17:31:9a:b6:ef:ba:2b:a2: 44:a9:72:bd:c3:29:ea:1d:79:a6:22:1e:41:9f:f9:fe Fingerprint (SHA-256): 4A:AC:53:3E:24:FF:1C:56:E2:8A:65:0F:08:39:39:7F:C8:6D:8F:90:DD:AA:AD:F4:02:6F:5E:70:BC:4A:FE:34 Fingerprint (SHA1): 52:5F:4D:E8:61:EB:C0:95:15:78:4C:CD:C8:20:7D:96:44:04:68:88 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:2f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:18 2023 Not After : Thu Jan 18 18:00:18 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:47:fb:24:f4:df:15:d0:ee:45:11:cb:b2:97:83:2f: bf:5c:62:71:ac:0c:f1:cf:7a:0c:0b:d5:49:51:be:c3: 48:49:3a:fb:61:2c:61:44:b9:bf:6b:a0:ca:20:37:7e: 51:e6:26:76:db:c9:ca:64:98:5e:64:8e:23:f3:9c:15: a8:51:23:7e:ca:58:c7:37:db:b5:34:9d:03:e1:64:9b: a8:b7:57:cb:51:7f:0b:60:ab:da:f9:04:e2:b4:b4:5c: ba:66:94:09:1d:09:d0:b2:8f:f1:0f:7b:c5:eb:34:a2: 21:14:72:bc:7c:6c:07:7e:ab:4e:13:26:6a:84:a0:81: 56:b0:9a:f9:92:f7:72:0d:9c:b8:2b:2c:05:cc:a9:f0: 36:0a:05:5e:aa:95:a6:72:93:f4:5d:38:86:66:95:6e: d9:3d:fe:b6:24:d8:ab:e3:08:a3:f0:d1:b2:23:68:9c: 00:ea:11:cb:86:04:9b:15:b4:3b:77:c1:72:9a:62:84: 3a:46:4c:b1:c3:78:c6:64:92:c1:4a:68:de:11:49:c7: 80:9b:fa:52:10:e2:3a:3f:8d:31:8b:00:f9:bb:a1:2f: 59:cd:f8:43:16:7f:fd:77:c1:2e:22:9e:86:c4:84:e9: 36:45:b1:5a:19:7d:2e:cf:40:ff:5b:2e:4f:15:8f:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:ea:d8:03:5e:1e:fa:ca:11:e4:54:35:f5:ab:69:c2: 14:58:a2:de:a0:24:f1:40:8c:a2:02:26:5e:05:36:eb: f0:99:14:85:e8:a6:23:69:b0:d1:5b:c7:65:98:c0:f2: db:61:f1:e8:cb:7d:7d:71:b8:af:4d:20:3c:8d:14:3b: 0b:96:79:dc:ba:b1:83:ca:4a:5a:2b:1e:aa:0d:df:cc: c6:68:ee:17:53:c5:ed:bf:4e:ab:7c:18:82:6e:aa:13: c2:c9:e4:68:8f:27:99:f1:1e:89:14:d4:79:c3:20:94: 70:d4:23:bd:42:81:45:70:3c:ac:80:91:c5:e6:39:37: c5:81:0f:a6:91:03:d8:87:b2:5f:75:42:61:b1:bb:d8: 9f:25:8d:7b:2c:cc:ad:5d:d9:1c:7f:88:1e:ab:1e:25: de:a1:a5:15:d1:a8:a9:ed:2c:b8:2e:35:0c:bc:9a:8c: 1a:e0:cc:e0:b7:28:76:8d:c5:d0:2e:84:b1:bf:ee:32: 06:2c:0d:b2:42:f1:fd:ae:e5:c7:60:30:80:5a:dd:2e: ff:92:e3:86:9d:98:cf:21:eb:db:fc:e0:81:7d:8e:9e: 44:f5:d6:ba:c5:53:63:32:7d:4f:e0:93:fa:fe:d0:40: 74:83:5b:43:29:bd:1a:ce:d4:af:86:cb:6e:11:01:63 Fingerprint (SHA-256): 62:D8:FD:5A:F8:64:54:16:0F:63:2A:04:EB:06:E1:80:00:CC:11:72:9A:33:8C:FE:8C:3B:26:F7:1C:E3:A2:0E Fingerprint (SHA1): 10:9B:08:7E:4C:5B:3E:A8:07:84:EC:73:D5:39:B6:48:B5:FC:F0:A3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:19 2023 Not After : Thu Jan 18 18:00:19 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:a5:ce:32:3a:91:ce:84:ff:e2:08:b9:db:ed:d8:85: ff:6a:ff:4c:f5:83:f3:94:fd:eb:9d:97:28:91:d4:99: 71:67:d8:e9:ba:23:2c:66:74:cb:fe:b9:d3:ff:e6:a6: 27:56:39:2e:3c:7a:04:f7:52:f3:a8:54:9d:44:e7:e2: 9a:85:b4:35:96:93:02:c1:f3:8f:1a:c1:74:d3:70:d6: 93:d0:88:7c:69:6e:70:c9:ff:d6:23:44:a8:28:61:62: 29:77:16:37:84:64:03:8a:2f:e1:9b:1a:48:f9:3e:28: e9:3c:d5:ef:26:22:b2:e0:7a:73:1a:cf:6b:97:ff:e7: 9c:40:1d:8b:a2:44:4f:1a:7a:9b:59:62:f8:b3:57:e0: b1:a7:f1:f1:e5:18:94:cd:ab:c0:80:cb:ab:41:45:ea: 7f:93:7f:06:42:90:ef:82:73:2c:65:a9:49:58:34:04: 7b:25:05:fc:ce:54:06:ef:8e:f5:2f:59:06:84:85:d2: 67:92:7e:01:ee:68:17:34:b3:d8:d6:da:af:81:58:56: e6:b4:39:ca:9d:bd:7d:b6:3b:6e:83:91:e5:d4:31:8a: 9e:54:f5:f3:f0:05:af:23:59:aa:e3:04:e4:1a:d1:4b: b4:df:12:be:2b:52:42:8a:ae:04:0f:c3:65:3b:c5:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:ab:fd:bc:dd:b7:e1:72:e7:ef:72:b3:6b:2e:8a:63: f9:bd:14:3d:25:7a:c8:78:01:db:5b:fc:85:0b:98:92: 8d:db:c2:a1:21:86:f4:86:b9:4b:89:b7:1a:06:85:1a: fb:70:cd:3c:cd:a7:df:05:ba:21:b1:0a:75:30:42:d4: 25:9f:9d:c4:6b:01:44:8f:0b:a5:f5:0d:e2:79:38:90: c2:3c:c3:33:64:fe:7f:a9:be:02:95:ec:02:9c:0c:e4: 39:c9:7c:e9:37:4c:1c:e0:22:f9:54:a9:17:ca:7e:77: 1b:4d:d5:cb:46:85:36:5a:1b:c4:70:28:68:29:86:32: 1c:03:e0:16:5b:8c:da:b0:90:43:ae:f1:81:65:52:df: cd:bf:5c:ba:04:9f:12:47:59:37:87:36:04:f8:c1:c8: d4:e4:49:d2:d3:a5:8d:df:5b:08:78:04:9f:c7:e4:b1: 7d:b4:ba:ac:aa:d2:ff:6a:75:f8:be:c1:79:b9:fe:50: 25:02:ff:25:6c:c8:ea:ba:41:d6:13:68:d7:54:56:61: 76:50:6c:7b:8d:16:a2:b5:b1:3d:49:09:80:1f:5b:49: ef:4e:fe:9f:09:97:23:b8:9e:d2:3f:be:df:75:27:9d: f8:e3:a3:f8:5c:50:5a:6f:09:07:80:81:0a:ae:26:8a Fingerprint (SHA-256): EF:EC:97:6F:F4:19:CD:D1:D6:63:4A:E6:75:CE:5D:B3:62:A7:9E:97:EB:26:3E:E3:2A:12:F3:30:B5:29:C3:99 Fingerprint (SHA1): 22:3F:1C:B0:BB:8F:88:5A:05:4A:A7:40:6B:B8:BA:EF:FF:E8:04:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:33 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:20 2023 Not After : Thu Jan 18 18:00:20 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:91:13:24:8b:60:7b:1e:3f:84:f5:0e:fb:4a:ff:68: 30:64:9e:7d:b8:bb:9e:9c:8f:94:63:24:02:f1:ad:64: ee:06:72:ec:87:1d:67:92:9e:1a:02:5a:7b:ef:5e:ac: 9e:00:72:b5:3b:28:71:15:59:a8:48:82:62:41:78:5b: ec:c2:8c:2f:bb:f4:41:8a:72:5e:95:43:fb:d0:25:9a: 56:48:29:27:79:7a:ff:54:da:64:0c:a9:31:df:91:59: de:90:58:7c:3e:14:ef:d8:eb:77:26:cb:9e:46:4d:c0: d0:5f:a4:13:b7:f0:82:24:b1:64:6d:33:50:29:d3:36: ac:10:87:a4:23:df:83:d0:6d:5c:2f:ea:4f:a4:9d:a1: 6c:20:37:36:e5:8b:1c:9a:c1:bf:5a:59:90:af:69:a5: 2c:a5:ba:58:49:83:0f:d1:d3:9a:ca:d4:e1:31:c6:35: 26:13:eb:3f:03:b3:29:08:d6:ad:61:e3:84:28:8f:46: c1:8b:0a:0f:48:25:3f:24:31:c4:ad:b7:fe:4d:59:dc: 94:4a:38:0a:3d:c2:c8:ca:eb:8f:a3:3d:bc:26:c7:ea: eb:b9:49:56:42:43:9e:bc:ab:15:dd:7b:74:c1:44:f3: d5:02:4e:34:8e:ef:64:4b:ad:1b:6f:f7:77:47:6b:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:e7:52:8a:21:0a:21:e3:be:3c:ba:b4:6f:25:e9:b0: 96:5e:b7:3f:d5:07:7f:9d:9b:80:97:76:fe:20:36:65: ef:59:62:a6:a8:9a:a2:ec:4a:f0:01:36:86:0a:37:91: 76:30:de:cf:67:91:01:4d:d2:d7:81:75:70:75:62:19: fb:ed:e9:13:f2:79:31:f1:a9:5b:1f:19:ea:69:ce:f6: 2e:a7:52:ab:d8:57:5a:23:c8:3d:bc:55:00:a4:0b:63: 84:a3:b3:86:bb:62:ea:c0:ec:9c:5e:29:d6:06:79:0b: 00:2f:5b:47:c1:f9:00:20:b6:69:f1:93:4c:10:94:af: 10:18:50:e7:d8:98:11:3a:ea:e2:9a:80:6f:fd:32:66: dd:82:61:f7:e9:7c:aa:37:98:19:eb:04:c8:be:87:c7: 88:ea:57:a9:fd:27:f9:bf:a7:2a:d0:c0:ed:02:35:68: ae:cc:e9:a4:62:33:04:6f:8d:cc:09:db:e7:12:89:37: 8c:27:e8:3c:16:ac:89:ee:84:fd:a5:3c:83:29:b5:76: d2:9b:7d:7e:0e:af:e9:31:1b:e0:8c:81:b8:5a:2f:76: eb:af:66:23:2b:40:4b:b0:82:5b:60:c7:31:73:68:41: 6e:75:2a:d3:42:91:73:22:15:7c:b4:cd:bf:b3:1c:fe Fingerprint (SHA-256): E3:F6:23:4A:CC:98:82:05:20:91:6B:D7:74:51:64:D8:AF:8E:4A:EC:37:31:9F:87:94:DC:0C:8C:84:5F:5E:54 Fingerprint (SHA1): 97:FC:33:FC:A2:AC:50:05:41:97:40:48:D0:7A:C2:76:48:EB:8B:CB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:35 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:22 2023 Not After : Thu Jan 18 18:00:22 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:f3:83:78:77:ee:db:45:73:26:e9:b5:bc:96:21:6c: 0c:d9:c3:23:0d:9c:f7:36:fe:49:52:b7:14:a1:41:e4: 21:e3:93:fb:89:38:e9:bf:06:c6:37:16:18:e3:5c:2b: de:3d:66:8f:47:18:a8:23:7a:c4:6c:b1:59:e3:75:b7: b7:d5:2c:40:57:39:13:83:aa:81:87:24:a1:f9:6a:3f: ad:32:75:10:df:14:c4:a0:f5:c4:24:45:72:b0:37:21: 2b:32:19:43:de:59:f0:ab:f9:bb:7c:8c:c8:23:62:13: 6e:10:3e:5a:68:d7:79:4b:33:a6:c1:fa:8b:ee:76:ba: 7d:01:dc:48:37:bb:6d:61:20:c5:08:d6:ae:d3:e8:2f: 17:3e:84:30:51:81:18:04:b6:b7:c3:a2:97:62:83:1a: bc:db:9d:69:4a:10:a2:cb:e0:24:79:03:8c:e7:1b:90: d2:ce:6f:8e:4e:75:59:36:70:e3:27:57:0c:d9:74:9c: 87:48:b1:c3:48:83:c7:a8:3e:40:cb:0a:56:dc:44:5d: 5f:22:cb:6f:86:fe:34:b1:c7:d4:a2:25:cb:5b:1f:c8: 04:6d:83:8f:6b:9e:e7:1b:76:02:f1:ed:79:01:07:42: fa:8d:44:b6:32:c3:39:88:04:cb:2f:1b:89:5c:f1:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:30:aa:dc:1f:9a:00:22:af:70:f3:65:73:0c:80:38: 6b:23:7a:6b:08:14:6b:67:ff:57:27:71:0e:43:02:e3: cf:1c:d4:82:81:bc:fb:48:49:13:a5:8e:6e:73:a7:29: 24:ea:df:b8:f3:26:99:4a:75:a5:eb:b5:4e:b6:b2:ce: 6f:b8:6f:32:a7:d4:74:da:11:25:ad:39:4f:23:09:8c: 9f:a0:c8:9d:d6:c9:e5:fe:d9:97:8c:89:00:f0:fe:0c: f7:9a:2c:5c:00:38:c9:1d:fa:29:8b:23:a7:c5:88:f9: 60:78:2a:30:40:9f:95:13:84:18:d5:5c:18:77:5a:6a: 59:58:9a:01:a2:bc:9a:18:61:6c:34:8c:fc:d5:8d:78: d8:98:6a:c7:41:9b:02:20:b7:40:5c:5b:e3:ed:7f:d3: 81:3c:93:82:33:ed:19:ba:4f:cc:b2:d8:21:69:5d:60: 00:f5:7e:8b:c8:c1:fc:93:d5:3d:46:58:21:2d:f3:5a: 18:06:02:e2:97:a9:8a:ed:f2:04:6d:52:fd:07:5e:d0: 11:fa:ac:9f:c4:b0:6e:3c:05:05:37:69:34:8a:5a:89: 33:76:7e:75:db:88:b7:6c:c1:b0:0b:82:a2:d0:c1:e0: 82:46:b3:36:95:5d:b6:8a:de:a0:3c:85:77:67:fb:2e Fingerprint (SHA-256): 59:EA:01:3F:36:5F:8A:80:46:9F:3D:B3:E8:B6:EE:0B:66:4A:9A:BE:78:C4:25:79:62:13:1C:9F:E3:43:05:B6 Fingerprint (SHA1): 6E:41:9F:98:1D:FF:A5:31:D9:2B:92:2D:E8:82:A5:B5:5C:C1:72:C9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:37 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:23 2023 Not After : Thu Jan 18 18:00:23 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:54:fa:b7:82:d8:e3:0d:82:25:ef:b8:9f:61:41:7b: cf:b0:46:84:7e:43:e1:1c:62:e1:bc:35:d3:35:0c:d8: 26:cc:db:45:a1:95:b4:97:ab:5c:16:b0:71:19:35:a8: fa:7c:2e:a2:d2:8e:6d:cd:1f:df:08:1a:fa:d9:5f:b7: dc:d7:7f:82:d5:49:90:4a:0e:5f:88:80:88:41:4c:b5: f6:41:9c:92:bf:84:ae:90:4e:45:67:e0:73:42:de:7f: 3b:12:12:25:47:d7:34:1b:75:87:0e:b0:4d:41:f7:6a: 89:83:66:aa:bc:05:b1:d6:41:6d:8f:4a:cc:a0:38:a1: 2a:41:9c:22:44:02:5f:20:97:ba:ad:4b:d3:17:74:8f: fb:44:ce:09:86:1c:aa:8c:ea:77:07:a8:f3:b1:82:f7: 71:03:52:ff:30:da:98:78:00:ef:40:7d:3a:cc:38:f5: 01:01:c8:f5:0e:b4:00:e1:fa:01:db:49:c6:79:c2:e8: 82:75:78:d3:2c:c1:fc:51:20:d3:06:89:55:ae:98:96: d1:d5:43:52:15:06:8b:4a:f9:67:66:75:4b:98:be:8f: d9:44:2b:10:65:fb:ea:c5:b9:ce:af:c8:e8:c4:a6:58: 45:34:58:af:6b:c2:60:27:3b:2c:55:a1:50:54:8a:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:79:74:37:d3:0c:06:2c:42:23:63:e8:92:88:92:3e: cd:91:63:40:7c:32:68:e8:fb:06:b1:10:82:bc:f2:9f: b3:57:c5:b0:1e:c5:22:73:a2:f5:2d:dd:71:46:3d:41: d9:14:7b:e1:3d:ef:83:4f:bc:a7:f6:e2:72:fc:c0:03: 43:1f:9e:e7:e3:1a:f0:29:ed:c6:8c:44:ca:8d:7a:c3: 7a:eb:c5:61:be:d5:a5:60:f8:c7:7e:2e:03:83:20:d0: 6f:e0:94:9c:97:59:5c:bb:65:52:44:b2:e1:24:82:3f: ce:36:1f:f9:d5:c0:40:fc:71:3e:56:50:da:d4:2f:cf: 07:f2:c0:9e:4a:c2:f5:f7:98:89:69:44:2d:53:71:74: df:f0:38:b1:6a:d7:23:f8:90:1f:d3:97:e2:ea:43:70: 9a:ef:26:a5:57:62:fb:34:ab:67:5b:27:2e:09:90:60: a1:16:42:0f:49:85:25:37:50:7b:9b:8e:33:85:aa:c2: 56:31:6d:92:22:fc:e4:f2:e2:cc:10:3a:aa:c9:14:3f: ff:6f:fa:a8:2a:8e:bc:5e:b4:dd:41:c3:c9:0a:1a:0d: 7f:2c:75:46:9d:b2:df:a0:23:3d:f8:37:88:47:b8:74: 1f:de:bf:51:8c:5e:8f:ce:ed:f9:6c:d8:35:08:49:3d Fingerprint (SHA-256): 6F:F7:4B:29:31:49:D8:6E:72:5C:1D:06:D3:32:E5:A1:7B:31:8F:F9:B5:33:2A:C1:D1:11:3E:FC:A6:20:05:7E Fingerprint (SHA1): 24:D6:37:15:3C:BB:F2:B7:D8:43:0D:57:DA:80:78:8E:1A:78:05:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:24 2023 Not After : Thu Jan 18 18:00:24 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:48:1a:52:18:a6:42:db:02:04:fc:43:ff:32:b6:b7: 4b:a0:07:c4:b3:66:f4:15:da:de:6a:2a:5e:83:c2:b9: 93:7f:9c:c3:95:54:0d:cc:db:04:a8:4f:4f:1e:07:45: f0:06:ef:60:a5:ff:f5:6f:b0:00:64:01:36:8c:40:d9: 7a:4b:6e:7f:3e:da:cc:ec:f2:6a:dd:99:18:e9:4b:11: 4d:c5:3f:2b:18:e6:a6:89:33:3e:e1:79:a4:39:95:03: 90:38:f4:1a:e0:ff:16:36:21:34:54:e4:3e:62:39:1d: 68:d3:69:8d:4c:ee:cd:83:d3:5d:bc:e6:08:69:55:b2: 69:b0:f1:1f:59:23:6d:62:88:9a:3e:83:98:55:03:ac: 8a:76:4a:83:95:f2:2a:7b:c3:a0:88:b4:1b:44:3b:a8: d4:b4:89:b9:3c:7c:e7:25:1e:39:ea:86:2a:78:c5:31: d2:ab:80:78:70:77:6c:96:94:05:e8:27:ab:89:b2:86: 1a:33:3d:cb:ad:25:1e:36:31:9a:d9:6c:f7:83:fa:ca: f6:3a:c4:fb:ef:e5:82:83:09:7b:e9:7c:72:9e:e9:ea: 03:41:ba:9e:37:27:85:14:f1:a9:77:8e:4e:dd:0f:cf: fb:46:32:1b:29:0a:e2:fb:ee:91:0a:9e:ca:1a:7b:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:76:91:5d:4e:1c:9e:31:c4:4a:d1:39:83:c2:d3:2f: 86:de:c0:c8:d1:45:3e:2b:03:b4:69:e8:e8:c3:8d:7b: a9:65:b5:e7:07:cb:e5:dc:66:f8:3a:ba:12:f9:04:ee: c7:f9:27:9f:88:49:e6:fe:a9:86:69:de:b9:21:36:d6: 36:c3:48:da:ea:48:28:31:0b:07:7c:52:5f:36:65:0c: d8:2f:14:30:84:f9:a7:ee:9c:87:b7:b0:78:c7:ef:f5: d7:ed:e3:60:cb:d7:a9:56:5f:31:34:e1:0c:92:7b:53: 87:70:2a:8d:39:c2:6e:2b:bb:eb:69:4a:e0:65:15:3f: f7:32:0d:16:74:7d:f4:ec:b8:bc:6d:71:47:02:64:cd: 4d:6f:de:fa:85:4d:46:10:85:ad:09:70:ee:b1:21:f8: 90:e2:6b:a7:bc:6f:28:0e:98:72:ea:ab:81:4b:ef:0d: 68:43:3d:90:59:34:88:55:48:25:cb:15:1e:69:a1:fd: d6:25:3c:d9:a4:e8:9b:22:e4:e7:20:b5:5d:42:f4:42: d6:d5:be:2c:fd:11:69:90:8f:16:e0:96:21:a3:dc:36: c0:52:65:d9:8c:f6:5e:33:5c:6a:97:5e:d3:0f:95:f5: 90:9f:4e:a4:d4:c5:a4:a1:52:9f:2e:ea:3f:bf:c0:ab Fingerprint (SHA-256): F4:1D:00:3E:CF:BF:D6:26:5A:73:3F:75:D3:42:97:86:4F:54:7E:71:13:E6:7E:31:F5:A5:8C:B3:D7:E9:94:EC Fingerprint (SHA1): CE:92:64:DF:D6:B9:AF:7D:B6:F3:12:88:2A:00:BD:0D:EE:6A:77:07 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:25 2023 Not After : Thu Jan 18 18:00:25 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:86:f1:e5:f9:bb:29:cf:38:2e:b5:d9:5e:c9:2e:0e: eb:5b:63:af:90:54:50:9d:60:1d:ab:b0:90:6c:6e:4a: 8f:8f:c6:74:f9:00:49:03:e3:25:bb:ea:73:5d:05:3c: 5b:bf:9c:05:4e:7a:21:a7:0d:63:0c:50:fb:fa:38:85: 6e:00:56:93:ac:93:a4:8c:fd:ee:5a:b2:4b:eb:82:35: e7:4c:5f:56:e9:a4:a1:08:3a:58:ac:e1:dd:2e:91:83: 22:65:02:24:d2:7e:32:51:53:c5:ac:96:2f:a1:e8:33: 0e:3c:95:72:6a:c1:ea:91:b2:e3:bc:fa:29:06:f5:2f: 5f:b1:5a:01:28:bb:46:93:e0:dd:e5:b9:82:6b:e4:42: e3:13:43:9a:54:8a:d7:b5:7e:3c:7d:ea:28:1d:d4:40: c1:2c:b4:fa:97:ae:95:cc:1e:e7:e8:41:50:4b:82:0e: cb:11:8a:14:46:dd:34:37:a3:56:de:c2:b4:0f:b7:9b: d3:a8:df:70:6e:02:d0:47:78:c8:59:80:34:1a:55:77: 90:ee:89:9c:7d:fd:86:14:bb:5f:ce:ae:57:80:ea:2e: 34:fe:60:a9:26:ba:80:59:c8:7c:e2:ef:33:fc:35:da: a3:4a:78:49:f5:cd:be:d1:ca:ca:ef:3b:08:e1:00:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:ee:fd:6e:39:d2:4d:1e:85:28:cc:8b:df:c1:c4:02: aa:79:bb:5c:53:65:40:aa:6d:8f:bc:e9:7d:25:4c:72: 58:f4:e3:fb:ae:da:88:9d:d1:51:c3:80:23:e0:f8:87: a6:40:6b:bd:a1:cb:1a:8a:4f:6b:8f:4c:a0:b1:ff:9d: 67:13:21:b4:af:f5:e2:2c:6c:aa:ec:27:77:11:26:cf: f5:09:26:ad:a5:47:be:e8:5a:e1:2a:ee:3f:12:fe:5e: 0a:f6:a7:9c:8e:1b:bb:40:11:b5:ef:ac:20:fa:8f:82: b6:c7:2a:0e:a9:0a:dd:c2:cd:b5:00:08:e9:7e:37:b2: e4:a9:49:98:82:90:b3:8e:c6:c4:21:63:f3:d8:6c:d0: 7c:58:f8:b4:ed:24:73:46:1e:f3:a3:a9:f1:2f:73:2f: 2a:eb:7d:e4:8a:12:fb:85:c3:b8:4e:f2:21:a9:ad:b4: 7c:4b:ce:95:45:6e:e0:e3:18:e9:73:70:ca:ba:fc:43: 5d:25:5b:3e:c2:9f:e2:2a:58:8b:90:2b:83:76:c3:4a: 10:ad:67:8f:1f:00:54:4d:d9:12:36:12:e3:39:df:0a: f3:36:1f:74:af:c3:d7:bf:58:4b:01:b2:80:ac:9c:dc: 3f:75:81:d6:9e:1b:50:bb:1d:98:04:2b:4e:5f:c9:35 Fingerprint (SHA-256): 37:22:2D:13:B6:1E:7A:FB:3E:49:CB:25:D8:94:E5:21:4B:E2:A8:D1:7E:B8:F4:FA:DA:CF:23:6C:4A:CA:64:16 Fingerprint (SHA1): 83:81:AC:0E:66:B0:85:4D:FA:AB:F1:55:50:D4:C7:D2:2E:87:FB:B7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:3e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:28 2023 Not After : Thu Jan 18 18:00:28 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:45:8d:9e:93:6c:b8:bc:fe:f4:17:69:7d:57:77:09: bb:32:99:74:07:88:62:c8:b1:20:d5:79:70:73:50:12: 77:da:1c:9e:60:66:ef:b5:89:51:cf:c6:87:a5:db:2d: b3:f1:cb:7b:af:35:60:72:ac:5a:15:0a:53:19:b3:e0: 7b:68:40:5b:ed:cf:32:0a:9c:8c:1f:08:20:90:25:25: 05:d6:1c:a5:76:3d:88:f6:8c:db:16:d0:1b:0a:d5:e1: 1b:16:cf:e7:41:f6:22:22:1a:2f:5d:c0:06:30:82:9a: 49:0a:70:11:6f:66:52:c7:a4:7e:2c:c6:35:fd:b6:96: 21:2e:fe:a8:44:ff:85:99:dc:ad:17:4c:db:9f:de:5d: 5c:60:96:f4:07:d8:ac:e3:d1:2b:51:19:a8:ea:8b:98: 45:52:f9:6d:5e:d5:2e:0d:4d:f4:3d:54:e5:e3:4c:02: 76:7b:6a:85:cc:29:a1:7d:c0:75:c3:7f:8f:da:fc:79: 54:5e:88:58:87:e3:36:22:b2:e5:8c:8f:08:e3:4f:0b: bf:1d:2e:0f:5b:d1:23:fe:dd:f5:7d:a5:a6:b8:d7:ce: 3e:21:75:21:fd:2c:00:65:36:50:e6:13:d6:d7:85:de: 50:e3:cc:19:9a:e3:b8:bf:a6:38:85:a5:8d:b9:dd:15 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:51:14:d2:d5:8c:d8:59:8a:bd:01:6e:4d:0d:16:6f: 50:92:12:54:5a:75:e3:81:47:07:90:6f:3f:4b:9c:c9: 27:dc:b1:4b:bd:d0:31:6d:1b:39:88:46:22:df:46:7a: c0:bf:d5:36:c8:a9:55:cb:01:8d:2f:ff:19:ab:a0:63: df:d9:5d:f2:1a:03:09:03:1f:02:b2:f8:a8:db:70:26: 31:c1:39:81:17:3c:02:40:8f:56:25:af:15:48:f4:3f: 37:e0:a5:89:59:97:bd:c0:0d:bd:71:11:2d:cb:90:a0: 38:6b:05:22:ce:5e:60:5a:25:83:33:56:b8:dc:25:df: 9e:80:ef:da:3a:cd:c1:d3:d9:7f:0c:65:cc:90:b5:0a: a7:04:c6:97:83:b1:7d:d0:5b:32:3f:cd:ef:34:4b:e3: 64:cd:89:13:cb:27:94:89:33:f7:07:eb:eb:83:bc:70: d4:56:e7:91:56:4c:0c:47:46:fc:35:88:20:aa:bd:bd: 8d:af:29:3e:c6:65:c9:cd:dc:e8:7a:89:39:bb:b5:6c: 65:ae:03:5b:1e:c6:55:03:18:88:04:22:38:48:04:84: 7e:cb:5b:49:b5:91:25:08:63:91:64:e6:ff:77:b7:02: 33:36:ca:4e:c0:bc:d5:72:1a:8d:f5:fa:ff:f5:68:f9 Fingerprint (SHA-256): 49:A7:90:C8:79:63:62:AE:B2:F6:21:D6:6D:E3:7D:FC:E5:71:1B:11:B6:14:E5:E8:C8:23:F1:14:38:36:6F:E8 Fingerprint (SHA1): 41:11:C1:A5:C0:B5:18:25:B4:6E:6C:7F:6A:7C:29:71:18:24:0C:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:43 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:29 2023 Not After : Thu Jan 18 18:00:29 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:62:d1:4d:92:ec:36:1d:44:d1:24:df:79:7a:2c:eb: c7:4a:e5:1f:fb:70:65:c1:6c:ca:47:8a:04:25:36:0a: 70:46:59:8c:f7:f5:be:92:ed:f6:83:26:ff:ae:5f:71: f0:b8:a7:3a:20:e1:8f:ad:28:e6:e7:c0:0b:74:8c:e6: 50:8e:56:2a:0b:84:02:e1:6d:d2:32:b3:75:79:a3:a5: 2c:85:d2:01:c8:2c:92:de:2d:ac:3d:6f:e6:f1:ec:9c: 84:0d:a5:37:10:4f:ec:88:51:89:f2:47:c4:10:96:97: 2e:a2:03:cc:39:a7:45:a8:55:43:18:a2:0f:71:0e:66: ef:47:5b:9d:ef:93:05:98:41:25:d2:db:7e:96:d3:62: 4b:3c:0b:57:17:ce:4f:85:dd:47:64:26:5f:70:07:82: 94:91:38:ce:93:c7:94:85:26:82:42:01:22:4e:2e:22: 0e:38:2f:8c:6d:78:cc:ed:a1:8f:0a:3f:34:01:54:11: 22:77:05:4f:ad:69:f6:5e:e7:e9:8a:07:02:75:9d:74: f7:03:c5:9f:66:6e:41:67:21:a5:9c:b2:63:05:ca:4e: 3c:c7:da:3b:d6:5e:74:57:67:7c:ed:50:85:e6:e9:c6: 3f:ef:8e:d7:27:87:ff:8d:20:b8:5f:47:c7:96:dd:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:7a:30:ef:7e:2a:ae:8b:e3:ae:15:38:4c:2f:58:c3: 47:f8:a0:ea:0d:ce:fb:36:5f:f3:f3:2c:d8:bc:ee:f3: 82:01:0c:5d:e2:f0:e0:34:ba:82:62:cc:20:b5:af:36: 08:e7:d3:7d:12:03:66:e6:c0:38:5c:b7:10:f8:36:e2: ba:1f:d0:12:54:4b:ea:a8:f2:6f:c6:8a:66:91:97:c0: 75:05:29:8b:f8:53:63:ed:e2:c4:62:fe:d7:2e:b1:d7: 9a:b1:e0:24:86:1d:d9:93:5e:0b:2e:7e:2d:43:63:1d: 5e:81:31:d9:5e:23:07:c8:3a:6d:ae:f1:fc:01:62:c5: 3d:86:63:c6:41:5f:9d:94:45:7b:c6:60:4c:92:6d:e9: 2f:ad:3c:c8:6f:5c:db:3d:b8:a4:8f:ab:94:03:7e:a7: e7:81:d3:05:5f:cb:b3:a7:64:68:43:97:d7:0d:4b:df: c6:3f:98:e4:b4:a1:1b:5e:b7:8b:d5:67:05:fe:d1:8d: 0b:7f:1d:25:93:7b:ec:ec:71:cc:20:ac:b9:3b:87:18: af:48:3c:fd:58:59:96:e5:92:4e:f8:c2:c7:12:1c:c7: f4:c3:b2:16:69:4d:cf:d7:b2:2b:06:51:ba:a9:57:93: bc:e7:c2:61:9c:7e:42:ed:64:44:63:0c:b7:b5:ac:88 Fingerprint (SHA-256): 58:9F:17:D3:ED:F8:AF:5B:F4:57:87:3F:A0:2C:07:F7:78:93:F0:C3:3D:DE:44:F1:F3:EA:CC:AE:6C:87:DE:FE Fingerprint (SHA1): EF:A0:AE:99:EA:6B:FF:2C:2D:A3:A1:62:8F:93:F2:6B:43:5D:A9:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:46 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:30 2023 Not After : Thu Jan 18 18:00:30 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fa:fe:96:d6:70:ab:48:fb:f9:70:82:cb:79:1a:66:f5: d5:d6:44:b8:23:dc:c0:aa:29:7c:51:fe:03:fd:c6:e5: 6c:cb:f5:3b:b6:92:35:a7:6b:67:a4:5c:18:8f:ce:19: 35:7e:93:74:90:3a:9c:94:03:13:29:4d:a6:dc:27:15: 84:98:5b:43:cc:61:cb:fe:92:81:d7:75:5e:82:67:eb: 0e:4a:74:a0:d7:57:07:89:3d:be:37:e1:89:06:32:4c: 93:65:4b:ff:9e:34:05:55:73:3c:54:82:31:fa:38:d9: 9c:3a:70:1d:18:79:8c:25:ad:9b:a7:b0:69:be:e3:54: 62:93:20:64:d2:6c:d3:d3:ec:31:fc:99:42:78:59:3e: 51:06:c9:da:6b:e1:6c:b5:51:b1:91:b2:89:07:1d:31: b5:77:f3:bc:d7:53:ff:49:84:b4:c8:46:36:23:f2:5a: fe:bc:59:34:a0:e0:bc:bc:d8:db:97:c4:f4:e2:6a:af: 9f:f5:27:05:05:6e:63:93:35:d1:b9:c6:9c:1e:f4:9d: 95:00:09:6f:41:ee:63:79:b9:b1:68:31:1c:cf:19:c5: 5e:e2:07:a0:bb:26:cd:9b:ee:d5:a8:9b:f5:59:a7:a3: 89:c7:86:94:e2:63:55:71:d3:79:8f:da:3b:17:1e:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:5a:1b:d0:19:8f:2d:05:eb:40:59:4f:2f:2b:6e:79: ee:81:66:14:4f:5d:5e:78:25:fb:ff:ef:dd:9e:38:c1: ae:4f:f3:d6:28:81:7a:39:99:21:7d:d1:3c:1d:e5:fe: 96:e9:cb:77:ea:c4:ce:8d:ab:8d:e3:05:62:47:24:13: 3e:3d:b1:25:1b:79:5a:d6:e5:1d:10:67:0e:e9:ca:39: 9c:77:20:1f:ad:0f:6f:f5:4f:38:f6:00:1e:11:a5:2c: dc:02:39:1f:07:d0:11:f4:70:e8:ef:26:dc:17:af:ba: 0f:96:7e:22:85:11:ce:93:d6:7c:ae:e3:34:de:f9:bf: f3:db:35:5b:7b:b7:e9:a7:4b:f5:92:7c:8a:ed:ac:d8: a0:c6:e8:85:75:1b:f1:9d:c5:4e:8e:cb:0d:d7:51:a6: 72:f6:71:2f:18:c3:b2:e2:13:5d:5b:23:dc:25:9a:f0: e5:89:79:7d:5c:cb:5b:e7:61:ba:ff:26:79:be:05:78: f3:ba:05:5b:9d:11:97:f6:c1:75:a0:d4:8a:6b:e1:f3: 52:ac:61:2a:99:3f:44:a1:a8:71:41:ed:66:8d:1c:26: 97:c0:39:67:34:5d:ee:c9:74:c2:8d:18:e6:31:3a:be: d3:ae:cc:73:c2:15:b4:f9:d1:be:e8:f0:3b:9d:86:ee Fingerprint (SHA-256): B6:A6:22:F1:D0:F7:C8:8E:82:D1:3E:8B:A5:E6:C8:55:15:94:29:AA:B9:42:A6:BF:34:73:5C:80:DC:8F:13:8B Fingerprint (SHA1): 0E:5F:8B:24:6A:C6:6A:35:21:2B:3C:03:2E:FF:42:9B:8B:E9:82:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:48 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 18:00:31 2023 Not After : Thu Jan 18 18:00:31 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:cc:9e:bc:03:d9:a7:e5:9c:4a:d5:a7:f2:f3:57:2e: 2c:ae:f9:bb:a4:1f:74:24:44:b8:99:a6:38:82:d3:0b: 2e:19:4d:64:87:ce:46:67:94:7e:00:a4:8a:24:58:7e: ef:98:e5:53:6f:ba:87:89:d3:d7:fd:d0:d9:1c:6a:4d: dd:86:74:7b:e8:74:79:06:a1:2f:55:89:52:fd:f5:80: aa:59:57:a2:ee:ff:c4:ca:1c:7a:f0:5a:23:23:00:44: da:88:34:b2:39:ed:0b:35:69:1b:0b:94:84:5f:d5:c9: 89:7e:55:ed:ef:97:83:01:13:e5:cf:63:1c:e5:6d:f7: 50:83:a4:77:bc:60:1c:54:e3:11:a2:dd:89:a2:2a:df: 64:e9:d4:15:33:fe:13:45:e5:12:a7:f7:0e:41:93:07: c3:89:0e:21:b9:be:98:8a:00:c2:b0:ba:e7:44:4f:01: 4c:88:fe:e5:b1:50:47:83:33:91:d1:aa:5a:90:81:80: 8b:83:b0:89:a9:99:f8:32:66:31:87:c5:7f:07:22:17: 9f:ed:5e:63:65:b3:be:5e:84:9c:b3:dd:ff:54:b7:03: 96:a3:e9:5d:41:ff:7c:d0:a1:66:46:e5:fd:28:c8:26: 4a:eb:52:1c:25:dd:50:ae:19:8d:e9:79:12:77:06:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:14:09:e0:ce:67:89:9b:a2:42:b6:bf:2d:e5:83:45: 68:b9:78:fc:1e:c9:44:05:32:30:44:08:92:9e:51:3f: 7c:62:d4:b5:f7:de:f4:52:be:e5:4b:a7:67:c8:54:68: 00:73:1a:61:b0:e3:9d:fc:a7:c1:cf:93:4f:de:6d:1e: c6:a6:f4:58:1f:ff:45:7e:67:a3:5c:88:60:d1:d0:f9: 3c:d1:6c:4f:15:26:7f:1f:6d:18:d1:a5:b4:fc:b4:64: 92:7d:25:42:70:ca:be:15:89:9c:3c:54:52:4b:8e:ed: 15:45:ff:9e:8a:17:66:96:3c:6f:b7:07:ab:b1:d8:d4: 30:0f:c3:37:7e:69:c5:85:12:2d:33:8f:29:68:84:dd: ce:b0:81:41:5b:25:e3:e9:53:10:51:7e:4b:95:bc:b5: 14:32:2d:63:f5:19:27:5c:a8:40:09:35:7d:72:eb:50: 6f:fe:ea:fb:4b:01:7d:5a:e2:39:f5:28:77:d9:61:65: 8f:c2:9d:ae:8a:27:85:4a:c4:a9:df:b7:6b:f5:01:be: 37:93:a5:6e:26:45:3c:53:10:2e:8b:d9:74:63:5f:d1: eb:8d:36:26:4f:dc:b7:80:b2:a9:91:ef:c1:e1:c6:33: 83:83:fc:8a:cc:21:0a:33:49:8e:35:47:5b:46:78:00 Fingerprint (SHA-256): 4F:FD:17:D4:DE:A8:75:EA:A8:F6:3B:31:49:C9:1D:02:00:C4:8B:FA:CC:B4:8E:AB:A2:47:3B:17:7A:00:75:1F Fingerprint (SHA1): 29:9C:F7:40:23:1E:C1:8A:FA:EF:CA:66:D5:0B:B7:FC:3F:1E:55:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:4c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 18:00:33 2023 Not After : Thu Jan 18 18:00:33 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:09:55:47:5e:16:fd:b8:59:9b:21:03:7c:3e:6a:e2: f3:21:19:50:4e:0c:dd:b8:4b:7c:15:9a:02:f3:0b:85: 83:71:df:cb:d4:be:a9:8b:a8:8b:33:96:57:43:94:ba: 71:b9:3a:c9:2a:e1:42:42:33:42:f6:65:39:d9:fb:68: 5a:1a:ea:7c:87:0d:ca:a8:bd:07:c2:70:ce:3d:b9:cb: 0b:7f:5c:d6:24:5e:61:fb:22:3b:46:61:b8:55:87:71: bf:6e:17:99:24:a0:c1:de:d5:02:b9:c8:70:fd:9b:3a: 49:ae:fa:db:51:fd:d0:7b:6d:19:41:c0:17:21:c3:c1: bc:45:a7:22:a6:37:42:97:28:4f:90:e3:b5:89:7f:19: c3:e1:63:a8:bc:a5:cf:ed:76:dc:98:e6:ac:99:92:d1: 40:e4:48:0c:80:38:5a:4e:fb:87:be:79:20:27:d0:a2: 49:71:eb:1e:84:93:55:54:2a:85:ae:7c:d8:a7:38:7d: 86:6f:5e:36:76:6d:7a:2f:1a:12:64:51:13:5d:0f:33: d1:76:8c:4e:0e:68:ec:78:f0:f4:4e:cd:2a:81:50:b1: 5d:11:66:c8:12:d7:3d:a7:db:48:dd:29:5f:31:6f:51: 17:46:a2:fe:aa:00:94:7d:d6:e4:1e:77:e7:35:ea:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:32:68:62:14:70:2e:f5:77:3f:58:9d:69:4a:98:40: 55:cb:10:1b:32:fe:88:ce:90:1c:cb:11:55:3f:b1:c0: 68:b4:4e:a0:99:e0:3a:8d:df:1d:70:59:70:6b:1c:40: 84:42:36:f2:1d:ff:0e:e6:e2:5c:d1:3d:a7:1a:92:8e: 93:03:3c:35:67:e1:63:2d:b9:47:d8:1d:88:79:26:5f: 0b:33:c1:bc:7c:f4:c1:3e:c8:73:63:9a:ec:c5:59:73: d3:36:5f:b5:f3:59:ef:59:46:48:b1:02:68:2f:78:c6: 24:3c:56:db:51:aa:98:18:6e:57:58:0c:9e:87:12:87: b2:15:01:f4:66:00:c3:58:42:8c:c4:49:0c:fe:dc:db: 65:55:ad:37:1f:97:92:26:a6:63:57:b9:69:ab:e3:d3: 1c:f0:6d:e0:8d:7d:2a:6f:bb:07:ad:5d:41:37:c3:08: dd:f9:71:f8:b0:31:4e:16:84:8e:02:d5:82:c4:86:2c: 1b:cc:4c:94:5e:7a:83:89:db:01:1a:5e:9d:14:c0:83: d6:96:ae:81:0c:33:fb:1e:8f:00:21:bb:01:1b:f6:f5: 42:1b:4a:60:0d:f0:1e:b3:0c:80:a7:6a:35:d9:26:27: 18:9c:c6:4c:04:07:af:7a:65:07:4e:e6:6c:15:5e:37 Fingerprint (SHA-256): D0:2B:F8:84:E5:91:79:DD:78:0A:E3:72:86:96:0E:F5:25:98:BF:C1:54:99:B4:32:C0:8B:53:23:C0:61:39:E3 Fingerprint (SHA1): 13:1E:0E:77:11:13:9D:CD:C2:6F:76:B6:F8:57:81:57:D8:1F:91:91 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:2d:53 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 18:00:37 2023 Not After : Thu Jan 18 18:00:37 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:db:c0:ad:fa:56:3c:32:b1:0e:95:ee:e8:71:59:98: 7e:12:12:03:d3:9c:18:d0:78:b0:d8:93:73:b4:e9:43: 9d:d4:2c:c2:43:89:ab:d6:1a:1a:51:d7:36:fb:73:7c: 20:1b:9b:62:68:fc:dd:f5:c8:fb:28:eb:86:7a:25:ee: 51:dc:f6:23:be:03:47:73:88:47:75:90:9d:9f:d2:eb: a5:a2:2f:1e:3f:64:42:04:c1:09:2d:57:b3:3f:88:e2: e3:4c:4d:9b:dd:94:8b:08:57:b2:5d:13:8c:e1:69:da: 5b:a4:1c:73:e0:69:1a:57:56:85:96:e7:8f:ed:1e:c3: 49:f5:44:69:fd:54:e5:e2:66:66:28:37:59:dd:f1:c1: 4d:b5:d2:47:a0:5d:0c:ec:96:e7:7a:ae:67:21:61:14: 33:54:42:d1:da:ee:67:fd:04:e9:b7:76:75:ec:25:b6: ae:da:df:a5:0d:d3:26:82:fe:4a:06:03:f8:6a:83:74: af:aa:7a:b2:89:e3:78:97:88:5c:07:8c:2b:9e:3c:c4: 70:88:bb:4e:a7:6a:67:e8:25:3c:fb:cf:64:17:2a:41: 76:d0:51:ae:08:02:e3:6f:44:b7:bd:1a:7b:c7:77:7c: 2d:4f:e6:dd:1a:d7:e1:d8:27:d5:1c:e6:a9:17:e6:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:f5:12:42:fd:00:a7:86:f4:0d:7b:5c:dc:2d:fd:60: a1:d7:1c:91:1e:6f:80:4b:be:e1:af:1e:1e:c0:62:0c: 36:5b:d9:a7:e8:5d:ee:75:ba:b7:87:33:e7:ba:ef:07: 1c:c5:9d:7c:19:b7:73:c0:bd:f8:c0:25:98:f8:bc:06: b2:d8:55:0b:9c:27:6d:f9:95:23:39:a5:78:02:03:6b: 0b:6d:f9:7e:58:fb:9c:7a:5a:c9:65:90:23:33:d7:60: 46:a5:5c:18:14:0c:bf:f9:bf:77:11:db:18:27:a5:c0: ee:c7:7f:df:1f:ef:8d:f9:39:93:34:a7:1e:83:3e:e8: 6b:dc:7a:33:e6:a0:ec:4a:70:f9:87:dc:ed:38:b3:4f: be:eb:73:9d:4f:1c:18:c8:79:37:99:c9:f9:73:df:6b: ce:ba:49:ce:d3:45:f5:23:10:a1:7a:63:eb:6f:53:dc: 65:29:fb:66:e8:46:82:4d:c6:1b:3e:70:7b:87:ef:4e: 1b:05:ad:28:1c:2d:f1:2b:41:47:d5:b7:29:79:cc:61: d4:5b:9c:fd:17:dd:ad:55:c3:7b:01:9e:e1:38:f0:79: c1:06:5a:d6:a0:77:da:82:e9:ff:c4:c7:0d:a1:6a:2c: 89:4f:a0:ed:a2:ad:a3:f1:fb:d2:2d:09:56:a2:ff:5a Fingerprint (SHA-256): D5:8A:A5:E1:30:78:91:68:0D:D7:11:08:3F:79:CB:BD:40:16:4E:4D:79:69:26:FE:95:EF:8A:62:74:35:C9:3D Fingerprint (SHA1): 9C:09:80:17:4A:7D:39:95:11:D0:72:A1:8A:18:EC:AA:E3:7A:88:DA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux4.19_arm_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 1c1432c09e26a07336b3c243e35749855372ba0f NSS Certificate DB:localhost-sni.localdomain < 1> dsa ac5e795e81b79259cd96ebfc66eeb55780be7a72 NSS Certificate DB:localhost-sni.localdomain-dsa < 2> dsa 25bb9c1232110a585fcb70e2c2549f2d6562dec0 NSS Certificate DB:localhost.localdomain-dsa < 3> ec c024130edbee24ee434e5d89502498ebe059ef74 NSS Certificate DB:localhost-sni.localdomain-ec < 4> ec 567ab1bdd4ab1b71e7f20b5e7482a6e4002dca0d NSS Certificate DB:localhost-sni.localdomain-ecmixed < 5> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> ec 08e79e52e899f4361a9df308cdee66fa33d02eac NSS Certificate DB:localhost.localdomain-ec < 7> dsa facb209ff6730a3d52e76c2980b9a4c3089fd7c4 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 8> rsa a6db172fc26048a3a5d4e4e27e4834bcb434b0f6 (orphan) < 9> rsa eb6e6fcdf10a63cc46e14945dd43c803b0343056 NSS Certificate DB:localhost.localdomain <10> dsa 0818f438edb106084a0b29a42613689166f234d0 NSS Certificate DB:localhost.localdomain-dsamixed <11> ec 065af45cc891d277fe3c1137f1de7a5e612710f2 NSS Certificate DB:localhost.localdomain-ecmixed cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:01:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:01:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17770 found at Wed Oct 18 18:01:59 UTC 2023 selfserv_9355 with PID 17770 started at Wed Oct 18 18:01:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #719: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17770 at Wed Oct 18 18:02:00 UTC 2023 kill -USR1 17770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17770 killed at Wed Oct 18 18:02:00 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17822 found at Wed Oct 18 18:02:00 UTC 2023 selfserv_9355 with PID 17822 started at Wed Oct 18 18:02:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #720: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17822 at Wed Oct 18 18:02:01 UTC 2023 kill -USR1 17822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17822 killed at Wed Oct 18 18:02:01 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17874 found at Wed Oct 18 18:02:01 UTC 2023 selfserv_9355 with PID 17874 started at Wed Oct 18 18:02:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #721: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17874 at Wed Oct 18 18:02:02 UTC 2023 kill -USR1 17874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17874 killed at Wed Oct 18 18:02:02 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17940 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17940 found at Wed Oct 18 18:02:02 UTC 2023 selfserv_9355 with PID 17940 started at Wed Oct 18 18:02:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #722: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17940 at Wed Oct 18 18:02:02 UTC 2023 kill -USR1 17940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17940 killed at Wed Oct 18 18:02:02 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17992 found at Wed Oct 18 18:02:02 UTC 2023 selfserv_9355 with PID 17992 started at Wed Oct 18 18:02:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #723: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17992 at Wed Oct 18 18:02:03 UTC 2023 kill -USR1 17992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17992 killed at Wed Oct 18 18:02:03 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18044 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18044 found at Wed Oct 18 18:02:03 UTC 2023 selfserv_9355 with PID 18044 started at Wed Oct 18 18:02:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #724: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18044 at Wed Oct 18 18:02:03 UTC 2023 kill -USR1 18044 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18044 killed at Wed Oct 18 18:02:03 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18110 found at Wed Oct 18 18:02:04 UTC 2023 selfserv_9355 with PID 18110 started at Wed Oct 18 18:02:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #725: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18110 at Wed Oct 18 18:02:04 UTC 2023 kill -USR1 18110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18110 killed at Wed Oct 18 18:02:04 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18162 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18162 found at Wed Oct 18 18:02:04 UTC 2023 selfserv_9355 with PID 18162 started at Wed Oct 18 18:02:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #726: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18162 at Wed Oct 18 18:02:05 UTC 2023 kill -USR1 18162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18162 killed at Wed Oct 18 18:02:05 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18214 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18214 found at Wed Oct 18 18:02:05 UTC 2023 selfserv_9355 with PID 18214 started at Wed Oct 18 18:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #727: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18214 at Wed Oct 18 18:02:05 UTC 2023 kill -USR1 18214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18214 killed at Wed Oct 18 18:02:05 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18280 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18280 found at Wed Oct 18 18:02:05 UTC 2023 selfserv_9355 with PID 18280 started at Wed Oct 18 18:02:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #728: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18280 at Wed Oct 18 18:02:06 UTC 2023 kill -USR1 18280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18280 killed at Wed Oct 18 18:02:06 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18332 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18332 found at Wed Oct 18 18:02:06 UTC 2023 selfserv_9355 with PID 18332 started at Wed Oct 18 18:02:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #729: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18332 at Wed Oct 18 18:02:07 UTC 2023 kill -USR1 18332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18332 killed at Wed Oct 18 18:02:07 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18384 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18384 found at Wed Oct 18 18:02:07 UTC 2023 selfserv_9355 with PID 18384 started at Wed Oct 18 18:02:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #730: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18384 at Wed Oct 18 18:02:07 UTC 2023 kill -USR1 18384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18384 killed at Wed Oct 18 18:02:07 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18450 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18450 found at Wed Oct 18 18:02:08 UTC 2023 selfserv_9355 with PID 18450 started at Wed Oct 18 18:02:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #731: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18450 at Wed Oct 18 18:02:08 UTC 2023 kill -USR1 18450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18450 killed at Wed Oct 18 18:02:08 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18502 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18502 found at Wed Oct 18 18:02:08 UTC 2023 selfserv_9355 with PID 18502 started at Wed Oct 18 18:02:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #732: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18502 at Wed Oct 18 18:02:08 UTC 2023 kill -USR1 18502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18502 killed at Wed Oct 18 18:02:09 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18555 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18555 found at Wed Oct 18 18:02:09 UTC 2023 selfserv_9355 with PID 18555 started at Wed Oct 18 18:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #733: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18555 at Wed Oct 18 18:02:09 UTC 2023 kill -USR1 18555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18555 killed at Wed Oct 18 18:02:09 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18622 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18622 found at Wed Oct 18 18:02:09 UTC 2023 selfserv_9355 with PID 18622 started at Wed Oct 18 18:02:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #734: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18622 at Wed Oct 18 18:02:10 UTC 2023 kill -USR1 18622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18622 killed at Wed Oct 18 18:02:10 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18674 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18674 found at Wed Oct 18 18:02:10 UTC 2023 selfserv_9355 with PID 18674 started at Wed Oct 18 18:02:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #735: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18674 at Wed Oct 18 18:02:10 UTC 2023 kill -USR1 18674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18674 killed at Wed Oct 18 18:02:10 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18726 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18726 found at Wed Oct 18 18:02:10 UTC 2023 selfserv_9355 with PID 18726 started at Wed Oct 18 18:02:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #736: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 18726 at Wed Oct 18 18:02:11 UTC 2023 kill -USR1 18726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18726 killed at Wed Oct 18 18:02:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18792 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18792 found at Wed Oct 18 18:02:11 UTC 2023 selfserv_9355 with PID 18792 started at Wed Oct 18 18:02:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #737: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18792 at Wed Oct 18 18:02:11 UTC 2023 kill -USR1 18792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18792 killed at Wed Oct 18 18:02:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18844 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18844 found at Wed Oct 18 18:02:12 UTC 2023 selfserv_9355 with PID 18844 started at Wed Oct 18 18:02:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #738: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18844 at Wed Oct 18 18:02:12 UTC 2023 kill -USR1 18844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18844 killed at Wed Oct 18 18:02:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18896 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18896 found at Wed Oct 18 18:02:12 UTC 2023 selfserv_9355 with PID 18896 started at Wed Oct 18 18:02:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #739: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18896 at Wed Oct 18 18:02:13 UTC 2023 kill -USR1 18896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18896 killed at Wed Oct 18 18:02:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18962 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18962 found at Wed Oct 18 18:02:13 UTC 2023 selfserv_9355 with PID 18962 started at Wed Oct 18 18:02:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #740: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18962 at Wed Oct 18 18:02:13 UTC 2023 kill -USR1 18962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18962 killed at Wed Oct 18 18:02:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19014 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19014 found at Wed Oct 18 18:02:14 UTC 2023 selfserv_9355 with PID 19014 started at Wed Oct 18 18:02:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #741: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19014 at Wed Oct 18 18:02:14 UTC 2023 kill -USR1 19014 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19014 killed at Wed Oct 18 18:02:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19066 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19066 found at Wed Oct 18 18:02:14 UTC 2023 selfserv_9355 with PID 19066 started at Wed Oct 18 18:02:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #742: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19066 at Wed Oct 18 18:02:14 UTC 2023 kill -USR1 19066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19066 killed at Wed Oct 18 18:02:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19132 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19132 found at Wed Oct 18 18:02:15 UTC 2023 selfserv_9355 with PID 19132 started at Wed Oct 18 18:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #743: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19132 at Wed Oct 18 18:02:15 UTC 2023 kill -USR1 19132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19132 killed at Wed Oct 18 18:02:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19184 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19184 found at Wed Oct 18 18:02:15 UTC 2023 selfserv_9355 with PID 19184 started at Wed Oct 18 18:02:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #744: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19184 at Wed Oct 18 18:02:16 UTC 2023 kill -USR1 19184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19184 killed at Wed Oct 18 18:02:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19236 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19236 found at Wed Oct 18 18:02:16 UTC 2023 selfserv_9355 with PID 19236 started at Wed Oct 18 18:02:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #745: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19236 at Wed Oct 18 18:02:16 UTC 2023 kill -USR1 19236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19236 killed at Wed Oct 18 18:02:16 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19304 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19304 found at Wed Oct 18 18:02:16 UTC 2023 selfserv_9355 with PID 19304 started at Wed Oct 18 18:02:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #746: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19304 at Wed Oct 18 18:02:17 UTC 2023 kill -USR1 19304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19304 killed at Wed Oct 18 18:02:17 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19358 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19358 found at Wed Oct 18 18:02:17 UTC 2023 selfserv_9355 with PID 19358 started at Wed Oct 18 18:02:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #747: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19358 at Wed Oct 18 18:02:17 UTC 2023 kill -USR1 19358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19358 killed at Wed Oct 18 18:02:17 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19410 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19410 found at Wed Oct 18 18:02:18 UTC 2023 selfserv_9355 with PID 19410 started at Wed Oct 18 18:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #748: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19410 at Wed Oct 18 18:02:18 UTC 2023 kill -USR1 19410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19410 killed at Wed Oct 18 18:02:18 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19476 found at Wed Oct 18 18:02:18 UTC 2023 selfserv_9355 with PID 19476 started at Wed Oct 18 18:02:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #749: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19476 at Wed Oct 18 18:02:19 UTC 2023 kill -USR1 19476 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19476 killed at Wed Oct 18 18:02:19 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19528 found at Wed Oct 18 18:02:19 UTC 2023 selfserv_9355 with PID 19528 started at Wed Oct 18 18:02:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #750: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19528 at Wed Oct 18 18:02:19 UTC 2023 kill -USR1 19528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19528 killed at Wed Oct 18 18:02:19 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19580 found at Wed Oct 18 18:02:19 UTC 2023 selfserv_9355 with PID 19580 started at Wed Oct 18 18:02:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #751: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19580 at Wed Oct 18 18:02:20 UTC 2023 kill -USR1 19580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19580 killed at Wed Oct 18 18:02:20 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19646 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19646 found at Wed Oct 18 18:02:20 UTC 2023 selfserv_9355 with PID 19646 started at Wed Oct 18 18:02:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #752: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19646 at Wed Oct 18 18:02:20 UTC 2023 kill -USR1 19646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19646 killed at Wed Oct 18 18:02:20 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19703 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19703 found at Wed Oct 18 18:02:20 UTC 2023 selfserv_9355 with PID 19703 started at Wed Oct 18 18:02:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #753: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19703 at Wed Oct 18 18:02:21 UTC 2023 kill -USR1 19703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19703 killed at Wed Oct 18 18:02:21 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19755 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19755 found at Wed Oct 18 18:02:21 UTC 2023 selfserv_9355 with PID 19755 started at Wed Oct 18 18:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #754: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 19755 at Wed Oct 18 18:02:21 UTC 2023 kill -USR1 19755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19755 killed at Wed Oct 18 18:02:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19821 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19821 found at Wed Oct 18 18:02:21 UTC 2023 selfserv_9355 with PID 19821 started at Wed Oct 18 18:02:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #755: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19821 at Wed Oct 18 18:02:22 UTC 2023 kill -USR1 19821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19821 killed at Wed Oct 18 18:02:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19874 found at Wed Oct 18 18:02:22 UTC 2023 selfserv_9355 with PID 19874 started at Wed Oct 18 18:02:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #756: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19874 at Wed Oct 18 18:02:23 UTC 2023 kill -USR1 19874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19874 killed at Wed Oct 18 18:02:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19929 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19929 found at Wed Oct 18 18:02:23 UTC 2023 selfserv_9355 with PID 19929 started at Wed Oct 18 18:02:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #757: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19929 at Wed Oct 18 18:02:24 UTC 2023 kill -USR1 19929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19929 killed at Wed Oct 18 18:02:24 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19995 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19995 found at Wed Oct 18 18:02:24 UTC 2023 selfserv_9355 with PID 19995 started at Wed Oct 18 18:02:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #758: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19995 at Wed Oct 18 18:02:25 UTC 2023 kill -USR1 19995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19995 killed at Wed Oct 18 18:02:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20048 found at Wed Oct 18 18:02:25 UTC 2023 selfserv_9355 with PID 20048 started at Wed Oct 18 18:02:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #759: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20048 at Wed Oct 18 18:02:25 UTC 2023 kill -USR1 20048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20048 killed at Wed Oct 18 18:02:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20100 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20100 found at Wed Oct 18 18:02:26 UTC 2023 selfserv_9355 with PID 20100 started at Wed Oct 18 18:02:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #760: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20100 at Wed Oct 18 18:02:26 UTC 2023 kill -USR1 20100 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20100 killed at Wed Oct 18 18:02:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20167 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20167 found at Wed Oct 18 18:02:26 UTC 2023 selfserv_9355 with PID 20167 started at Wed Oct 18 18:02:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #761: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20167 at Wed Oct 18 18:02:27 UTC 2023 kill -USR1 20167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20167 killed at Wed Oct 18 18:02:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20219 found at Wed Oct 18 18:02:27 UTC 2023 selfserv_9355 with PID 20219 started at Wed Oct 18 18:02:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #762: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20219 at Wed Oct 18 18:02:28 UTC 2023 kill -USR1 20219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20219 killed at Wed Oct 18 18:02:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20271 found at Wed Oct 18 18:02:28 UTC 2023 selfserv_9355 with PID 20271 started at Wed Oct 18 18:02:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #763: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20271 at Wed Oct 18 18:02:28 UTC 2023 kill -USR1 20271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20271 killed at Wed Oct 18 18:02:28 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20337 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20337 found at Wed Oct 18 18:02:29 UTC 2023 selfserv_9355 with PID 20337 started at Wed Oct 18 18:02:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #764: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20337 at Wed Oct 18 18:02:29 UTC 2023 kill -USR1 20337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20337 killed at Wed Oct 18 18:02:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20389 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20389 found at Wed Oct 18 18:02:29 UTC 2023 selfserv_9355 with PID 20389 started at Wed Oct 18 18:02:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #765: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20389 at Wed Oct 18 18:02:30 UTC 2023 kill -USR1 20389 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20389 killed at Wed Oct 18 18:02:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20441 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20441 found at Wed Oct 18 18:02:30 UTC 2023 selfserv_9355 with PID 20441 started at Wed Oct 18 18:02:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #766: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20441 at Wed Oct 18 18:02:31 UTC 2023 kill -USR1 20441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20441 killed at Wed Oct 18 18:02:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20507 found at Wed Oct 18 18:02:31 UTC 2023 selfserv_9355 with PID 20507 started at Wed Oct 18 18:02:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #767: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20507 at Wed Oct 18 18:02:32 UTC 2023 kill -USR1 20507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20507 killed at Wed Oct 18 18:02:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20559 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20559 found at Wed Oct 18 18:02:32 UTC 2023 selfserv_9355 with PID 20559 started at Wed Oct 18 18:02:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #768: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20559 at Wed Oct 18 18:02:32 UTC 2023 kill -USR1 20559 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20559 killed at Wed Oct 18 18:02:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20611 found at Wed Oct 18 18:02:33 UTC 2023 selfserv_9355 with PID 20611 started at Wed Oct 18 18:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #769: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20611 at Wed Oct 18 18:02:33 UTC 2023 kill -USR1 20611 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20611 killed at Wed Oct 18 18:02:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20677 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20677 found at Wed Oct 18 18:02:33 UTC 2023 selfserv_9355 with PID 20677 started at Wed Oct 18 18:02:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #770: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20677 at Wed Oct 18 18:02:34 UTC 2023 kill -USR1 20677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20677 killed at Wed Oct 18 18:02:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20729 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20729 found at Wed Oct 18 18:02:34 UTC 2023 selfserv_9355 with PID 20729 started at Wed Oct 18 18:02:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #771: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20729 at Wed Oct 18 18:02:35 UTC 2023 kill -USR1 20729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20729 killed at Wed Oct 18 18:02:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20781 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20781 found at Wed Oct 18 18:02:35 UTC 2023 selfserv_9355 with PID 20781 started at Wed Oct 18 18:02:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #772: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20781 at Wed Oct 18 18:02:35 UTC 2023 kill -USR1 20781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20781 killed at Wed Oct 18 18:02:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20847 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20847 found at Wed Oct 18 18:02:36 UTC 2023 selfserv_9355 with PID 20847 started at Wed Oct 18 18:02:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #773: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20847 at Wed Oct 18 18:02:36 UTC 2023 kill -USR1 20847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20847 killed at Wed Oct 18 18:02:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20899 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20899 found at Wed Oct 18 18:02:37 UTC 2023 selfserv_9355 with PID 20899 started at Wed Oct 18 18:02:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #774: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20899 at Wed Oct 18 18:02:37 UTC 2023 kill -USR1 20899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20899 killed at Wed Oct 18 18:02:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20951 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20951 found at Wed Oct 18 18:02:38 UTC 2023 selfserv_9355 with PID 20951 started at Wed Oct 18 18:02:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #775: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20951 at Wed Oct 18 18:02:38 UTC 2023 kill -USR1 20951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20951 killed at Wed Oct 18 18:02:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21017 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21017 found at Wed Oct 18 18:02:38 UTC 2023 selfserv_9355 with PID 21017 started at Wed Oct 18 18:02:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #776: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21017 at Wed Oct 18 18:02:39 UTC 2023 kill -USR1 21017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21017 killed at Wed Oct 18 18:02:39 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21069 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21069 found at Wed Oct 18 18:02:39 UTC 2023 selfserv_9355 with PID 21069 started at Wed Oct 18 18:02:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #777: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21069 at Wed Oct 18 18:02:40 UTC 2023 kill -USR1 21069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21069 killed at Wed Oct 18 18:02:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21121 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21121 found at Wed Oct 18 18:02:40 UTC 2023 selfserv_9355 with PID 21121 started at Wed Oct 18 18:02:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #778: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21121 at Wed Oct 18 18:02:40 UTC 2023 kill -USR1 21121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21121 killed at Wed Oct 18 18:02:40 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21187 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21187 found at Wed Oct 18 18:02:41 UTC 2023 selfserv_9355 with PID 21187 started at Wed Oct 18 18:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #779: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21187 at Wed Oct 18 18:02:41 UTC 2023 kill -USR1 21187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21187 killed at Wed Oct 18 18:02:41 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21239 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21239 found at Wed Oct 18 18:02:41 UTC 2023 selfserv_9355 with PID 21239 started at Wed Oct 18 18:02:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #780: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21239 at Wed Oct 18 18:02:42 UTC 2023 kill -USR1 21239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21239 killed at Wed Oct 18 18:02:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21291 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21291 found at Wed Oct 18 18:02:42 UTC 2023 selfserv_9355 with PID 21291 started at Wed Oct 18 18:02:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #781: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21291 at Wed Oct 18 18:02:43 UTC 2023 kill -USR1 21291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21291 killed at Wed Oct 18 18:02:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21357 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21357 found at Wed Oct 18 18:02:43 UTC 2023 selfserv_9355 with PID 21357 started at Wed Oct 18 18:02:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #782: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21357 at Wed Oct 18 18:02:44 UTC 2023 kill -USR1 21357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21357 killed at Wed Oct 18 18:02:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21409 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21409 found at Wed Oct 18 18:02:44 UTC 2023 selfserv_9355 with PID 21409 started at Wed Oct 18 18:02:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #783: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21409 at Wed Oct 18 18:02:44 UTC 2023 kill -USR1 21409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21409 killed at Wed Oct 18 18:02:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21461 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21461 found at Wed Oct 18 18:02:45 UTC 2023 selfserv_9355 with PID 21461 started at Wed Oct 18 18:02:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #784: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21461 at Wed Oct 18 18:02:45 UTC 2023 kill -USR1 21461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21461 killed at Wed Oct 18 18:02:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21527 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21527 found at Wed Oct 18 18:02:46 UTC 2023 selfserv_9355 with PID 21527 started at Wed Oct 18 18:02:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #785: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21527 at Wed Oct 18 18:02:46 UTC 2023 kill -USR1 21527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21527 killed at Wed Oct 18 18:02:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21579 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21579 found at Wed Oct 18 18:02:46 UTC 2023 selfserv_9355 with PID 21579 started at Wed Oct 18 18:02:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #786: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21579 at Wed Oct 18 18:02:47 UTC 2023 kill -USR1 21579 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21579 killed at Wed Oct 18 18:02:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21631 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21631 found at Wed Oct 18 18:02:47 UTC 2023 selfserv_9355 with PID 21631 started at Wed Oct 18 18:02:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21631 at Wed Oct 18 18:02:47 UTC 2023 kill -USR1 21631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21631 killed at Wed Oct 18 18:02:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21697 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21697 found at Wed Oct 18 18:02:48 UTC 2023 selfserv_9355 with PID 21697 started at Wed Oct 18 18:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #788: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21697 at Wed Oct 18 18:02:48 UTC 2023 kill -USR1 21697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21697 killed at Wed Oct 18 18:02:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21749 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21749 found at Wed Oct 18 18:02:48 UTC 2023 selfserv_9355 with PID 21749 started at Wed Oct 18 18:02:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21749 at Wed Oct 18 18:02:49 UTC 2023 kill -USR1 21749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21749 killed at Wed Oct 18 18:02:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21801 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21801 found at Wed Oct 18 18:02:49 UTC 2023 selfserv_9355 with PID 21801 started at Wed Oct 18 18:02:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #790: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21801 at Wed Oct 18 18:02:50 UTC 2023 kill -USR1 21801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21801 killed at Wed Oct 18 18:02:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21867 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21867 found at Wed Oct 18 18:02:50 UTC 2023 selfserv_9355 with PID 21867 started at Wed Oct 18 18:02:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21867 at Wed Oct 18 18:02:50 UTC 2023 kill -USR1 21867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21867 killed at Wed Oct 18 18:02:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21919 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21919 found at Wed Oct 18 18:02:51 UTC 2023 selfserv_9355 with PID 21919 started at Wed Oct 18 18:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21919 at Wed Oct 18 18:02:51 UTC 2023 kill -USR1 21919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21919 killed at Wed Oct 18 18:02:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21971 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21971 found at Wed Oct 18 18:02:51 UTC 2023 selfserv_9355 with PID 21971 started at Wed Oct 18 18:02:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21971 at Wed Oct 18 18:02:52 UTC 2023 kill -USR1 21971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21971 killed at Wed Oct 18 18:02:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22037 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22037 found at Wed Oct 18 18:02:52 UTC 2023 selfserv_9355 with PID 22037 started at Wed Oct 18 18:02:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #794: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22037 at Wed Oct 18 18:02:53 UTC 2023 kill -USR1 22037 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22037 killed at Wed Oct 18 18:02:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22089 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22089 found at Wed Oct 18 18:02:53 UTC 2023 selfserv_9355 with PID 22089 started at Wed Oct 18 18:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22089 at Wed Oct 18 18:02:53 UTC 2023 kill -USR1 22089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22089 killed at Wed Oct 18 18:02:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22141 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22141 found at Wed Oct 18 18:02:53 UTC 2023 selfserv_9355 with PID 22141 started at Wed Oct 18 18:02:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22141 at Wed Oct 18 18:02:54 UTC 2023 kill -USR1 22141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22141 killed at Wed Oct 18 18:02:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22207 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22207 found at Wed Oct 18 18:02:54 UTC 2023 selfserv_9355 with PID 22207 started at Wed Oct 18 18:02:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #797: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22207 at Wed Oct 18 18:02:54 UTC 2023 kill -USR1 22207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22207 killed at Wed Oct 18 18:02:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22259 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22259 found at Wed Oct 18 18:02:55 UTC 2023 selfserv_9355 with PID 22259 started at Wed Oct 18 18:02:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22259 at Wed Oct 18 18:02:55 UTC 2023 kill -USR1 22259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22259 killed at Wed Oct 18 18:02:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22311 found at Wed Oct 18 18:02:55 UTC 2023 selfserv_9355 with PID 22311 started at Wed Oct 18 18:02:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #799: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22311 at Wed Oct 18 18:02:56 UTC 2023 kill -USR1 22311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22311 killed at Wed Oct 18 18:02:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22377 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22377 found at Wed Oct 18 18:02:56 UTC 2023 selfserv_9355 with PID 22377 started at Wed Oct 18 18:02:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22377 at Wed Oct 18 18:02:56 UTC 2023 kill -USR1 22377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22377 killed at Wed Oct 18 18:02:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22429 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22429 found at Wed Oct 18 18:02:57 UTC 2023 selfserv_9355 with PID 22429 started at Wed Oct 18 18:02:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22429 at Wed Oct 18 18:02:57 UTC 2023 kill -USR1 22429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22429 killed at Wed Oct 18 18:02:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:02:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22481 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22481 found at Wed Oct 18 18:02:57 UTC 2023 selfserv_9355 with PID 22481 started at Wed Oct 18 18:02:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #802: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22481 at Wed Oct 18 18:02:58 UTC 2023 kill -USR1 22481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22481 killed at Wed Oct 18 18:02:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22547 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22547 found at Wed Oct 18 18:02:58 UTC 2023 selfserv_9355 with PID 22547 started at Wed Oct 18 18:02:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #803: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22547 at Wed Oct 18 18:02:58 UTC 2023 kill -USR1 22547 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22547 killed at Wed Oct 18 18:02:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22599 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22599 found at Wed Oct 18 18:02:59 UTC 2023 selfserv_9355 with PID 22599 started at Wed Oct 18 18:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #804: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22599 at Wed Oct 18 18:02:59 UTC 2023 kill -USR1 22599 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22599 killed at Wed Oct 18 18:02:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:02:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22651 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22651 found at Wed Oct 18 18:02:59 UTC 2023 selfserv_9355 with PID 22651 started at Wed Oct 18 18:02:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22651 at Wed Oct 18 18:03:00 UTC 2023 kill -USR1 22651 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22651 killed at Wed Oct 18 18:03:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22717 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22717 found at Wed Oct 18 18:03:00 UTC 2023 selfserv_9355 with PID 22717 started at Wed Oct 18 18:03:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #806: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22717 at Wed Oct 18 18:03:00 UTC 2023 kill -USR1 22717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22717 killed at Wed Oct 18 18:03:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22770 found at Wed Oct 18 18:03:00 UTC 2023 selfserv_9355 with PID 22770 started at Wed Oct 18 18:03:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22770 at Wed Oct 18 18:03:01 UTC 2023 kill -USR1 22770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22770 killed at Wed Oct 18 18:03:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22822 found at Wed Oct 18 18:03:01 UTC 2023 selfserv_9355 with PID 22822 started at Wed Oct 18 18:03:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #808: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22822 at Wed Oct 18 18:03:01 UTC 2023 kill -USR1 22822 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22822 killed at Wed Oct 18 18:03:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22888 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22888 found at Wed Oct 18 18:03:02 UTC 2023 selfserv_9355 with PID 22888 started at Wed Oct 18 18:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #809: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22888 at Wed Oct 18 18:03:02 UTC 2023 kill -USR1 22888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22888 killed at Wed Oct 18 18:03:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22940 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22940 found at Wed Oct 18 18:03:02 UTC 2023 selfserv_9355 with PID 22940 started at Wed Oct 18 18:03:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22940 at Wed Oct 18 18:03:02 UTC 2023 kill -USR1 22940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22940 killed at Wed Oct 18 18:03:03 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22992 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22992 found at Wed Oct 18 18:03:03 UTC 2023 selfserv_9355 with PID 22992 started at Wed Oct 18 18:03:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #811: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 22992 at Wed Oct 18 18:03:03 UTC 2023 kill -USR1 22992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22992 killed at Wed Oct 18 18:03:03 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23058 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23058 found at Wed Oct 18 18:03:03 UTC 2023 selfserv_9355 with PID 23058 started at Wed Oct 18 18:03:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #812: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23058 at Wed Oct 18 18:03:04 UTC 2023 kill -USR1 23058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23058 killed at Wed Oct 18 18:03:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23110 found at Wed Oct 18 18:03:04 UTC 2023 selfserv_9355 with PID 23110 started at Wed Oct 18 18:03:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23110 at Wed Oct 18 18:03:04 UTC 2023 kill -USR1 23110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23110 killed at Wed Oct 18 18:03:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23162 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23162 found at Wed Oct 18 18:03:04 UTC 2023 selfserv_9355 with PID 23162 started at Wed Oct 18 18:03:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #814: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23162 at Wed Oct 18 18:03:05 UTC 2023 kill -USR1 23162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23162 killed at Wed Oct 18 18:03:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23228 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23228 found at Wed Oct 18 18:03:05 UTC 2023 selfserv_9355 with PID 23228 started at Wed Oct 18 18:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23228 at Wed Oct 18 18:03:05 UTC 2023 kill -USR1 23228 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23228 killed at Wed Oct 18 18:03:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23280 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23280 found at Wed Oct 18 18:03:06 UTC 2023 selfserv_9355 with PID 23280 started at Wed Oct 18 18:03:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23280 at Wed Oct 18 18:03:06 UTC 2023 kill -USR1 23280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23280 killed at Wed Oct 18 18:03:06 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23332 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23332 found at Wed Oct 18 18:03:06 UTC 2023 selfserv_9355 with PID 23332 started at Wed Oct 18 18:03:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #817: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23332 at Wed Oct 18 18:03:07 UTC 2023 kill -USR1 23332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23332 killed at Wed Oct 18 18:03:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23398 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23398 found at Wed Oct 18 18:03:07 UTC 2023 selfserv_9355 with PID 23398 started at Wed Oct 18 18:03:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #818: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23398 at Wed Oct 18 18:03:07 UTC 2023 kill -USR1 23398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23398 killed at Wed Oct 18 18:03:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23450 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23450 found at Wed Oct 18 18:03:08 UTC 2023 selfserv_9355 with PID 23450 started at Wed Oct 18 18:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #819: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23450 at Wed Oct 18 18:03:08 UTC 2023 kill -USR1 23450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23450 killed at Wed Oct 18 18:03:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23502 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23502 found at Wed Oct 18 18:03:08 UTC 2023 selfserv_9355 with PID 23502 started at Wed Oct 18 18:03:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #820: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23502 at Wed Oct 18 18:03:09 UTC 2023 kill -USR1 23502 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23502 killed at Wed Oct 18 18:03:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23568 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23568 found at Wed Oct 18 18:03:09 UTC 2023 selfserv_9355 with PID 23568 started at Wed Oct 18 18:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23568 at Wed Oct 18 18:03:09 UTC 2023 kill -USR1 23568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23568 killed at Wed Oct 18 18:03:09 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23620 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23620 found at Wed Oct 18 18:03:09 UTC 2023 selfserv_9355 with PID 23620 started at Wed Oct 18 18:03:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23620 at Wed Oct 18 18:03:10 UTC 2023 kill -USR1 23620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23620 killed at Wed Oct 18 18:03:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23672 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23672 found at Wed Oct 18 18:03:10 UTC 2023 selfserv_9355 with PID 23672 started at Wed Oct 18 18:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #823: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23672 at Wed Oct 18 18:03:10 UTC 2023 kill -USR1 23672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23672 killed at Wed Oct 18 18:03:10 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23738 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23738 found at Wed Oct 18 18:03:10 UTC 2023 selfserv_9355 with PID 23738 started at Wed Oct 18 18:03:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23738 at Wed Oct 18 18:03:11 UTC 2023 kill -USR1 23738 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23738 killed at Wed Oct 18 18:03:11 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23790 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23790 found at Wed Oct 18 18:03:11 UTC 2023 selfserv_9355 with PID 23790 started at Wed Oct 18 18:03:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23790 at Wed Oct 18 18:03:11 UTC 2023 kill -USR1 23790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23790 killed at Wed Oct 18 18:03:12 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23842 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23842 found at Wed Oct 18 18:03:12 UTC 2023 selfserv_9355 with PID 23842 started at Wed Oct 18 18:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23842 at Wed Oct 18 18:03:12 UTC 2023 kill -USR1 23842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23842 killed at Wed Oct 18 18:03:12 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23908 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23908 found at Wed Oct 18 18:03:12 UTC 2023 selfserv_9355 with PID 23908 started at Wed Oct 18 18:03:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23908 at Wed Oct 18 18:03:13 UTC 2023 kill -USR1 23908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23908 killed at Wed Oct 18 18:03:13 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23960 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23960 found at Wed Oct 18 18:03:13 UTC 2023 selfserv_9355 with PID 23960 started at Wed Oct 18 18:03:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23960 at Wed Oct 18 18:03:13 UTC 2023 kill -USR1 23960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23960 killed at Wed Oct 18 18:03:13 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24012 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24012 found at Wed Oct 18 18:03:14 UTC 2023 selfserv_9355 with PID 24012 started at Wed Oct 18 18:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24012 at Wed Oct 18 18:03:14 UTC 2023 kill -USR1 24012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24012 killed at Wed Oct 18 18:03:14 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24078 found at Wed Oct 18 18:03:14 UTC 2023 selfserv_9355 with PID 24078 started at Wed Oct 18 18:03:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #830: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24078 at Wed Oct 18 18:03:15 UTC 2023 kill -USR1 24078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24078 killed at Wed Oct 18 18:03:15 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24130 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24130 found at Wed Oct 18 18:03:15 UTC 2023 selfserv_9355 with PID 24130 started at Wed Oct 18 18:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24130 at Wed Oct 18 18:03:15 UTC 2023 kill -USR1 24130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24130 killed at Wed Oct 18 18:03:15 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24182 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24182 found at Wed Oct 18 18:03:16 UTC 2023 selfserv_9355 with PID 24182 started at Wed Oct 18 18:03:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #832: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24182 at Wed Oct 18 18:03:16 UTC 2023 kill -USR1 24182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24182 killed at Wed Oct 18 18:03:16 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24248 found at Wed Oct 18 18:03:16 UTC 2023 selfserv_9355 with PID 24248 started at Wed Oct 18 18:03:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24248 at Wed Oct 18 18:03:16 UTC 2023 kill -USR1 24248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24248 killed at Wed Oct 18 18:03:16 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24300 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24300 found at Wed Oct 18 18:03:17 UTC 2023 selfserv_9355 with PID 24300 started at Wed Oct 18 18:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24300 at Wed Oct 18 18:03:17 UTC 2023 kill -USR1 24300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24300 killed at Wed Oct 18 18:03:17 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24352 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24352 found at Wed Oct 18 18:03:17 UTC 2023 selfserv_9355 with PID 24352 started at Wed Oct 18 18:03:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #835: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24352 at Wed Oct 18 18:03:17 UTC 2023 kill -USR1 24352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24352 killed at Wed Oct 18 18:03:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24418 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24418 found at Wed Oct 18 18:03:18 UTC 2023 selfserv_9355 with PID 24418 started at Wed Oct 18 18:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #836: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24418 at Wed Oct 18 18:03:18 UTC 2023 kill -USR1 24418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24418 killed at Wed Oct 18 18:03:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24470 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24470 found at Wed Oct 18 18:03:18 UTC 2023 selfserv_9355 with PID 24470 started at Wed Oct 18 18:03:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24470 at Wed Oct 18 18:03:19 UTC 2023 kill -USR1 24470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24470 killed at Wed Oct 18 18:03:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24522 found at Wed Oct 18 18:03:19 UTC 2023 selfserv_9355 with PID 24522 started at Wed Oct 18 18:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #838: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24522 at Wed Oct 18 18:03:19 UTC 2023 kill -USR1 24522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24522 killed at Wed Oct 18 18:03:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24588 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24588 found at Wed Oct 18 18:03:20 UTC 2023 selfserv_9355 with PID 24588 started at Wed Oct 18 18:03:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24588 at Wed Oct 18 18:03:20 UTC 2023 kill -USR1 24588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24588 killed at Wed Oct 18 18:03:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24640 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24640 found at Wed Oct 18 18:03:20 UTC 2023 selfserv_9355 with PID 24640 started at Wed Oct 18 18:03:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24640 at Wed Oct 18 18:03:20 UTC 2023 kill -USR1 24640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24640 killed at Wed Oct 18 18:03:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24697 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24697 found at Wed Oct 18 18:03:21 UTC 2023 selfserv_9355 with PID 24697 started at Wed Oct 18 18:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24697 at Wed Oct 18 18:03:21 UTC 2023 kill -USR1 24697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24697 killed at Wed Oct 18 18:03:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24763 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24763 found at Wed Oct 18 18:03:21 UTC 2023 selfserv_9355 with PID 24763 started at Wed Oct 18 18:03:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #842: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24763 at Wed Oct 18 18:03:21 UTC 2023 kill -USR1 24763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24763 killed at Wed Oct 18 18:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24815 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24815 found at Wed Oct 18 18:03:22 UTC 2023 selfserv_9355 with PID 24815 started at Wed Oct 18 18:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24815 at Wed Oct 18 18:03:22 UTC 2023 kill -USR1 24815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24815 killed at Wed Oct 18 18:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24867 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24867 found at Wed Oct 18 18:03:22 UTC 2023 selfserv_9355 with PID 24867 started at Wed Oct 18 18:03:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #844: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24867 at Wed Oct 18 18:03:23 UTC 2023 kill -USR1 24867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24867 killed at Wed Oct 18 18:03:23 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24937 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24937 found at Wed Oct 18 18:03:23 UTC 2023 selfserv_9355 with PID 24937 started at Wed Oct 18 18:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24937 at Wed Oct 18 18:03:23 UTC 2023 kill -USR1 24937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24937 killed at Wed Oct 18 18:03:23 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24989 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24989 found at Wed Oct 18 18:03:23 UTC 2023 selfserv_9355 with PID 24989 started at Wed Oct 18 18:03:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #846: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 24989 at Wed Oct 18 18:03:24 UTC 2023 kill -USR1 24989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24989 killed at Wed Oct 18 18:03:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25041 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25041 found at Wed Oct 18 18:03:24 UTC 2023 selfserv_9355 with PID 25041 started at Wed Oct 18 18:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #847: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25041 at Wed Oct 18 18:03:24 UTC 2023 kill -USR1 25041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25041 killed at Wed Oct 18 18:03:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25107 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25107 found at Wed Oct 18 18:03:24 UTC 2023 selfserv_9355 with PID 25107 started at Wed Oct 18 18:03:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #848: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25107 at Wed Oct 18 18:03:25 UTC 2023 kill -USR1 25107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25107 killed at Wed Oct 18 18:03:25 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25160 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25160 found at Wed Oct 18 18:03:25 UTC 2023 selfserv_9355 with PID 25160 started at Wed Oct 18 18:03:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25160 at Wed Oct 18 18:03:25 UTC 2023 kill -USR1 25160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25160 killed at Wed Oct 18 18:03:25 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25212 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25212 found at Wed Oct 18 18:03:25 UTC 2023 selfserv_9355 with PID 25212 started at Wed Oct 18 18:03:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #850: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 25212 at Wed Oct 18 18:03:26 UTC 2023 kill -USR1 25212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25212 killed at Wed Oct 18 18:03:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25278 found at Wed Oct 18 18:03:26 UTC 2023 selfserv_9355 with PID 25278 started at Wed Oct 18 18:03:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25278 at Wed Oct 18 18:03:26 UTC 2023 kill -USR1 25278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25278 killed at Wed Oct 18 18:03:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25331 found at Wed Oct 18 18:03:27 UTC 2023 selfserv_9355 with PID 25331 started at Wed Oct 18 18:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25331 at Wed Oct 18 18:03:27 UTC 2023 kill -USR1 25331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25331 killed at Wed Oct 18 18:03:27 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25383 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25383 found at Wed Oct 18 18:03:27 UTC 2023 selfserv_9355 with PID 25383 started at Wed Oct 18 18:03:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25383 at Wed Oct 18 18:03:28 UTC 2023 kill -USR1 25383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25383 killed at Wed Oct 18 18:03:28 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25449 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25449 found at Wed Oct 18 18:03:28 UTC 2023 selfserv_9355 with PID 25449 started at Wed Oct 18 18:03:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #854: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25449 at Wed Oct 18 18:03:29 UTC 2023 kill -USR1 25449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25449 killed at Wed Oct 18 18:03:29 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25501 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25501 found at Wed Oct 18 18:03:29 UTC 2023 selfserv_9355 with PID 25501 started at Wed Oct 18 18:03:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25501 at Wed Oct 18 18:03:29 UTC 2023 kill -USR1 25501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25501 killed at Wed Oct 18 18:03:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25553 found at Wed Oct 18 18:03:30 UTC 2023 selfserv_9355 with PID 25553 started at Wed Oct 18 18:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #856: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25553 at Wed Oct 18 18:03:30 UTC 2023 kill -USR1 25553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25553 killed at Wed Oct 18 18:03:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25619 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25619 found at Wed Oct 18 18:03:30 UTC 2023 selfserv_9355 with PID 25619 started at Wed Oct 18 18:03:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #857: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25619 at Wed Oct 18 18:03:31 UTC 2023 kill -USR1 25619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25619 killed at Wed Oct 18 18:03:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25671 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25671 found at Wed Oct 18 18:03:31 UTC 2023 selfserv_9355 with PID 25671 started at Wed Oct 18 18:03:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #858: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25671 at Wed Oct 18 18:03:32 UTC 2023 kill -USR1 25671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25671 killed at Wed Oct 18 18:03:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25723 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25723 found at Wed Oct 18 18:03:32 UTC 2023 selfserv_9355 with PID 25723 started at Wed Oct 18 18:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #859: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25723 at Wed Oct 18 18:03:32 UTC 2023 kill -USR1 25723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25723 killed at Wed Oct 18 18:03:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25789 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25789 found at Wed Oct 18 18:03:33 UTC 2023 selfserv_9355 with PID 25789 started at Wed Oct 18 18:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #860: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25789 at Wed Oct 18 18:03:33 UTC 2023 kill -USR1 25789 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25789 killed at Wed Oct 18 18:03:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25841 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25841 found at Wed Oct 18 18:03:33 UTC 2023 selfserv_9355 with PID 25841 started at Wed Oct 18 18:03:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #861: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25841 at Wed Oct 18 18:03:34 UTC 2023 kill -USR1 25841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25841 killed at Wed Oct 18 18:03:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25893 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25893 found at Wed Oct 18 18:03:34 UTC 2023 selfserv_9355 with PID 25893 started at Wed Oct 18 18:03:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #862: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25893 at Wed Oct 18 18:03:35 UTC 2023 kill -USR1 25893 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25893 killed at Wed Oct 18 18:03:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25959 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25959 found at Wed Oct 18 18:03:35 UTC 2023 selfserv_9355 with PID 25959 started at Wed Oct 18 18:03:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #863: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25959 at Wed Oct 18 18:03:35 UTC 2023 kill -USR1 25959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25959 killed at Wed Oct 18 18:03:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26011 found at Wed Oct 18 18:03:36 UTC 2023 selfserv_9355 with PID 26011 started at Wed Oct 18 18:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #864: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26011 at Wed Oct 18 18:03:36 UTC 2023 kill -USR1 26011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26011 killed at Wed Oct 18 18:03:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26063 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26063 found at Wed Oct 18 18:03:36 UTC 2023 selfserv_9355 with PID 26063 started at Wed Oct 18 18:03:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #865: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26063 at Wed Oct 18 18:03:37 UTC 2023 kill -USR1 26063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26063 killed at Wed Oct 18 18:03:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26129 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26129 found at Wed Oct 18 18:03:37 UTC 2023 selfserv_9355 with PID 26129 started at Wed Oct 18 18:03:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26129 at Wed Oct 18 18:03:38 UTC 2023 kill -USR1 26129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26129 killed at Wed Oct 18 18:03:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26181 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26181 found at Wed Oct 18 18:03:38 UTC 2023 selfserv_9355 with PID 26181 started at Wed Oct 18 18:03:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #867: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26181 at Wed Oct 18 18:03:38 UTC 2023 kill -USR1 26181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26181 killed at Wed Oct 18 18:03:38 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26233 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26233 found at Wed Oct 18 18:03:39 UTC 2023 selfserv_9355 with PID 26233 started at Wed Oct 18 18:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #868: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26233 at Wed Oct 18 18:03:39 UTC 2023 kill -USR1 26233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26233 killed at Wed Oct 18 18:03:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26300 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26300 found at Wed Oct 18 18:03:39 UTC 2023 selfserv_9355 with PID 26300 started at Wed Oct 18 18:03:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #869: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26300 at Wed Oct 18 18:03:40 UTC 2023 kill -USR1 26300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26300 killed at Wed Oct 18 18:03:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26352 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26352 found at Wed Oct 18 18:03:40 UTC 2023 selfserv_9355 with PID 26352 started at Wed Oct 18 18:03:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #870: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26352 at Wed Oct 18 18:03:41 UTC 2023 kill -USR1 26352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26352 killed at Wed Oct 18 18:03:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26404 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26404 found at Wed Oct 18 18:03:41 UTC 2023 selfserv_9355 with PID 26404 started at Wed Oct 18 18:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #871: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26404 at Wed Oct 18 18:03:41 UTC 2023 kill -USR1 26404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26404 killed at Wed Oct 18 18:03:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26470 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26470 found at Wed Oct 18 18:03:42 UTC 2023 selfserv_9355 with PID 26470 started at Wed Oct 18 18:03:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #872: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26470 at Wed Oct 18 18:03:42 UTC 2023 kill -USR1 26470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26470 killed at Wed Oct 18 18:03:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26522 found at Wed Oct 18 18:03:42 UTC 2023 selfserv_9355 with PID 26522 started at Wed Oct 18 18:03:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #873: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26522 at Wed Oct 18 18:03:43 UTC 2023 kill -USR1 26522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26522 killed at Wed Oct 18 18:03:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26574 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26574 found at Wed Oct 18 18:03:43 UTC 2023 selfserv_9355 with PID 26574 started at Wed Oct 18 18:03:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #874: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26574 at Wed Oct 18 18:03:44 UTC 2023 kill -USR1 26574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26574 killed at Wed Oct 18 18:03:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26640 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26640 found at Wed Oct 18 18:03:44 UTC 2023 selfserv_9355 with PID 26640 started at Wed Oct 18 18:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #875: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26640 at Wed Oct 18 18:03:44 UTC 2023 kill -USR1 26640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26640 killed at Wed Oct 18 18:03:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26692 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26692 found at Wed Oct 18 18:03:44 UTC 2023 selfserv_9355 with PID 26692 started at Wed Oct 18 18:03:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #876: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26692 at Wed Oct 18 18:03:45 UTC 2023 kill -USR1 26692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26692 killed at Wed Oct 18 18:03:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26744 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26744 found at Wed Oct 18 18:03:45 UTC 2023 selfserv_9355 with PID 26744 started at Wed Oct 18 18:03:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #877: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26744 at Wed Oct 18 18:03:45 UTC 2023 kill -USR1 26744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26744 killed at Wed Oct 18 18:03:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26810 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26810 found at Wed Oct 18 18:03:46 UTC 2023 selfserv_9355 with PID 26810 started at Wed Oct 18 18:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #878: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26810 at Wed Oct 18 18:03:46 UTC 2023 kill -USR1 26810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26810 killed at Wed Oct 18 18:03:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26862 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26862 found at Wed Oct 18 18:03:46 UTC 2023 selfserv_9355 with PID 26862 started at Wed Oct 18 18:03:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #879: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26862 at Wed Oct 18 18:03:47 UTC 2023 kill -USR1 26862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26862 killed at Wed Oct 18 18:03:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26914 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26914 found at Wed Oct 18 18:03:47 UTC 2023 selfserv_9355 with PID 26914 started at Wed Oct 18 18:03:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #880: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26914 at Wed Oct 18 18:03:47 UTC 2023 kill -USR1 26914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26914 killed at Wed Oct 18 18:03:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26980 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26980 found at Wed Oct 18 18:03:48 UTC 2023 selfserv_9355 with PID 26980 started at Wed Oct 18 18:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #881: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26980 at Wed Oct 18 18:03:48 UTC 2023 kill -USR1 26980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26980 killed at Wed Oct 18 18:03:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27032 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27032 found at Wed Oct 18 18:03:48 UTC 2023 selfserv_9355 with PID 27032 started at Wed Oct 18 18:03:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #882: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27032 at Wed Oct 18 18:03:49 UTC 2023 kill -USR1 27032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27032 killed at Wed Oct 18 18:03:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:03:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27084 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27084 found at Wed Oct 18 18:03:49 UTC 2023 selfserv_9355 with PID 27084 started at Wed Oct 18 18:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #883: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27084 at Wed Oct 18 18:03:49 UTC 2023 kill -USR1 27084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27084 killed at Wed Oct 18 18:03:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27150 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27150 found at Wed Oct 18 18:03:49 UTC 2023 selfserv_9355 with PID 27150 started at Wed Oct 18 18:03:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #884: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27150 at Wed Oct 18 18:03:50 UTC 2023 kill -USR1 27150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27150 killed at Wed Oct 18 18:03:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27202 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27202 found at Wed Oct 18 18:03:50 UTC 2023 selfserv_9355 with PID 27202 started at Wed Oct 18 18:03:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #885: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27202 at Wed Oct 18 18:03:50 UTC 2023 kill -USR1 27202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27202 killed at Wed Oct 18 18:03:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27254 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27254 found at Wed Oct 18 18:03:51 UTC 2023 selfserv_9355 with PID 27254 started at Wed Oct 18 18:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #886: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 27254 at Wed Oct 18 18:03:51 UTC 2023 kill -USR1 27254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27254 killed at Wed Oct 18 18:03:51 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27320 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27320 found at Wed Oct 18 18:03:51 UTC 2023 selfserv_9355 with PID 27320 started at Wed Oct 18 18:03:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #887: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27320 at Wed Oct 18 18:03:52 UTC 2023 kill -USR1 27320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27320 killed at Wed Oct 18 18:03:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27372 found at Wed Oct 18 18:03:52 UTC 2023 selfserv_9355 with PID 27372 started at Wed Oct 18 18:03:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #888: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27372 at Wed Oct 18 18:03:53 UTC 2023 kill -USR1 27372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27372 killed at Wed Oct 18 18:03:53 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27425 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27425 found at Wed Oct 18 18:03:53 UTC 2023 selfserv_9355 with PID 27425 started at Wed Oct 18 18:03:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #889: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27425 at Wed Oct 18 18:03:54 UTC 2023 kill -USR1 27425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27425 killed at Wed Oct 18 18:03:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27492 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27492 found at Wed Oct 18 18:03:54 UTC 2023 selfserv_9355 with PID 27492 started at Wed Oct 18 18:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #890: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27492 at Wed Oct 18 18:03:54 UTC 2023 kill -USR1 27492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27492 killed at Wed Oct 18 18:03:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27544 found at Wed Oct 18 18:03:54 UTC 2023 selfserv_9355 with PID 27544 started at Wed Oct 18 18:03:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #891: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27544 at Wed Oct 18 18:03:55 UTC 2023 kill -USR1 27544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27544 killed at Wed Oct 18 18:03:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:03:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27598 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27598 found at Wed Oct 18 18:03:55 UTC 2023 selfserv_9355 with PID 27598 started at Wed Oct 18 18:03:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #892: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27598 at Wed Oct 18 18:03:56 UTC 2023 kill -USR1 27598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27598 killed at Wed Oct 18 18:03:56 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv_9355 starting at Wed Oct 18 18:03:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:03:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:56 UTC 2023 selfserv_9355 with PID 27669 started at Wed Oct 18 18:03:56 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:56 UTC 2023 ssl.sh: #719: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:57 UTC 2023 ssl.sh: #720: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:57 UTC 2023 ssl.sh: #721: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:57 UTC 2023 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:57 UTC 2023 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:58 UTC 2023 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:58 UTC 2023 ssl.sh: #725: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:58 UTC 2023 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:59 UTC 2023 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:59 UTC 2023 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:03:59 UTC 2023 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:00 UTC 2023 ssl.sh: #730: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:00 UTC 2023 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #732: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:01 UTC 2023 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:01 UTC 2023 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:01 UTC 2023 ssl.sh: #735: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:02 UTC 2023 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:02 UTC 2023 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:02 UTC 2023 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:03 UTC 2023 ssl.sh: #739: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:03 UTC 2023 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:03 UTC 2023 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:04 UTC 2023 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:04 UTC 2023 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:04 UTC 2023 ssl.sh: #744: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:05 UTC 2023 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #746: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:05 UTC 2023 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:05 UTC 2023 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:06 UTC 2023 ssl.sh: #749: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:06 UTC 2023 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:06 UTC 2023 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:07 UTC 2023 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:07 UTC 2023 ssl.sh: #753: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:07 UTC 2023 ssl.sh: #754: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:08 UTC 2023 ssl.sh: #755: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:08 UTC 2023 ssl.sh: #756: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:08 UTC 2023 ssl.sh: #757: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:09 UTC 2023 ssl.sh: #758: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27669 found at Wed Oct 18 18:04:09 UTC 2023 ssl.sh: #759: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 27669 at Wed Oct 18 18:04:09 UTC 2023 kill -USR1 27669 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27669 killed at Wed Oct 18 18:04:09 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:04:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:04:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:09 UTC 2023 selfserv_9355 with PID 28928 started at Wed Oct 18 18:04:09 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:09 UTC 2023 ssl.sh: #760: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:10 UTC 2023 ssl.sh: #761: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:10 UTC 2023 ssl.sh: #762: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:10 UTC 2023 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:10 UTC 2023 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:11 UTC 2023 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:11 UTC 2023 ssl.sh: #766: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:11 UTC 2023 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:12 UTC 2023 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:12 UTC 2023 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:12 UTC 2023 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:12 UTC 2023 ssl.sh: #771: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:13 UTC 2023 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #773: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:13 UTC 2023 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:14 UTC 2023 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:14 UTC 2023 ssl.sh: #776: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:14 UTC 2023 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:14 UTC 2023 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:15 UTC 2023 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:15 UTC 2023 ssl.sh: #780: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:15 UTC 2023 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:15 UTC 2023 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:16 UTC 2023 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:16 UTC 2023 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:16 UTC 2023 ssl.sh: #785: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:16 UTC 2023 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #787: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:17 UTC 2023 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:17 UTC 2023 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:17 UTC 2023 ssl.sh: #790: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:18 UTC 2023 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:18 UTC 2023 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:18 UTC 2023 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:18 UTC 2023 ssl.sh: #794: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:19 UTC 2023 ssl.sh: #795: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:19 UTC 2023 ssl.sh: #796: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:19 UTC 2023 ssl.sh: #797: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:19 UTC 2023 ssl.sh: #798: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:20 UTC 2023 ssl.sh: #799: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28928 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28928 found at Wed Oct 18 18:04:20 UTC 2023 ssl.sh: #800: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 28928 at Wed Oct 18 18:04:20 UTC 2023 kill -USR1 28928 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28928 killed at Wed Oct 18 18:04:20 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:04:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:04:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:20 UTC 2023 selfserv_9355 with PID 30186 started at Wed Oct 18 18:04:20 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:21 UTC 2023 ssl.sh: #801: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:21 UTC 2023 ssl.sh: #802: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:21 UTC 2023 ssl.sh: #803: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:22 UTC 2023 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:22 UTC 2023 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:22 UTC 2023 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:23 UTC 2023 ssl.sh: #807: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:23 UTC 2023 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:23 UTC 2023 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:24 UTC 2023 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:24 UTC 2023 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:24 UTC 2023 ssl.sh: #812: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:25 UTC 2023 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #814: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:25 UTC 2023 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:26 UTC 2023 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:26 UTC 2023 ssl.sh: #817: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:26 UTC 2023 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:27 UTC 2023 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:27 UTC 2023 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:27 UTC 2023 ssl.sh: #821: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:27 UTC 2023 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:28 UTC 2023 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:28 UTC 2023 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:28 UTC 2023 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:29 UTC 2023 ssl.sh: #826: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:29 UTC 2023 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #828: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:30 UTC 2023 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:30 UTC 2023 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:30 UTC 2023 ssl.sh: #831: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:31 UTC 2023 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:31 UTC 2023 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:31 UTC 2023 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:32 UTC 2023 ssl.sh: #835: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:32 UTC 2023 ssl.sh: #836: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:32 UTC 2023 ssl.sh: #837: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:33 UTC 2023 ssl.sh: #838: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:33 UTC 2023 ssl.sh: #839: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:33 UTC 2023 ssl.sh: #840: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30186 found at Wed Oct 18 18:04:34 UTC 2023 ssl.sh: #841: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 30186 at Wed Oct 18 18:04:34 UTC 2023 kill -USR1 30186 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30186 killed at Wed Oct 18 18:04:34 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:04:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:04:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:34 UTC 2023 selfserv_9355 with PID 31458 started at Wed Oct 18 18:04:34 UTC 2023 Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:34 UTC 2023 ssl.sh: #842: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:34 UTC 2023 ssl.sh: #843: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:35 UTC 2023 ssl.sh: #844: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:35 UTC 2023 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:35 UTC 2023 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:35 UTC 2023 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:36 UTC 2023 ssl.sh: #848: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:36 UTC 2023 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:36 UTC 2023 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:36 UTC 2023 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:37 UTC 2023 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:37 UTC 2023 ssl.sh: #853: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:37 UTC 2023 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #855: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:38 UTC 2023 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:38 UTC 2023 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:38 UTC 2023 ssl.sh: #858: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:38 UTC 2023 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:39 UTC 2023 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:39 UTC 2023 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:39 UTC 2023 ssl.sh: #862: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:39 UTC 2023 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:40 UTC 2023 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:40 UTC 2023 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:40 UTC 2023 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:40 UTC 2023 ssl.sh: #867: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:41 UTC 2023 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #869: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:41 UTC 2023 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:42 UTC 2023 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:42 UTC 2023 ssl.sh: #872: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:42 UTC 2023 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:42 UTC 2023 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:42 UTC 2023 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:43 UTC 2023 ssl.sh: #876: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:43 UTC 2023 ssl.sh: #877: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:43 UTC 2023 ssl.sh: #878: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:43 UTC 2023 ssl.sh: #879: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:44 UTC 2023 ssl.sh: #880: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:44 UTC 2023 ssl.sh: #881: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31458 found at Wed Oct 18 18:04:44 UTC 2023 ssl.sh: #882: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 31458 at Wed Oct 18 18:04:44 UTC 2023 kill -USR1 31458 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31458 killed at Wed Oct 18 18:04:44 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:04:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:04:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32719 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32719 found at Wed Oct 18 18:04:44 UTC 2023 selfserv_9355 with PID 32719 started at Wed Oct 18 18:04:44 UTC 2023 trying to kill selfserv_9355 with PID 32719 at Wed Oct 18 18:04:44 UTC 2023 kill -USR1 32719 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32719 killed at Wed Oct 18 18:04:45 UTC 2023 selfserv_9355 starting at Wed Oct 18 18:04:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:04:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:45 UTC 2023 selfserv_9355 with PID 32761 started at Wed Oct 18 18:04:45 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:45 UTC 2023 ssl.sh: #883: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:46 UTC 2023 ssl.sh: #884: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:46 UTC 2023 ssl.sh: #885: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:46 UTC 2023 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:47 UTC 2023 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:47 UTC 2023 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:48 UTC 2023 ssl.sh: #889: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:48 UTC 2023 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:49 UTC 2023 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:49 UTC 2023 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:50 UTC 2023 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:50 UTC 2023 ssl.sh: #894: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:51 UTC 2023 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:51 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #896: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:51 UTC 2023 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:52 UTC 2023 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:52 UTC 2023 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:53 UTC 2023 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:53 UTC 2023 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:54 UTC 2023 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:54 UTC 2023 ssl.sh: #903: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:54 UTC 2023 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:55 UTC 2023 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:55 UTC 2023 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:56 UTC 2023 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:56 UTC 2023 ssl.sh: #908: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:57 UTC 2023 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #910: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:57 UTC 2023 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:58 UTC 2023 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:58 UTC 2023 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:59 UTC 2023 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:04:59 UTC 2023 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:00 UTC 2023 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:00 UTC 2023 ssl.sh: #917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:00 UTC 2023 ssl.sh: #918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:01 UTC 2023 ssl.sh: #919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:01 UTC 2023 ssl.sh: #920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:02 UTC 2023 ssl.sh: #921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:02 UTC 2023 ssl.sh: #922: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 32761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32761 found at Wed Oct 18 18:05:03 UTC 2023 ssl.sh: #923: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32761 at Wed Oct 18 18:05:03 UTC 2023 kill -USR1 32761 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32761 killed at Wed Oct 18 18:05:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:05:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:05:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:03 UTC 2023 selfserv_9355 with PID 1612 started at Wed Oct 18 18:05:03 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:03 UTC 2023 ssl.sh: #924: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:04 UTC 2023 ssl.sh: #925: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:04 UTC 2023 ssl.sh: #926: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:05 UTC 2023 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:05 UTC 2023 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:06 UTC 2023 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:06 UTC 2023 ssl.sh: #930: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:07 UTC 2023 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:07 UTC 2023 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:08 UTC 2023 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:08 UTC 2023 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:09 UTC 2023 ssl.sh: #935: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:09 UTC 2023 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #937: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:10 UTC 2023 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:11 UTC 2023 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:11 UTC 2023 ssl.sh: #940: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:12 UTC 2023 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:12 UTC 2023 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:12 UTC 2023 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:13 UTC 2023 ssl.sh: #944: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:13 UTC 2023 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:14 UTC 2023 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:14 UTC 2023 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:15 UTC 2023 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:15 UTC 2023 ssl.sh: #949: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:16 UTC 2023 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #951: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:17 UTC 2023 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:17 UTC 2023 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:18 UTC 2023 ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:18 UTC 2023 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:19 UTC 2023 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:19 UTC 2023 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:20 UTC 2023 ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:20 UTC 2023 ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:20 UTC 2023 ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:21 UTC 2023 ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:21 UTC 2023 ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:22 UTC 2023 ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1612 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1612 found at Wed Oct 18 18:05:22 UTC 2023 ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 1612 at Wed Oct 18 18:05:22 UTC 2023 kill -USR1 1612 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1612 killed at Wed Oct 18 18:05:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:05:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:05:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:23 UTC 2023 selfserv_9355 with PID 2879 started at Wed Oct 18 18:05:23 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:23 UTC 2023 ssl.sh: #965: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:23 UTC 2023 ssl.sh: #966: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:24 UTC 2023 ssl.sh: #967: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:24 UTC 2023 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:24 UTC 2023 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:25 UTC 2023 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:25 UTC 2023 ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:25 UTC 2023 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:26 UTC 2023 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:26 UTC 2023 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:26 UTC 2023 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:27 UTC 2023 ssl.sh: #976: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:27 UTC 2023 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #978: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:28 UTC 2023 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:28 UTC 2023 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:28 UTC 2023 ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:29 UTC 2023 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:29 UTC 2023 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:29 UTC 2023 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:30 UTC 2023 ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:30 UTC 2023 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:30 UTC 2023 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:31 UTC 2023 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:31 UTC 2023 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:31 UTC 2023 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:32 UTC 2023 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #992: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:32 UTC 2023 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:33 UTC 2023 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:33 UTC 2023 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:33 UTC 2023 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:34 UTC 2023 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:34 UTC 2023 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:34 UTC 2023 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:35 UTC 2023 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:35 UTC 2023 ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:35 UTC 2023 ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:36 UTC 2023 ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:36 UTC 2023 ssl.sh: #1004: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2879 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2879 found at Wed Oct 18 18:05:36 UTC 2023 ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2879 at Wed Oct 18 18:05:36 UTC 2023 kill -USR1 2879 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2879 killed at Wed Oct 18 18:05:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:05:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:05:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:37 UTC 2023 selfserv_9355 with PID 4139 started at Wed Oct 18 18:05:37 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:37 UTC 2023 ssl.sh: #1006: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:38 UTC 2023 ssl.sh: #1007: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:38 UTC 2023 ssl.sh: #1008: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:39 UTC 2023 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:39 UTC 2023 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:39 UTC 2023 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:40 UTC 2023 ssl.sh: #1012: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:40 UTC 2023 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:41 UTC 2023 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:41 UTC 2023 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:42 UTC 2023 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:42 UTC 2023 ssl.sh: #1017: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:43 UTC 2023 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1019: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:44 UTC 2023 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:44 UTC 2023 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:44 UTC 2023 ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:45 UTC 2023 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:45 UTC 2023 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:46 UTC 2023 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:46 UTC 2023 ssl.sh: #1026: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:47 UTC 2023 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:47 UTC 2023 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:47 UTC 2023 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:48 UTC 2023 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:48 UTC 2023 ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:49 UTC 2023 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1033: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:50 UTC 2023 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:50 UTC 2023 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:51 UTC 2023 ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:51 UTC 2023 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:51 UTC 2023 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:52 UTC 2023 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:52 UTC 2023 ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:53 UTC 2023 ssl.sh: #1041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:53 UTC 2023 ssl.sh: #1042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:54 UTC 2023 ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:54 UTC 2023 ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:55 UTC 2023 ssl.sh: #1045: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4139 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4139 found at Wed Oct 18 18:05:55 UTC 2023 ssl.sh: #1046: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4139 at Wed Oct 18 18:05:55 UTC 2023 kill -USR1 4139 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4139 killed at Wed Oct 18 18:05:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:05:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:05:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:55 UTC 2023 selfserv_9355 with PID 5397 started at Wed Oct 18 18:05:55 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:56 UTC 2023 ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:56 UTC 2023 ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:57 UTC 2023 ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:57 UTC 2023 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:58 UTC 2023 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:58 UTC 2023 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:59 UTC 2023 ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:05:59 UTC 2023 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:00 UTC 2023 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:00 UTC 2023 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:01 UTC 2023 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:01 UTC 2023 ssl.sh: #1058: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:02 UTC 2023 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1060: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:03 UTC 2023 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:03 UTC 2023 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:04 UTC 2023 ssl.sh: #1063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:04 UTC 2023 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:04 UTC 2023 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:05 UTC 2023 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:05 UTC 2023 ssl.sh: #1067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:06 UTC 2023 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:06 UTC 2023 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:07 UTC 2023 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:07 UTC 2023 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:08 UTC 2023 ssl.sh: #1072: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:08 UTC 2023 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1074: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:09 UTC 2023 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:10 UTC 2023 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:10 UTC 2023 ssl.sh: #1077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:11 UTC 2023 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:11 UTC 2023 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:12 UTC 2023 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:12 UTC 2023 ssl.sh: #1081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:13 UTC 2023 ssl.sh: #1082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:13 UTC 2023 ssl.sh: #1083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:13 UTC 2023 ssl.sh: #1084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:14 UTC 2023 ssl.sh: #1085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:14 UTC 2023 ssl.sh: #1086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5397 found at Wed Oct 18 18:06:15 UTC 2023 ssl.sh: #1087: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5397 at Wed Oct 18 18:06:15 UTC 2023 kill -USR1 5397 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5397 killed at Wed Oct 18 18:06:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:06:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:06:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:15 UTC 2023 selfserv_9355 with PID 6655 started at Wed Oct 18 18:06:15 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:16 UTC 2023 ssl.sh: #1088: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:16 UTC 2023 ssl.sh: #1089: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:16 UTC 2023 ssl.sh: #1090: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:17 UTC 2023 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:17 UTC 2023 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:17 UTC 2023 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:18 UTC 2023 ssl.sh: #1094: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:18 UTC 2023 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:18 UTC 2023 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:19 UTC 2023 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:19 UTC 2023 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:19 UTC 2023 ssl.sh: #1099: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:20 UTC 2023 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1101: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:21 UTC 2023 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:21 UTC 2023 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:21 UTC 2023 ssl.sh: #1104: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:22 UTC 2023 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:22 UTC 2023 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:22 UTC 2023 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:23 UTC 2023 ssl.sh: #1108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:23 UTC 2023 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:23 UTC 2023 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:24 UTC 2023 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:24 UTC 2023 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:24 UTC 2023 ssl.sh: #1113: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:25 UTC 2023 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1115: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:25 UTC 2023 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:26 UTC 2023 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:26 UTC 2023 ssl.sh: #1118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:26 UTC 2023 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:27 UTC 2023 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:27 UTC 2023 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:27 UTC 2023 ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:28 UTC 2023 ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:28 UTC 2023 ssl.sh: #1124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:28 UTC 2023 ssl.sh: #1125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:29 UTC 2023 ssl.sh: #1126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:29 UTC 2023 ssl.sh: #1127: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6655 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6655 found at Wed Oct 18 18:06:29 UTC 2023 ssl.sh: #1128: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 6655 at Wed Oct 18 18:06:29 UTC 2023 kill -USR1 6655 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6655 killed at Wed Oct 18 18:06:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:06:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:06:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7924 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7924 found at Wed Oct 18 18:06:30 UTC 2023 selfserv_9355 with PID 7924 started at Wed Oct 18 18:06:30 UTC 2023 trying to kill selfserv_9355 with PID 7924 at Wed Oct 18 18:06:30 UTC 2023 kill -USR1 7924 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7924 killed at Wed Oct 18 18:06:30 UTC 2023 selfserv_9355 starting at Wed Oct 18 18:06:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:06:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:30 UTC 2023 selfserv_9355 with PID 7966 started at Wed Oct 18 18:06:30 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:30 UTC 2023 ssl.sh: #1129: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:31 UTC 2023 ssl.sh: #1130: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:31 UTC 2023 ssl.sh: #1131: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:32 UTC 2023 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:32 UTC 2023 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:33 UTC 2023 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:33 UTC 2023 ssl.sh: #1135: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:33 UTC 2023 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:34 UTC 2023 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:34 UTC 2023 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:35 UTC 2023 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:35 UTC 2023 ssl.sh: #1140: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:36 UTC 2023 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1142: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:37 UTC 2023 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:37 UTC 2023 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:37 UTC 2023 ssl.sh: #1145: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:38 UTC 2023 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:38 UTC 2023 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:39 UTC 2023 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:39 UTC 2023 ssl.sh: #1149: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:39 UTC 2023 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:40 UTC 2023 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:40 UTC 2023 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:41 UTC 2023 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:41 UTC 2023 ssl.sh: #1154: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:42 UTC 2023 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:42 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1156: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:43 UTC 2023 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:43 UTC 2023 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:43 UTC 2023 ssl.sh: #1159: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:44 UTC 2023 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:44 UTC 2023 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:45 UTC 2023 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:45 UTC 2023 ssl.sh: #1163: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:46 UTC 2023 ssl.sh: #1164: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:46 UTC 2023 ssl.sh: #1165: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:46 UTC 2023 ssl.sh: #1166: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:47 UTC 2023 ssl.sh: #1167: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:47 UTC 2023 ssl.sh: #1168: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7966 found at Wed Oct 18 18:06:48 UTC 2023 ssl.sh: #1169: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7966 at Wed Oct 18 18:06:48 UTC 2023 kill -USR1 7966 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7966 killed at Wed Oct 18 18:06:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:06:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:06:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:48 UTC 2023 selfserv_9355 with PID 9224 started at Wed Oct 18 18:06:48 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:49 UTC 2023 ssl.sh: #1170: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:49 UTC 2023 ssl.sh: #1171: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:49 UTC 2023 ssl.sh: #1172: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:50 UTC 2023 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:50 UTC 2023 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:51 UTC 2023 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:51 UTC 2023 ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:52 UTC 2023 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:52 UTC 2023 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:53 UTC 2023 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:53 UTC 2023 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:54 UTC 2023 ssl.sh: #1181: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:54 UTC 2023 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:55 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1183: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:55 UTC 2023 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:56 UTC 2023 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:56 UTC 2023 ssl.sh: #1186: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:57 UTC 2023 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:57 UTC 2023 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:58 UTC 2023 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:58 UTC 2023 ssl.sh: #1190: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:59 UTC 2023 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:59 UTC 2023 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:06:59 UTC 2023 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:00 UTC 2023 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:00 UTC 2023 ssl.sh: #1195: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:01 UTC 2023 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1197: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:02 UTC 2023 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:02 UTC 2023 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:03 UTC 2023 ssl.sh: #1200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:03 UTC 2023 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:04 UTC 2023 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:04 UTC 2023 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:05 UTC 2023 ssl.sh: #1204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:05 UTC 2023 ssl.sh: #1205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:06 UTC 2023 ssl.sh: #1206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:06 UTC 2023 ssl.sh: #1207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:07 UTC 2023 ssl.sh: #1208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:07 UTC 2023 ssl.sh: #1209: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9224 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9224 found at Wed Oct 18 18:07:08 UTC 2023 ssl.sh: #1210: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9224 at Wed Oct 18 18:07:08 UTC 2023 kill -USR1 9224 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9224 killed at Wed Oct 18 18:07:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:07:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:07:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:08 UTC 2023 selfserv_9355 with PID 10483 started at Wed Oct 18 18:07:08 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:08 UTC 2023 ssl.sh: #1211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:09 UTC 2023 ssl.sh: #1212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:09 UTC 2023 ssl.sh: #1213: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:09 UTC 2023 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:09 UTC 2023 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:10 UTC 2023 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:10 UTC 2023 ssl.sh: #1217: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:10 UTC 2023 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:11 UTC 2023 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:11 UTC 2023 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:11 UTC 2023 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:12 UTC 2023 ssl.sh: #1222: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:12 UTC 2023 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1224: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:13 UTC 2023 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:13 UTC 2023 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:14 UTC 2023 ssl.sh: #1227: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:14 UTC 2023 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:14 UTC 2023 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:15 UTC 2023 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:15 UTC 2023 ssl.sh: #1231: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:15 UTC 2023 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:16 UTC 2023 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:16 UTC 2023 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:16 UTC 2023 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:17 UTC 2023 ssl.sh: #1236: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:17 UTC 2023 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1238: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:18 UTC 2023 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:18 UTC 2023 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:18 UTC 2023 ssl.sh: #1241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:19 UTC 2023 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:19 UTC 2023 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:19 UTC 2023 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:20 UTC 2023 ssl.sh: #1245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:20 UTC 2023 ssl.sh: #1246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:20 UTC 2023 ssl.sh: #1247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:21 UTC 2023 ssl.sh: #1248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:21 UTC 2023 ssl.sh: #1249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:21 UTC 2023 ssl.sh: #1250: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10483 found at Wed Oct 18 18:07:22 UTC 2023 ssl.sh: #1251: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10483 at Wed Oct 18 18:07:22 UTC 2023 kill -USR1 10483 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10483 killed at Wed Oct 18 18:07:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:07:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:07:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:22 UTC 2023 selfserv_9355 with PID 11750 started at Wed Oct 18 18:07:22 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:22 UTC 2023 ssl.sh: #1252: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:23 UTC 2023 ssl.sh: #1253: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:23 UTC 2023 ssl.sh: #1254: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:24 UTC 2023 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:24 UTC 2023 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:25 UTC 2023 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:25 UTC 2023 ssl.sh: #1258: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:26 UTC 2023 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:26 UTC 2023 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:27 UTC 2023 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:27 UTC 2023 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:27 UTC 2023 ssl.sh: #1263: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:28 UTC 2023 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1265: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:29 UTC 2023 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:29 UTC 2023 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:30 UTC 2023 ssl.sh: #1268: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:30 UTC 2023 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:30 UTC 2023 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:31 UTC 2023 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:31 UTC 2023 ssl.sh: #1272: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:32 UTC 2023 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:32 UTC 2023 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:33 UTC 2023 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:33 UTC 2023 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:34 UTC 2023 ssl.sh: #1277: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:34 UTC 2023 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1279: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:35 UTC 2023 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:35 UTC 2023 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:36 UTC 2023 ssl.sh: #1282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:36 UTC 2023 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:37 UTC 2023 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:37 UTC 2023 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:38 UTC 2023 ssl.sh: #1286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:38 UTC 2023 ssl.sh: #1287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:38 UTC 2023 ssl.sh: #1288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:39 UTC 2023 ssl.sh: #1289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:39 UTC 2023 ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:40 UTC 2023 ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11750 found at Wed Oct 18 18:07:40 UTC 2023 ssl.sh: #1292: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 11750 at Wed Oct 18 18:07:40 UTC 2023 kill -USR1 11750 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11750 killed at Wed Oct 18 18:07:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:07:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:07:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:40 UTC 2023 selfserv_9355 with PID 13011 started at Wed Oct 18 18:07:40 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:41 UTC 2023 ssl.sh: #1293: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:41 UTC 2023 ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:42 UTC 2023 ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:42 UTC 2023 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:43 UTC 2023 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:43 UTC 2023 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:44 UTC 2023 ssl.sh: #1299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:44 UTC 2023 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:45 UTC 2023 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:45 UTC 2023 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:46 UTC 2023 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:46 UTC 2023 ssl.sh: #1304: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:47 UTC 2023 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1306: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:48 UTC 2023 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:48 UTC 2023 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:49 UTC 2023 ssl.sh: #1309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:49 UTC 2023 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:50 UTC 2023 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:50 UTC 2023 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:51 UTC 2023 ssl.sh: #1313: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:51 UTC 2023 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:52 UTC 2023 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:52 UTC 2023 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:53 UTC 2023 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:53 UTC 2023 ssl.sh: #1318: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:54 UTC 2023 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1320: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:55 UTC 2023 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:55 UTC 2023 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:55 UTC 2023 ssl.sh: #1323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:56 UTC 2023 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:56 UTC 2023 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:57 UTC 2023 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:57 UTC 2023 ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:58 UTC 2023 ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:58 UTC 2023 ssl.sh: #1329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:59 UTC 2023 ssl.sh: #1330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:07:59 UTC 2023 ssl.sh: #1331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:08:00 UTC 2023 ssl.sh: #1332: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13011 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13011 found at Wed Oct 18 18:08:00 UTC 2023 ssl.sh: #1333: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13011 at Wed Oct 18 18:08:00 UTC 2023 kill -USR1 13011 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13011 killed at Wed Oct 18 18:08:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:00 UTC 2023 selfserv_9355 with PID 14273 started at Wed Oct 18 18:08:00 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:01 UTC 2023 ssl.sh: #1334: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:01 UTC 2023 ssl.sh: #1335: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:01 UTC 2023 ssl.sh: #1336: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:02 UTC 2023 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:02 UTC 2023 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:03 UTC 2023 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:03 UTC 2023 ssl.sh: #1340: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:03 UTC 2023 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:04 UTC 2023 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:04 UTC 2023 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:04 UTC 2023 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:05 UTC 2023 ssl.sh: #1345: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:05 UTC 2023 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1347: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:06 UTC 2023 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:06 UTC 2023 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:06 UTC 2023 ssl.sh: #1350: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:07 UTC 2023 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:07 UTC 2023 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:07 UTC 2023 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:08 UTC 2023 ssl.sh: #1354: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:08 UTC 2023 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:08 UTC 2023 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:09 UTC 2023 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:09 UTC 2023 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:09 UTC 2023 ssl.sh: #1359: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:10 UTC 2023 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1361: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:11 UTC 2023 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:11 UTC 2023 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:11 UTC 2023 ssl.sh: #1364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:12 UTC 2023 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:12 UTC 2023 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:12 UTC 2023 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:13 UTC 2023 ssl.sh: #1368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:13 UTC 2023 ssl.sh: #1369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:13 UTC 2023 ssl.sh: #1370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:14 UTC 2023 ssl.sh: #1371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:14 UTC 2023 ssl.sh: #1372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:14 UTC 2023 ssl.sh: #1373: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14273 found at Wed Oct 18 18:08:15 UTC 2023 ssl.sh: #1374: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14273 at Wed Oct 18 18:08:15 UTC 2023 kill -USR1 14273 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14273 killed at Wed Oct 18 18:08:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15531 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15531 found at Wed Oct 18 18:08:15 UTC 2023 selfserv_9355 with PID 15531 started at Wed Oct 18 18:08:15 UTC 2023 trying to kill selfserv_9355 with PID 15531 at Wed Oct 18 18:08:15 UTC 2023 kill -USR1 15531 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15531 killed at Wed Oct 18 18:08:15 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:08:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 15576 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 15576 found at Wed Oct 18 18:08:15 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 15576 started at Wed Oct 18 18:08:15 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 15576 at Wed Oct 18 18:08:23 UTC 2023 kill -USR1 15576 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 15576 killed at Wed Oct 18 18:08:23 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:08:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 16135 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16135 found at Wed Oct 18 18:08:23 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 16135 started at Wed Oct 18 18:08:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16135 at Wed Oct 18 18:08:38 UTC 2023 kill -USR1 16135 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16135 killed at Wed Oct 18 18:08:38 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:08:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16934 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 16934 found at Wed Oct 18 18:08:38 UTC 2023 selfserv_9355 with PID 16934 started at Wed Oct 18 18:08:38 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 16934 at Wed Oct 18 18:08:39 UTC 2023 kill -USR1 16934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 16934 killed at Wed Oct 18 18:08:39 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17000 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17000 found at Wed Oct 18 18:08:39 UTC 2023 selfserv_9355 with PID 17000 started at Wed Oct 18 18:08:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17000 at Wed Oct 18 18:08:40 UTC 2023 kill -USR1 17000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17000 killed at Wed Oct 18 18:08:40 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17052 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17052 found at Wed Oct 18 18:08:40 UTC 2023 selfserv_9355 with PID 17052 started at Wed Oct 18 18:08:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17052 at Wed Oct 18 18:08:40 UTC 2023 kill -USR1 17052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17052 killed at Wed Oct 18 18:08:40 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17104 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17104 found at Wed Oct 18 18:08:40 UTC 2023 selfserv_9355 with PID 17104 started at Wed Oct 18 18:08:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1504: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17104 at Wed Oct 18 18:08:41 UTC 2023 kill -USR1 17104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17104 killed at Wed Oct 18 18:08:41 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17156 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17156 found at Wed Oct 18 18:08:41 UTC 2023 selfserv_9355 with PID 17156 started at Wed Oct 18 18:08:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1505: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17156 at Wed Oct 18 18:08:42 UTC 2023 kill -USR1 17156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17156 killed at Wed Oct 18 18:08:42 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17208 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17208 found at Wed Oct 18 18:08:42 UTC 2023 selfserv_9355 with PID 17208 started at Wed Oct 18 18:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1506: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17208 at Wed Oct 18 18:08:42 UTC 2023 kill -USR1 17208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17208 killed at Wed Oct 18 18:08:42 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17260 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17260 found at Wed Oct 18 18:08:42 UTC 2023 selfserv_9355 with PID 17260 started at Wed Oct 18 18:08:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1507: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17260 at Wed Oct 18 18:08:43 UTC 2023 kill -USR1 17260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17260 killed at Wed Oct 18 18:08:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17312 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17312 found at Wed Oct 18 18:08:43 UTC 2023 selfserv_9355 with PID 17312 started at Wed Oct 18 18:08:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17312 at Wed Oct 18 18:08:43 UTC 2023 kill -USR1 17312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17312 killed at Wed Oct 18 18:08:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17364 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17364 found at Wed Oct 18 18:08:44 UTC 2023 selfserv_9355 with PID 17364 started at Wed Oct 18 18:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17364 at Wed Oct 18 18:08:44 UTC 2023 kill -USR1 17364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17364 killed at Wed Oct 18 18:08:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17416 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17416 found at Wed Oct 18 18:08:44 UTC 2023 selfserv_9355 with PID 17416 started at Wed Oct 18 18:08:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1510: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17416 at Wed Oct 18 18:08:45 UTC 2023 kill -USR1 17416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17416 killed at Wed Oct 18 18:08:45 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17468 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17468 found at Wed Oct 18 18:08:45 UTC 2023 selfserv_9355 with PID 17468 started at Wed Oct 18 18:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1511: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17468 at Wed Oct 18 18:08:45 UTC 2023 kill -USR1 17468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17468 killed at Wed Oct 18 18:08:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17520 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17520 found at Wed Oct 18 18:08:45 UTC 2023 selfserv_9355 with PID 17520 started at Wed Oct 18 18:08:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1512: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17520 at Wed Oct 18 18:08:46 UTC 2023 kill -USR1 17520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17520 killed at Wed Oct 18 18:08:46 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17572 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17572 found at Wed Oct 18 18:08:46 UTC 2023 selfserv_9355 with PID 17572 started at Wed Oct 18 18:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17572 at Wed Oct 18 18:08:46 UTC 2023 kill -USR1 17572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17572 killed at Wed Oct 18 18:08:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17624 found at Wed Oct 18 18:08:46 UTC 2023 selfserv_9355 with PID 17624 started at Wed Oct 18 18:08:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17624 at Wed Oct 18 18:08:47 UTC 2023 kill -USR1 17624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17624 killed at Wed Oct 18 18:08:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17676 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17676 found at Wed Oct 18 18:08:47 UTC 2023 selfserv_9355 with PID 17676 started at Wed Oct 18 18:08:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17676 at Wed Oct 18 18:08:48 UTC 2023 kill -USR1 17676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17676 killed at Wed Oct 18 18:08:48 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17728 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17728 found at Wed Oct 18 18:08:48 UTC 2023 selfserv_9355 with PID 17728 started at Wed Oct 18 18:08:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17728 at Wed Oct 18 18:08:49 UTC 2023 kill -USR1 17728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17728 killed at Wed Oct 18 18:08:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17780 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17780 found at Wed Oct 18 18:08:49 UTC 2023 selfserv_9355 with PID 17780 started at Wed Oct 18 18:08:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1517: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17780 at Wed Oct 18 18:08:49 UTC 2023 kill -USR1 17780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17780 killed at Wed Oct 18 18:08:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17832 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17832 found at Wed Oct 18 18:08:50 UTC 2023 selfserv_9355 with PID 17832 started at Wed Oct 18 18:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1518: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 17832 at Wed Oct 18 18:08:50 UTC 2023 kill -USR1 17832 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17832 killed at Wed Oct 18 18:08:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17884 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17884 found at Wed Oct 18 18:08:50 UTC 2023 selfserv_9355 with PID 17884 started at Wed Oct 18 18:08:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17884 at Wed Oct 18 18:08:51 UTC 2023 kill -USR1 17884 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17884 killed at Wed Oct 18 18:08:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17936 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17936 found at Wed Oct 18 18:08:51 UTC 2023 selfserv_9355 with PID 17936 started at Wed Oct 18 18:08:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17936 at Wed Oct 18 18:08:52 UTC 2023 kill -USR1 17936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17936 killed at Wed Oct 18 18:08:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17988 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 17988 found at Wed Oct 18 18:08:52 UTC 2023 selfserv_9355 with PID 17988 started at Wed Oct 18 18:08:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1521: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 17988 at Wed Oct 18 18:08:53 UTC 2023 kill -USR1 17988 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 17988 killed at Wed Oct 18 18:08:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18040 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18040 found at Wed Oct 18 18:08:53 UTC 2023 selfserv_9355 with PID 18040 started at Wed Oct 18 18:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1522: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18040 at Wed Oct 18 18:08:53 UTC 2023 kill -USR1 18040 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18040 killed at Wed Oct 18 18:08:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18092 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18092 found at Wed Oct 18 18:08:54 UTC 2023 selfserv_9355 with PID 18092 started at Wed Oct 18 18:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18092 at Wed Oct 18 18:08:54 UTC 2023 kill -USR1 18092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18092 killed at Wed Oct 18 18:08:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18144 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18144 found at Wed Oct 18 18:08:54 UTC 2023 selfserv_9355 with PID 18144 started at Wed Oct 18 18:08:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18144 at Wed Oct 18 18:08:55 UTC 2023 kill -USR1 18144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18144 killed at Wed Oct 18 18:08:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18196 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18196 found at Wed Oct 18 18:08:55 UTC 2023 selfserv_9355 with PID 18196 started at Wed Oct 18 18:08:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18196 at Wed Oct 18 18:08:56 UTC 2023 kill -USR1 18196 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18196 killed at Wed Oct 18 18:08:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18248 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18248 found at Wed Oct 18 18:08:56 UTC 2023 selfserv_9355 with PID 18248 started at Wed Oct 18 18:08:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18248 at Wed Oct 18 18:08:56 UTC 2023 kill -USR1 18248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18248 killed at Wed Oct 18 18:08:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18300 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18300 found at Wed Oct 18 18:08:57 UTC 2023 selfserv_9355 with PID 18300 started at Wed Oct 18 18:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1527: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18300 at Wed Oct 18 18:08:57 UTC 2023 kill -USR1 18300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18300 killed at Wed Oct 18 18:08:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18352 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18352 found at Wed Oct 18 18:08:57 UTC 2023 selfserv_9355 with PID 18352 started at Wed Oct 18 18:08:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1528: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18352 at Wed Oct 18 18:08:58 UTC 2023 kill -USR1 18352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18352 killed at Wed Oct 18 18:08:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18404 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18404 found at Wed Oct 18 18:08:58 UTC 2023 selfserv_9355 with PID 18404 started at Wed Oct 18 18:08:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1529: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18404 at Wed Oct 18 18:08:58 UTC 2023 kill -USR1 18404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18404 killed at Wed Oct 18 18:08:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:08:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18456 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18456 found at Wed Oct 18 18:08:59 UTC 2023 selfserv_9355 with PID 18456 started at Wed Oct 18 18:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1530: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18456 at Wed Oct 18 18:08:59 UTC 2023 kill -USR1 18456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18456 killed at Wed Oct 18 18:08:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:08:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18508 found at Wed Oct 18 18:08:59 UTC 2023 selfserv_9355 with PID 18508 started at Wed Oct 18 18:08:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18508 at Wed Oct 18 18:08:59 UTC 2023 kill -USR1 18508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18508 killed at Wed Oct 18 18:09:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18561 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18561 found at Wed Oct 18 18:09:00 UTC 2023 selfserv_9355 with PID 18561 started at Wed Oct 18 18:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1532: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18561 at Wed Oct 18 18:09:00 UTC 2023 kill -USR1 18561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18561 killed at Wed Oct 18 18:09:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18614 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18614 found at Wed Oct 18 18:09:00 UTC 2023 selfserv_9355 with PID 18614 started at Wed Oct 18 18:09:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1533: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18614 at Wed Oct 18 18:09:00 UTC 2023 kill -USR1 18614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18614 killed at Wed Oct 18 18:09:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18666 found at Wed Oct 18 18:09:01 UTC 2023 selfserv_9355 with PID 18666 started at Wed Oct 18 18:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1534: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18666 at Wed Oct 18 18:09:01 UTC 2023 kill -USR1 18666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18666 killed at Wed Oct 18 18:09:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18718 found at Wed Oct 18 18:09:01 UTC 2023 selfserv_9355 with PID 18718 started at Wed Oct 18 18:09:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1535: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18718 at Wed Oct 18 18:09:02 UTC 2023 kill -USR1 18718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18718 killed at Wed Oct 18 18:09:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18770 found at Wed Oct 18 18:09:02 UTC 2023 selfserv_9355 with PID 18770 started at Wed Oct 18 18:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1536: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18770 at Wed Oct 18 18:09:02 UTC 2023 kill -USR1 18770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18770 killed at Wed Oct 18 18:09:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18822 found at Wed Oct 18 18:09:03 UTC 2023 selfserv_9355 with PID 18822 started at Wed Oct 18 18:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18822 at Wed Oct 18 18:09:03 UTC 2023 kill -USR1 18822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18822 killed at Wed Oct 18 18:09:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18874 found at Wed Oct 18 18:09:03 UTC 2023 selfserv_9355 with PID 18874 started at Wed Oct 18 18:09:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1538: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18874 at Wed Oct 18 18:09:04 UTC 2023 kill -USR1 18874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18874 killed at Wed Oct 18 18:09:04 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18926 found at Wed Oct 18 18:09:04 UTC 2023 selfserv_9355 with PID 18926 started at Wed Oct 18 18:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1539: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 18926 at Wed Oct 18 18:09:04 UTC 2023 kill -USR1 18926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18926 killed at Wed Oct 18 18:09:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 18978 found at Wed Oct 18 18:09:05 UTC 2023 selfserv_9355 with PID 18978 started at Wed Oct 18 18:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1540: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 18978 at Wed Oct 18 18:09:05 UTC 2023 kill -USR1 18978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 18978 killed at Wed Oct 18 18:09:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19030 found at Wed Oct 18 18:09:05 UTC 2023 selfserv_9355 with PID 19030 started at Wed Oct 18 18:09:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19030 at Wed Oct 18 18:09:05 UTC 2023 kill -USR1 19030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19030 killed at Wed Oct 18 18:09:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19082 found at Wed Oct 18 18:09:06 UTC 2023 selfserv_9355 with PID 19082 started at Wed Oct 18 18:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1542: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19082 at Wed Oct 18 18:09:06 UTC 2023 kill -USR1 19082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19082 killed at Wed Oct 18 18:09:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19134 found at Wed Oct 18 18:09:06 UTC 2023 selfserv_9355 with PID 19134 started at Wed Oct 18 18:09:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19134 at Wed Oct 18 18:09:07 UTC 2023 kill -USR1 19134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19134 killed at Wed Oct 18 18:09:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19186 found at Wed Oct 18 18:09:07 UTC 2023 selfserv_9355 with PID 19186 started at Wed Oct 18 18:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1544: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19186 at Wed Oct 18 18:09:07 UTC 2023 kill -USR1 19186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19186 killed at Wed Oct 18 18:09:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19238 found at Wed Oct 18 18:09:07 UTC 2023 selfserv_9355 with PID 19238 started at Wed Oct 18 18:09:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1545: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19238 at Wed Oct 18 18:09:08 UTC 2023 kill -USR1 19238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19238 killed at Wed Oct 18 18:09:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19291 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19291 found at Wed Oct 18 18:09:08 UTC 2023 selfserv_9355 with PID 19291 started at Wed Oct 18 18:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1546: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19291 at Wed Oct 18 18:09:08 UTC 2023 kill -USR1 19291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19291 killed at Wed Oct 18 18:09:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19344 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19344 found at Wed Oct 18 18:09:09 UTC 2023 selfserv_9355 with PID 19344 started at Wed Oct 18 18:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19344 at Wed Oct 18 18:09:09 UTC 2023 kill -USR1 19344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19344 killed at Wed Oct 18 18:09:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19397 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19397 found at Wed Oct 18 18:09:09 UTC 2023 selfserv_9355 with PID 19397 started at Wed Oct 18 18:09:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1548: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19397 at Wed Oct 18 18:09:10 UTC 2023 kill -USR1 19397 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19397 killed at Wed Oct 18 18:09:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19449 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19449 found at Wed Oct 18 18:09:10 UTC 2023 selfserv_9355 with PID 19449 started at Wed Oct 18 18:09:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19449 at Wed Oct 18 18:09:11 UTC 2023 kill -USR1 19449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19449 killed at Wed Oct 18 18:09:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19501 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19501 found at Wed Oct 18 18:09:11 UTC 2023 selfserv_9355 with PID 19501 started at Wed Oct 18 18:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1550: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19501 at Wed Oct 18 18:09:11 UTC 2023 kill -USR1 19501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19501 killed at Wed Oct 18 18:09:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19553 found at Wed Oct 18 18:09:12 UTC 2023 selfserv_9355 with PID 19553 started at Wed Oct 18 18:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19553 at Wed Oct 18 18:09:12 UTC 2023 kill -USR1 19553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19553 killed at Wed Oct 18 18:09:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19605 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19605 found at Wed Oct 18 18:09:12 UTC 2023 selfserv_9355 with PID 19605 started at Wed Oct 18 18:09:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19605 at Wed Oct 18 18:09:13 UTC 2023 kill -USR1 19605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19605 killed at Wed Oct 18 18:09:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19657 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19657 found at Wed Oct 18 18:09:13 UTC 2023 selfserv_9355 with PID 19657 started at Wed Oct 18 18:09:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19657 at Wed Oct 18 18:09:14 UTC 2023 kill -USR1 19657 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19657 killed at Wed Oct 18 18:09:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19709 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19709 found at Wed Oct 18 18:09:14 UTC 2023 selfserv_9355 with PID 19709 started at Wed Oct 18 18:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1554: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19709 at Wed Oct 18 18:09:14 UTC 2023 kill -USR1 19709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19709 killed at Wed Oct 18 18:09:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19761 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19761 found at Wed Oct 18 18:09:15 UTC 2023 selfserv_9355 with PID 19761 started at Wed Oct 18 18:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19761 at Wed Oct 18 18:09:15 UTC 2023 kill -USR1 19761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19761 killed at Wed Oct 18 18:09:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:09:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19813 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19813 found at Wed Oct 18 18:09:15 UTC 2023 selfserv_9355 with PID 19813 started at Wed Oct 18 18:09:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 19813 at Wed Oct 18 18:09:16 UTC 2023 kill -USR1 19813 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19813 killed at Wed Oct 18 18:09:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19865 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19865 found at Wed Oct 18 18:09:16 UTC 2023 selfserv_9355 with PID 19865 started at Wed Oct 18 18:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19865 at Wed Oct 18 18:09:16 UTC 2023 kill -USR1 19865 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19865 killed at Wed Oct 18 18:09:16 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19917 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19917 found at Wed Oct 18 18:09:16 UTC 2023 selfserv_9355 with PID 19917 started at Wed Oct 18 18:09:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19917 at Wed Oct 18 18:09:17 UTC 2023 kill -USR1 19917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19917 killed at Wed Oct 18 18:09:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:09:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19969 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 19969 found at Wed Oct 18 18:09:17 UTC 2023 selfserv_9355 with PID 19969 started at Wed Oct 18 18:09:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 19969 at Wed Oct 18 18:09:18 UTC 2023 kill -USR1 19969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 19969 killed at Wed Oct 18 18:09:18 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:09:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20027 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20027 found at Wed Oct 18 18:09:18 UTC 2023 selfserv_9355 with PID 20027 started at Wed Oct 18 18:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1560: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20027 at Wed Oct 18 18:09:18 UTC 2023 kill -USR1 20027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20027 killed at Wed Oct 18 18:09:18 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:09:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20085 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20085 found at Wed Oct 18 18:09:18 UTC 2023 selfserv_9355 with PID 20085 started at Wed Oct 18 18:09:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20085 at Wed Oct 18 18:09:19 UTC 2023 kill -USR1 20085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20085 killed at Wed Oct 18 18:09:19 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:09:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20143 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20143 found at Wed Oct 18 18:09:19 UTC 2023 selfserv_9355 with PID 20143 started at Wed Oct 18 18:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1562: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20143 at Wed Oct 18 18:09:19 UTC 2023 kill -USR1 20143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20143 killed at Wed Oct 18 18:09:19 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:09:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20201 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20201 found at Wed Oct 18 18:09:19 UTC 2023 selfserv_9355 with PID 20201 started at Wed Oct 18 18:09:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20201 at Wed Oct 18 18:09:20 UTC 2023 kill -USR1 20201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20201 killed at Wed Oct 18 18:09:20 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 18:09:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20259 found at Wed Oct 18 18:09:20 UTC 2023 selfserv_9355 with PID 20259 started at Wed Oct 18 18:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1564: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20259 at Wed Oct 18 18:09:20 UTC 2023 kill -USR1 20259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20259 killed at Wed Oct 18 18:09:20 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:09:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20321 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20321 found at Wed Oct 18 18:09:20 UTC 2023 selfserv_9355 with PID 20321 started at Wed Oct 18 18:09:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20321 at Wed Oct 18 18:09:21 UTC 2023 kill -USR1 20321 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20321 killed at Wed Oct 18 18:09:21 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20379 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20379 found at Wed Oct 18 18:09:21 UTC 2023 selfserv_9355 with PID 20379 started at Wed Oct 18 18:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1566: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20379 at Wed Oct 18 18:09:21 UTC 2023 kill -USR1 20379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20379 killed at Wed Oct 18 18:09:21 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:09:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20438 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20438 found at Wed Oct 18 18:09:21 UTC 2023 selfserv_9355 with PID 20438 started at Wed Oct 18 18:09:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1567: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20438 at Wed Oct 18 18:09:22 UTC 2023 kill -USR1 20438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20438 killed at Wed Oct 18 18:09:22 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20496 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20496 found at Wed Oct 18 18:09:22 UTC 2023 selfserv_9355 with PID 20496 started at Wed Oct 18 18:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1568: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20496 at Wed Oct 18 18:09:22 UTC 2023 kill -USR1 20496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20496 killed at Wed Oct 18 18:09:22 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20558 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20558 found at Wed Oct 18 18:09:22 UTC 2023 selfserv_9355 with PID 20558 started at Wed Oct 18 18:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1569: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 20558 at Wed Oct 18 18:09:22 UTC 2023 kill -USR1 20558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20558 killed at Wed Oct 18 18:09:22 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 18:09:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20600 found at Wed Oct 18 18:09:23 UTC 2023 selfserv_9355 with PID 20600 started at Wed Oct 18 18:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1502: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20600 at Wed Oct 18 18:09:23 UTC 2023 kill -USR1 20600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20600 killed at Wed Oct 18 18:09:23 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 18:09:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20642 found at Wed Oct 18 18:09:23 UTC 2023 selfserv_9355 with PID 20642 started at Wed Oct 18 18:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1503: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 20642 at Wed Oct 18 18:09:23 UTC 2023 kill -USR1 20642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20642 killed at Wed Oct 18 18:09:23 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 18:09:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20684 found at Wed Oct 18 18:09:23 UTC 2023 selfserv_9355 with PID 20684 started at Wed Oct 18 18:09:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1504: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 20684 at Wed Oct 18 18:09:24 UTC 2023 kill -USR1 20684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20684 killed at Wed Oct 18 18:09:24 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 18:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20726 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20726 found at Wed Oct 18 18:09:24 UTC 2023 selfserv_9355 with PID 20726 started at Wed Oct 18 18:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1505: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 20726 at Wed Oct 18 18:09:24 UTC 2023 kill -USR1 20726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20726 killed at Wed Oct 18 18:09:24 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 18:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20769 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20769 found at Wed Oct 18 18:09:24 UTC 2023 selfserv_9355 with PID 20769 started at Wed Oct 18 18:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1506: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 20769 at Wed Oct 18 18:09:24 UTC 2023 kill -USR1 20769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20769 killed at Wed Oct 18 18:09:24 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 18:09:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20811 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20811 found at Wed Oct 18 18:09:25 UTC 2023 selfserv_9355 with PID 20811 started at Wed Oct 18 18:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1507: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 20811 at Wed Oct 18 18:09:25 UTC 2023 kill -USR1 20811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20811 killed at Wed Oct 18 18:09:25 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 18:09:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20853 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20853 found at Wed Oct 18 18:09:25 UTC 2023 selfserv_9355 with PID 20853 started at Wed Oct 18 18:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1508: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 20853 at Wed Oct 18 18:09:25 UTC 2023 kill -USR1 20853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20853 killed at Wed Oct 18 18:09:25 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 18:09:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:09:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20895 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20895 found at Wed Oct 18 18:09:25 UTC 2023 selfserv_9355 with PID 20895 started at Wed Oct 18 18:09:25 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 18:09:25 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 18:10:49 UTC 2023 ssl.sh: #1509: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 20895 at Wed Oct 18 18:10:49 UTC 2023 kill -USR1 20895 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20895 killed at Wed Oct 18 18:10:50 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20958 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 20958 found at Wed Oct 18 18:10:50 UTC 2023 selfserv_9355 with PID 20958 started at Wed Oct 18 18:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1510: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 20958 at Wed Oct 18 18:10:50 UTC 2023 kill -USR1 20958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 20958 killed at Wed Oct 18 18:10:50 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21000 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21000 found at Wed Oct 18 18:10:50 UTC 2023 selfserv_9355 with PID 21000 started at Wed Oct 18 18:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21000 at Wed Oct 18 18:10:50 UTC 2023 kill -USR1 21000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21000 killed at Wed Oct 18 18:10:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21039 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21039 found at Wed Oct 18 18:10:51 UTC 2023 selfserv_9355 with PID 21039 started at Wed Oct 18 18:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1512: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 21039 at Wed Oct 18 18:10:51 UTC 2023 kill -USR1 21039 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21039 killed at Wed Oct 18 18:10:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21078 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21078 found at Wed Oct 18 18:10:51 UTC 2023 selfserv_9355 with PID 21078 started at Wed Oct 18 18:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21078 at Wed Oct 18 18:10:51 UTC 2023 kill -USR1 21078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21078 killed at Wed Oct 18 18:10:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21117 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21117 found at Wed Oct 18 18:10:51 UTC 2023 selfserv_9355 with PID 21117 started at Wed Oct 18 18:10:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1514: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 21117 at Wed Oct 18 18:10:51 UTC 2023 kill -USR1 21117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21117 killed at Wed Oct 18 18:10:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21156 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21156 found at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 with PID 21156 started at Wed Oct 18 18:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21156 at Wed Oct 18 18:10:52 UTC 2023 kill -USR1 21156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21156 killed at Wed Oct 18 18:10:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21195 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21195 found at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 with PID 21195 started at Wed Oct 18 18:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21195 at Wed Oct 18 18:10:52 UTC 2023 kill -USR1 21195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21195 killed at Wed Oct 18 18:10:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21234 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21234 found at Wed Oct 18 18:10:52 UTC 2023 selfserv_9355 with PID 21234 started at Wed Oct 18 18:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21234 at Wed Oct 18 18:10:53 UTC 2023 kill -USR1 21234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21234 killed at Wed Oct 18 18:10:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21273 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21273 found at Wed Oct 18 18:10:53 UTC 2023 selfserv_9355 with PID 21273 started at Wed Oct 18 18:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21273 at Wed Oct 18 18:10:53 UTC 2023 kill -USR1 21273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21273 killed at Wed Oct 18 18:10:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21312 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21312 found at Wed Oct 18 18:10:53 UTC 2023 selfserv_9355 with PID 21312 started at Wed Oct 18 18:10:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21312 at Wed Oct 18 18:10:53 UTC 2023 kill -USR1 21312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21312 killed at Wed Oct 18 18:10:54 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21351 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21351 found at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 with PID 21351 started at Wed Oct 18 18:10:54 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1520: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21351 at Wed Oct 18 18:10:54 UTC 2023 kill -USR1 21351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21351 killed at Wed Oct 18 18:10:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21391 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21391 found at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 with PID 21391 started at Wed Oct 18 18:10:54 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1521: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21391 at Wed Oct 18 18:10:54 UTC 2023 kill -USR1 21391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21391 killed at Wed Oct 18 18:10:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21431 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21431 found at Wed Oct 18 18:10:54 UTC 2023 selfserv_9355 with PID 21431 started at Wed Oct 18 18:10:54 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1522: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21431 at Wed Oct 18 18:10:55 UTC 2023 kill -USR1 21431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21431 killed at Wed Oct 18 18:10:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21471 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21471 found at Wed Oct 18 18:10:55 UTC 2023 selfserv_9355 with PID 21471 started at Wed Oct 18 18:10:55 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1523: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 21471 at Wed Oct 18 18:10:55 UTC 2023 kill -USR1 21471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21471 killed at Wed Oct 18 18:10:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21511 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21511 found at Wed Oct 18 18:10:55 UTC 2023 selfserv_9355 with PID 21511 started at Wed Oct 18 18:10:55 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1524: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21511 at Wed Oct 18 18:10:55 UTC 2023 kill -USR1 21511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21511 killed at Wed Oct 18 18:10:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21551 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21551 found at Wed Oct 18 18:10:56 UTC 2023 selfserv_9355 with PID 21551 started at Wed Oct 18 18:10:56 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1525: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21551 at Wed Oct 18 18:10:56 UTC 2023 kill -USR1 21551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21551 killed at Wed Oct 18 18:10:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21591 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21591 found at Wed Oct 18 18:10:56 UTC 2023 selfserv_9355 with PID 21591 started at Wed Oct 18 18:10:56 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1526: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21591 at Wed Oct 18 18:10:56 UTC 2023 kill -USR1 21591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21591 killed at Wed Oct 18 18:10:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21631 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21631 found at Wed Oct 18 18:10:56 UTC 2023 selfserv_9355 with PID 21631 started at Wed Oct 18 18:10:56 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1527: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21631 at Wed Oct 18 18:10:57 UTC 2023 kill -USR1 21631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21631 killed at Wed Oct 18 18:10:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:10:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21671 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21671 found at Wed Oct 18 18:10:57 UTC 2023 selfserv_9355 with PID 21671 started at Wed Oct 18 18:10:57 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1528: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 21671 at Wed Oct 18 18:10:57 UTC 2023 kill -USR1 21671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21671 killed at Wed Oct 18 18:10:57 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:10:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:10:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 21711 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 21711 found at Wed Oct 18 18:10:57 UTC 2023 selfserv_9355 with PID 21711 started at Wed Oct 18 18:10:57 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 21711 at Wed Oct 18 18:11:06 UTC 2023 kill -USR1 21711 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 21711 killed at Wed Oct 18 18:11:06 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:11:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 22260 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 22260 found at Wed Oct 18 18:11:06 UTC 2023 selfserv_9355 with PID 22260 started at Wed Oct 18 18:11:06 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1649: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1650: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1651: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1652: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1653: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1654: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1655: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 22260 at Wed Oct 18 18:11:18 UTC 2023 kill -USR1 22260 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 22260 killed at Wed Oct 18 18:11:18 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23071 found at Wed Oct 18 18:11:19 UTC 2023 selfserv_9355 with PID 23071 started at Wed Oct 18 18:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23071 at Wed Oct 18 18:11:19 UTC 2023 kill -USR1 23071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23071 killed at Wed Oct 18 18:11:19 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23123 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23123 found at Wed Oct 18 18:11:19 UTC 2023 selfserv_9355 with PID 23123 started at Wed Oct 18 18:11:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23123 at Wed Oct 18 18:11:19 UTC 2023 kill -USR1 23123 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23123 killed at Wed Oct 18 18:11:19 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23175 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23175 found at Wed Oct 18 18:11:20 UTC 2023 selfserv_9355 with PID 23175 started at Wed Oct 18 18:11:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1658: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23175 at Wed Oct 18 18:11:20 UTC 2023 kill -USR1 23175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23175 killed at Wed Oct 18 18:11:20 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23227 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23227 found at Wed Oct 18 18:11:20 UTC 2023 selfserv_9355 with PID 23227 started at Wed Oct 18 18:11:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1659: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23227 at Wed Oct 18 18:11:20 UTC 2023 kill -USR1 23227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23227 killed at Wed Oct 18 18:11:21 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23283 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23283 found at Wed Oct 18 18:11:21 UTC 2023 selfserv_9355 with PID 23283 started at Wed Oct 18 18:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1660: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23283 at Wed Oct 18 18:11:21 UTC 2023 kill -USR1 23283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23283 killed at Wed Oct 18 18:11:21 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23335 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23335 found at Wed Oct 18 18:11:21 UTC 2023 selfserv_9355 with PID 23335 started at Wed Oct 18 18:11:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23335 at Wed Oct 18 18:11:21 UTC 2023 kill -USR1 23335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23335 killed at Wed Oct 18 18:11:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23388 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23388 found at Wed Oct 18 18:11:22 UTC 2023 selfserv_9355 with PID 23388 started at Wed Oct 18 18:11:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23388 at Wed Oct 18 18:11:22 UTC 2023 kill -USR1 23388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23388 killed at Wed Oct 18 18:11:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23444 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23444 found at Wed Oct 18 18:11:22 UTC 2023 selfserv_9355 with PID 23444 started at Wed Oct 18 18:11:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23444 at Wed Oct 18 18:11:22 UTC 2023 kill -USR1 23444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23444 killed at Wed Oct 18 18:11:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23496 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23496 found at Wed Oct 18 18:11:23 UTC 2023 selfserv_9355 with PID 23496 started at Wed Oct 18 18:11:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1664: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23496 at Wed Oct 18 18:11:23 UTC 2023 kill -USR1 23496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23496 killed at Wed Oct 18 18:11:23 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23548 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23548 found at Wed Oct 18 18:11:23 UTC 2023 selfserv_9355 with PID 23548 started at Wed Oct 18 18:11:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1665: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23548 at Wed Oct 18 18:11:24 UTC 2023 kill -USR1 23548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23548 killed at Wed Oct 18 18:11:24 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23600 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23600 found at Wed Oct 18 18:11:24 UTC 2023 selfserv_9355 with PID 23600 started at Wed Oct 18 18:11:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1666: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23600 at Wed Oct 18 18:11:24 UTC 2023 kill -USR1 23600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23600 killed at Wed Oct 18 18:11:24 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23653 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23653 found at Wed Oct 18 18:11:24 UTC 2023 selfserv_9355 with PID 23653 started at Wed Oct 18 18:11:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23653 at Wed Oct 18 18:11:25 UTC 2023 kill -USR1 23653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23653 killed at Wed Oct 18 18:11:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23705 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23705 found at Wed Oct 18 18:11:25 UTC 2023 selfserv_9355 with PID 23705 started at Wed Oct 18 18:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23705 at Wed Oct 18 18:11:25 UTC 2023 kill -USR1 23705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23705 killed at Wed Oct 18 18:11:25 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23757 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23757 found at Wed Oct 18 18:11:25 UTC 2023 selfserv_9355 with PID 23757 started at Wed Oct 18 18:11:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1669: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23757 at Wed Oct 18 18:11:26 UTC 2023 kill -USR1 23757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23757 killed at Wed Oct 18 18:11:26 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23809 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23809 found at Wed Oct 18 18:11:26 UTC 2023 selfserv_9355 with PID 23809 started at Wed Oct 18 18:11:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1670: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23809 at Wed Oct 18 18:11:26 UTC 2023 kill -USR1 23809 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23809 killed at Wed Oct 18 18:11:26 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23862 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23862 found at Wed Oct 18 18:11:27 UTC 2023 selfserv_9355 with PID 23862 started at Wed Oct 18 18:11:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1671: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23862 at Wed Oct 18 18:11:27 UTC 2023 kill -USR1 23862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23862 killed at Wed Oct 18 18:11:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23914 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23914 found at Wed Oct 18 18:11:27 UTC 2023 selfserv_9355 with PID 23914 started at Wed Oct 18 18:11:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1672: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 23914 at Wed Oct 18 18:11:27 UTC 2023 kill -USR1 23914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23914 killed at Wed Oct 18 18:11:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 23966 found at Wed Oct 18 18:11:28 UTC 2023 selfserv_9355 with PID 23966 started at Wed Oct 18 18:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 23966 at Wed Oct 18 18:11:28 UTC 2023 kill -USR1 23966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 23966 killed at Wed Oct 18 18:11:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24018 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24018 found at Wed Oct 18 18:11:28 UTC 2023 selfserv_9355 with PID 24018 started at Wed Oct 18 18:11:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24018 at Wed Oct 18 18:11:28 UTC 2023 kill -USR1 24018 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24018 killed at Wed Oct 18 18:11:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24070 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24070 found at Wed Oct 18 18:11:29 UTC 2023 selfserv_9355 with PID 24070 started at Wed Oct 18 18:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1675: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24070 at Wed Oct 18 18:11:29 UTC 2023 kill -USR1 24070 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24070 killed at Wed Oct 18 18:11:29 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24122 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24122 found at Wed Oct 18 18:11:29 UTC 2023 selfserv_9355 with PID 24122 started at Wed Oct 18 18:11:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1676: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24122 at Wed Oct 18 18:11:30 UTC 2023 kill -USR1 24122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24122 killed at Wed Oct 18 18:11:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24174 found at Wed Oct 18 18:11:30 UTC 2023 selfserv_9355 with PID 24174 started at Wed Oct 18 18:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24174 at Wed Oct 18 18:11:30 UTC 2023 kill -USR1 24174 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24174 killed at Wed Oct 18 18:11:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24226 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24226 found at Wed Oct 18 18:11:31 UTC 2023 selfserv_9355 with PID 24226 started at Wed Oct 18 18:11:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24226 at Wed Oct 18 18:11:31 UTC 2023 kill -USR1 24226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24226 killed at Wed Oct 18 18:11:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24278 found at Wed Oct 18 18:11:31 UTC 2023 selfserv_9355 with PID 24278 started at Wed Oct 18 18:11:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24278 at Wed Oct 18 18:11:31 UTC 2023 kill -USR1 24278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24278 killed at Wed Oct 18 18:11:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24330 found at Wed Oct 18 18:11:32 UTC 2023 selfserv_9355 with PID 24330 started at Wed Oct 18 18:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24330 at Wed Oct 18 18:11:32 UTC 2023 kill -USR1 24330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24330 killed at Wed Oct 18 18:11:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24382 found at Wed Oct 18 18:11:32 UTC 2023 selfserv_9355 with PID 24382 started at Wed Oct 18 18:11:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1681: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24382 at Wed Oct 18 18:11:33 UTC 2023 kill -USR1 24382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24382 killed at Wed Oct 18 18:11:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24434 found at Wed Oct 18 18:11:33 UTC 2023 selfserv_9355 with PID 24434 started at Wed Oct 18 18:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1682: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24434 at Wed Oct 18 18:11:33 UTC 2023 kill -USR1 24434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24434 killed at Wed Oct 18 18:11:33 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24486 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24486 found at Wed Oct 18 18:11:33 UTC 2023 selfserv_9355 with PID 24486 started at Wed Oct 18 18:11:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24486 at Wed Oct 18 18:11:34 UTC 2023 kill -USR1 24486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24486 killed at Wed Oct 18 18:11:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24538 found at Wed Oct 18 18:11:34 UTC 2023 selfserv_9355 with PID 24538 started at Wed Oct 18 18:11:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1684: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24538 at Wed Oct 18 18:11:34 UTC 2023 kill -USR1 24538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24538 killed at Wed Oct 18 18:11:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24590 found at Wed Oct 18 18:11:35 UTC 2023 selfserv_9355 with PID 24590 started at Wed Oct 18 18:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24590 at Wed Oct 18 18:11:35 UTC 2023 kill -USR1 24590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24590 killed at Wed Oct 18 18:11:35 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24642 found at Wed Oct 18 18:11:35 UTC 2023 selfserv_9355 with PID 24642 started at Wed Oct 18 18:11:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1686: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24642 at Wed Oct 18 18:11:36 UTC 2023 kill -USR1 24642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24642 killed at Wed Oct 18 18:11:36 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24694 found at Wed Oct 18 18:11:36 UTC 2023 selfserv_9355 with PID 24694 started at Wed Oct 18 18:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1687: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24694 at Wed Oct 18 18:11:36 UTC 2023 kill -USR1 24694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24694 killed at Wed Oct 18 18:11:36 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24746 found at Wed Oct 18 18:11:36 UTC 2023 selfserv_9355 with PID 24746 started at Wed Oct 18 18:11:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1688: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24746 at Wed Oct 18 18:11:37 UTC 2023 kill -USR1 24746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24746 killed at Wed Oct 18 18:11:37 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24798 found at Wed Oct 18 18:11:37 UTC 2023 selfserv_9355 with PID 24798 started at Wed Oct 18 18:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1689: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 24798 at Wed Oct 18 18:11:37 UTC 2023 kill -USR1 24798 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24798 killed at Wed Oct 18 18:11:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24850 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24850 found at Wed Oct 18 18:11:37 UTC 2023 selfserv_9355 with PID 24850 started at Wed Oct 18 18:11:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1690: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24850 at Wed Oct 18 18:11:38 UTC 2023 kill -USR1 24850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24850 killed at Wed Oct 18 18:11:38 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24902 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24902 found at Wed Oct 18 18:11:38 UTC 2023 selfserv_9355 with PID 24902 started at Wed Oct 18 18:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24902 at Wed Oct 18 18:11:38 UTC 2023 kill -USR1 24902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24902 killed at Wed Oct 18 18:11:38 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24954 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 24954 found at Wed Oct 18 18:11:38 UTC 2023 selfserv_9355 with PID 24954 started at Wed Oct 18 18:11:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1692: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 24954 at Wed Oct 18 18:11:39 UTC 2023 kill -USR1 24954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 24954 killed at Wed Oct 18 18:11:39 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25006 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25006 found at Wed Oct 18 18:11:39 UTC 2023 selfserv_9355 with PID 25006 started at Wed Oct 18 18:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1693: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25006 at Wed Oct 18 18:11:39 UTC 2023 kill -USR1 25006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25006 killed at Wed Oct 18 18:11:39 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25058 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25058 found at Wed Oct 18 18:11:39 UTC 2023 selfserv_9355 with PID 25058 started at Wed Oct 18 18:11:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1694: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25058 at Wed Oct 18 18:11:40 UTC 2023 kill -USR1 25058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25058 killed at Wed Oct 18 18:11:40 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25110 found at Wed Oct 18 18:11:40 UTC 2023 selfserv_9355 with PID 25110 started at Wed Oct 18 18:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25110 at Wed Oct 18 18:11:40 UTC 2023 kill -USR1 25110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25110 killed at Wed Oct 18 18:11:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25162 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25162 found at Wed Oct 18 18:11:40 UTC 2023 selfserv_9355 with PID 25162 started at Wed Oct 18 18:11:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1696: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25162 at Wed Oct 18 18:11:41 UTC 2023 kill -USR1 25162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25162 killed at Wed Oct 18 18:11:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25214 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25214 found at Wed Oct 18 18:11:41 UTC 2023 selfserv_9355 with PID 25214 started at Wed Oct 18 18:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25214 at Wed Oct 18 18:11:41 UTC 2023 kill -USR1 25214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25214 killed at Wed Oct 18 18:11:41 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25266 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25266 found at Wed Oct 18 18:11:42 UTC 2023 selfserv_9355 with PID 25266 started at Wed Oct 18 18:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1698: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25266 at Wed Oct 18 18:11:42 UTC 2023 kill -USR1 25266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25266 killed at Wed Oct 18 18:11:42 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25318 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25318 found at Wed Oct 18 18:11:42 UTC 2023 selfserv_9355 with PID 25318 started at Wed Oct 18 18:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1699: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25318 at Wed Oct 18 18:11:42 UTC 2023 kill -USR1 25318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25318 killed at Wed Oct 18 18:11:42 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25370 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25370 found at Wed Oct 18 18:11:43 UTC 2023 selfserv_9355 with PID 25370 started at Wed Oct 18 18:11:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1700: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25370 at Wed Oct 18 18:11:43 UTC 2023 kill -USR1 25370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25370 killed at Wed Oct 18 18:11:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25422 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25422 found at Wed Oct 18 18:11:43 UTC 2023 selfserv_9355 with PID 25422 started at Wed Oct 18 18:11:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25422 at Wed Oct 18 18:11:43 UTC 2023 kill -USR1 25422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25422 killed at Wed Oct 18 18:11:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25474 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25474 found at Wed Oct 18 18:11:44 UTC 2023 selfserv_9355 with PID 25474 started at Wed Oct 18 18:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1702: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25474 at Wed Oct 18 18:11:44 UTC 2023 kill -USR1 25474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25474 killed at Wed Oct 18 18:11:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25526 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25526 found at Wed Oct 18 18:11:44 UTC 2023 selfserv_9355 with PID 25526 started at Wed Oct 18 18:11:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25526 at Wed Oct 18 18:11:44 UTC 2023 kill -USR1 25526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25526 killed at Wed Oct 18 18:11:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25578 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25578 found at Wed Oct 18 18:11:45 UTC 2023 selfserv_9355 with PID 25578 started at Wed Oct 18 18:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1704: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25578 at Wed Oct 18 18:11:45 UTC 2023 kill -USR1 25578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25578 killed at Wed Oct 18 18:11:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25630 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25630 found at Wed Oct 18 18:11:45 UTC 2023 selfserv_9355 with PID 25630 started at Wed Oct 18 18:11:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1705: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25630 at Wed Oct 18 18:11:46 UTC 2023 kill -USR1 25630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25630 killed at Wed Oct 18 18:11:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25682 found at Wed Oct 18 18:11:46 UTC 2023 selfserv_9355 with PID 25682 started at Wed Oct 18 18:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1706: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25682 at Wed Oct 18 18:11:46 UTC 2023 kill -USR1 25682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25682 killed at Wed Oct 18 18:11:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25734 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25734 found at Wed Oct 18 18:11:46 UTC 2023 selfserv_9355 with PID 25734 started at Wed Oct 18 18:11:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1707: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25734 at Wed Oct 18 18:11:47 UTC 2023 kill -USR1 25734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25734 killed at Wed Oct 18 18:11:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25786 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25786 found at Wed Oct 18 18:11:47 UTC 2023 selfserv_9355 with PID 25786 started at Wed Oct 18 18:11:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1708: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25786 at Wed Oct 18 18:11:47 UTC 2023 kill -USR1 25786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25786 killed at Wed Oct 18 18:11:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25838 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25838 found at Wed Oct 18 18:11:48 UTC 2023 selfserv_9355 with PID 25838 started at Wed Oct 18 18:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1709: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25838 at Wed Oct 18 18:11:48 UTC 2023 kill -USR1 25838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25838 killed at Wed Oct 18 18:11:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:11:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25890 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25890 found at Wed Oct 18 18:11:48 UTC 2023 selfserv_9355 with PID 25890 started at Wed Oct 18 18:11:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 25890 at Wed Oct 18 18:11:49 UTC 2023 kill -USR1 25890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25890 killed at Wed Oct 18 18:11:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25942 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25942 found at Wed Oct 18 18:11:49 UTC 2023 selfserv_9355 with PID 25942 started at Wed Oct 18 18:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25942 at Wed Oct 18 18:11:49 UTC 2023 kill -USR1 25942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25942 killed at Wed Oct 18 18:11:49 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25994 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 25994 found at Wed Oct 18 18:11:49 UTC 2023 selfserv_9355 with PID 25994 started at Wed Oct 18 18:11:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1712: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 25994 at Wed Oct 18 18:11:50 UTC 2023 kill -USR1 25994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 25994 killed at Wed Oct 18 18:11:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:11:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26046 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26046 found at Wed Oct 18 18:11:50 UTC 2023 selfserv_9355 with PID 26046 started at Wed Oct 18 18:11:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1713: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26046 at Wed Oct 18 18:11:50 UTC 2023 kill -USR1 26046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26046 killed at Wed Oct 18 18:11:50 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26128 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26128 found at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 with PID 26128 started at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26128 at Wed Oct 18 18:11:51 UTC 2023 kill -USR1 26128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26128 killed at Wed Oct 18 18:11:51 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26170 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26170 found at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 with PID 26170 started at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26170 at Wed Oct 18 18:11:51 UTC 2023 kill -USR1 26170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26170 killed at Wed Oct 18 18:11:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26209 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26209 found at Wed Oct 18 18:11:51 UTC 2023 selfserv_9355 with PID 26209 started at Wed Oct 18 18:11:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1658: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26209 at Wed Oct 18 18:11:52 UTC 2023 kill -USR1 26209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26209 killed at Wed Oct 18 18:11:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26249 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26249 found at Wed Oct 18 18:11:52 UTC 2023 selfserv_9355 with PID 26249 started at Wed Oct 18 18:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26249 at Wed Oct 18 18:11:52 UTC 2023 kill -USR1 26249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26249 killed at Wed Oct 18 18:11:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26288 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26288 found at Wed Oct 18 18:11:52 UTC 2023 selfserv_9355 with PID 26288 started at Wed Oct 18 18:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1660: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 26288 at Wed Oct 18 18:11:52 UTC 2023 kill -USR1 26288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26288 killed at Wed Oct 18 18:11:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26327 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26327 found at Wed Oct 18 18:11:53 UTC 2023 selfserv_9355 with PID 26327 started at Wed Oct 18 18:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26327 at Wed Oct 18 18:11:53 UTC 2023 kill -USR1 26327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26327 killed at Wed Oct 18 18:11:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26366 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26366 found at Wed Oct 18 18:11:53 UTC 2023 selfserv_9355 with PID 26366 started at Wed Oct 18 18:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26366 at Wed Oct 18 18:11:53 UTC 2023 kill -USR1 26366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26366 killed at Wed Oct 18 18:11:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26405 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26405 found at Wed Oct 18 18:11:53 UTC 2023 selfserv_9355 with PID 26405 started at Wed Oct 18 18:11:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26405 at Wed Oct 18 18:11:54 UTC 2023 kill -USR1 26405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26405 killed at Wed Oct 18 18:11:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26444 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26444 found at Wed Oct 18 18:11:54 UTC 2023 selfserv_9355 with PID 26444 started at Wed Oct 18 18:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1664: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26444 at Wed Oct 18 18:11:54 UTC 2023 kill -USR1 26444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26444 killed at Wed Oct 18 18:11:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26483 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26483 found at Wed Oct 18 18:11:54 UTC 2023 selfserv_9355 with PID 26483 started at Wed Oct 18 18:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1665: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26483 at Wed Oct 18 18:11:54 UTC 2023 kill -USR1 26483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26483 killed at Wed Oct 18 18:11:54 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26522 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26522 found at Wed Oct 18 18:11:55 UTC 2023 selfserv_9355 with PID 26522 started at Wed Oct 18 18:11:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1666: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26522 at Wed Oct 18 18:11:55 UTC 2023 kill -USR1 26522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26522 killed at Wed Oct 18 18:11:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26562 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26562 found at Wed Oct 18 18:11:55 UTC 2023 selfserv_9355 with PID 26562 started at Wed Oct 18 18:11:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1667: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26562 at Wed Oct 18 18:11:55 UTC 2023 kill -USR1 26562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26562 killed at Wed Oct 18 18:11:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26602 found at Wed Oct 18 18:11:55 UTC 2023 selfserv_9355 with PID 26602 started at Wed Oct 18 18:11:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1668: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26602 at Wed Oct 18 18:11:55 UTC 2023 kill -USR1 26602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26602 killed at Wed Oct 18 18:11:56 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26642 found at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 with PID 26642 started at Wed Oct 18 18:11:56 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1669: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 26642 at Wed Oct 18 18:11:56 UTC 2023 kill -USR1 26642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26642 killed at Wed Oct 18 18:11:56 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26682 found at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 with PID 26682 started at Wed Oct 18 18:11:56 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1670: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26682 at Wed Oct 18 18:11:56 UTC 2023 kill -USR1 26682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26682 killed at Wed Oct 18 18:11:56 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26722 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26722 found at Wed Oct 18 18:11:56 UTC 2023 selfserv_9355 with PID 26722 started at Wed Oct 18 18:11:56 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1671: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26722 at Wed Oct 18 18:11:57 UTC 2023 kill -USR1 26722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26722 killed at Wed Oct 18 18:11:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26762 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26762 found at Wed Oct 18 18:11:57 UTC 2023 selfserv_9355 with PID 26762 started at Wed Oct 18 18:11:57 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1672: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26762 at Wed Oct 18 18:11:57 UTC 2023 kill -USR1 26762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26762 killed at Wed Oct 18 18:11:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26802 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26802 found at Wed Oct 18 18:11:57 UTC 2023 selfserv_9355 with PID 26802 started at Wed Oct 18 18:11:57 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1673: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26802 at Wed Oct 18 18:11:57 UTC 2023 kill -USR1 26802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26802 killed at Wed Oct 18 18:11:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:11:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26842 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26842 found at Wed Oct 18 18:11:58 UTC 2023 selfserv_9355 with PID 26842 started at Wed Oct 18 18:11:58 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1674: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 26842 at Wed Oct 18 18:11:58 UTC 2023 kill -USR1 26842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26842 killed at Wed Oct 18 18:11:58 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -fips true -force FIPS mode enabled. ssl.sh: #1675: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1676: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1677: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1678: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1679: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1680: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:11:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:11:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 26926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 26926 found at Wed Oct 18 18:11:59 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 26926 started at Wed Oct 18 18:11:59 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1681: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1682: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1683: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1684: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1685: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1686: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1687: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1688: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1689: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1690: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 26926 at Wed Oct 18 18:12:07 UTC 2023 kill -USR1 26926 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 26926 killed at Wed Oct 18 18:12:07 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:12:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 27477 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 27477 found at Wed Oct 18 18:12:08 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 27477 started at Wed Oct 18 18:12:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1792: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1793: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1798: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1799: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1804: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1805: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1806: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1807: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 27477 at Wed Oct 18 18:12:23 UTC 2023 kill -USR1 27477 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 27477 killed at Wed Oct 18 18:12:23 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:12:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28285 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28285 found at Wed Oct 18 18:12:23 UTC 2023 selfserv_9355 with PID 28285 started at Wed Oct 18 18:12:23 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1809: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28285 at Wed Oct 18 18:12:23 UTC 2023 kill -USR1 28285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28285 killed at Wed Oct 18 18:12:23 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28351 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28351 found at Wed Oct 18 18:12:23 UTC 2023 selfserv_9355 with PID 28351 started at Wed Oct 18 18:12:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28351 at Wed Oct 18 18:12:24 UTC 2023 kill -USR1 28351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28351 killed at Wed Oct 18 18:12:24 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28403 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28403 found at Wed Oct 18 18:12:24 UTC 2023 selfserv_9355 with PID 28403 started at Wed Oct 18 18:12:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1809: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28403 at Wed Oct 18 18:12:24 UTC 2023 kill -USR1 28403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28403 killed at Wed Oct 18 18:12:25 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28456 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28456 found at Wed Oct 18 18:12:25 UTC 2023 selfserv_9355 with PID 28456 started at Wed Oct 18 18:12:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1810: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28456 at Wed Oct 18 18:12:25 UTC 2023 kill -USR1 28456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28456 killed at Wed Oct 18 18:12:25 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28509 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28509 found at Wed Oct 18 18:12:25 UTC 2023 selfserv_9355 with PID 28509 started at Wed Oct 18 18:12:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1811: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28509 at Wed Oct 18 18:12:26 UTC 2023 kill -USR1 28509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28509 killed at Wed Oct 18 18:12:26 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28561 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28561 found at Wed Oct 18 18:12:26 UTC 2023 selfserv_9355 with PID 28561 started at Wed Oct 18 18:12:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1812: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28561 at Wed Oct 18 18:12:26 UTC 2023 kill -USR1 28561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28561 killed at Wed Oct 18 18:12:26 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28614 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28614 found at Wed Oct 18 18:12:27 UTC 2023 selfserv_9355 with PID 28614 started at Wed Oct 18 18:12:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1813: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28614 at Wed Oct 18 18:12:27 UTC 2023 kill -USR1 28614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28614 killed at Wed Oct 18 18:12:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28666 found at Wed Oct 18 18:12:27 UTC 2023 selfserv_9355 with PID 28666 started at Wed Oct 18 18:12:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28666 at Wed Oct 18 18:12:28 UTC 2023 kill -USR1 28666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28666 killed at Wed Oct 18 18:12:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28718 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28718 found at Wed Oct 18 18:12:28 UTC 2023 selfserv_9355 with PID 28718 started at Wed Oct 18 18:12:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1815: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28718 at Wed Oct 18 18:12:28 UTC 2023 kill -USR1 28718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28718 killed at Wed Oct 18 18:12:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28770 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28770 found at Wed Oct 18 18:12:29 UTC 2023 selfserv_9355 with PID 28770 started at Wed Oct 18 18:12:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1816: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28770 at Wed Oct 18 18:12:29 UTC 2023 kill -USR1 28770 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28770 killed at Wed Oct 18 18:12:29 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28822 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28822 found at Wed Oct 18 18:12:29 UTC 2023 selfserv_9355 with PID 28822 started at Wed Oct 18 18:12:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1817: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28822 at Wed Oct 18 18:12:30 UTC 2023 kill -USR1 28822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28822 killed at Wed Oct 18 18:12:30 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28874 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28874 found at Wed Oct 18 18:12:30 UTC 2023 selfserv_9355 with PID 28874 started at Wed Oct 18 18:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1818: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 28874 at Wed Oct 18 18:12:30 UTC 2023 kill -USR1 28874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28874 killed at Wed Oct 18 18:12:30 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28926 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28926 found at Wed Oct 18 18:12:30 UTC 2023 selfserv_9355 with PID 28926 started at Wed Oct 18 18:12:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28926 at Wed Oct 18 18:12:31 UTC 2023 kill -USR1 28926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28926 killed at Wed Oct 18 18:12:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28978 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 28978 found at Wed Oct 18 18:12:31 UTC 2023 selfserv_9355 with PID 28978 started at Wed Oct 18 18:12:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 28978 at Wed Oct 18 18:12:32 UTC 2023 kill -USR1 28978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 28978 killed at Wed Oct 18 18:12:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29030 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29030 found at Wed Oct 18 18:12:32 UTC 2023 selfserv_9355 with PID 29030 started at Wed Oct 18 18:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29030 at Wed Oct 18 18:12:32 UTC 2023 kill -USR1 29030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29030 killed at Wed Oct 18 18:12:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29082 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29082 found at Wed Oct 18 18:12:33 UTC 2023 selfserv_9355 with PID 29082 started at Wed Oct 18 18:12:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29082 at Wed Oct 18 18:12:33 UTC 2023 kill -USR1 29082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29082 killed at Wed Oct 18 18:12:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29134 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29134 found at Wed Oct 18 18:12:33 UTC 2023 selfserv_9355 with PID 29134 started at Wed Oct 18 18:12:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1823: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29134 at Wed Oct 18 18:12:34 UTC 2023 kill -USR1 29134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29134 killed at Wed Oct 18 18:12:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29186 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29186 found at Wed Oct 18 18:12:34 UTC 2023 selfserv_9355 with PID 29186 started at Wed Oct 18 18:12:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1824: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29186 at Wed Oct 18 18:12:35 UTC 2023 kill -USR1 29186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29186 killed at Wed Oct 18 18:12:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29238 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29238 found at Wed Oct 18 18:12:35 UTC 2023 selfserv_9355 with PID 29238 started at Wed Oct 18 18:12:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29238 at Wed Oct 18 18:12:35 UTC 2023 kill -USR1 29238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29238 killed at Wed Oct 18 18:12:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29290 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29290 found at Wed Oct 18 18:12:36 UTC 2023 selfserv_9355 with PID 29290 started at Wed Oct 18 18:12:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29290 at Wed Oct 18 18:12:36 UTC 2023 kill -USR1 29290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29290 killed at Wed Oct 18 18:12:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29342 found at Wed Oct 18 18:12:37 UTC 2023 selfserv_9355 with PID 29342 started at Wed Oct 18 18:12:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1827: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29342 at Wed Oct 18 18:12:37 UTC 2023 kill -USR1 29342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29342 killed at Wed Oct 18 18:12:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29394 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29394 found at Wed Oct 18 18:12:37 UTC 2023 selfserv_9355 with PID 29394 started at Wed Oct 18 18:12:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1828: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29394 at Wed Oct 18 18:12:38 UTC 2023 kill -USR1 29394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29394 killed at Wed Oct 18 18:12:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29446 found at Wed Oct 18 18:12:38 UTC 2023 selfserv_9355 with PID 29446 started at Wed Oct 18 18:12:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1829: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29446 at Wed Oct 18 18:12:39 UTC 2023 kill -USR1 29446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29446 killed at Wed Oct 18 18:12:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29498 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29498 found at Wed Oct 18 18:12:39 UTC 2023 selfserv_9355 with PID 29498 started at Wed Oct 18 18:12:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1830: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29498 at Wed Oct 18 18:12:39 UTC 2023 kill -USR1 29498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29498 killed at Wed Oct 18 18:12:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29550 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29550 found at Wed Oct 18 18:12:40 UTC 2023 selfserv_9355 with PID 29550 started at Wed Oct 18 18:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29550 at Wed Oct 18 18:12:40 UTC 2023 kill -USR1 29550 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29550 killed at Wed Oct 18 18:12:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29602 found at Wed Oct 18 18:12:40 UTC 2023 selfserv_9355 with PID 29602 started at Wed Oct 18 18:12:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29602 at Wed Oct 18 18:12:41 UTC 2023 kill -USR1 29602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29602 killed at Wed Oct 18 18:12:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29654 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29654 found at Wed Oct 18 18:12:41 UTC 2023 selfserv_9355 with PID 29654 started at Wed Oct 18 18:12:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1833: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29654 at Wed Oct 18 18:12:42 UTC 2023 kill -USR1 29654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29654 killed at Wed Oct 18 18:12:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29706 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29706 found at Wed Oct 18 18:12:42 UTC 2023 selfserv_9355 with PID 29706 started at Wed Oct 18 18:12:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1834: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29706 at Wed Oct 18 18:12:42 UTC 2023 kill -USR1 29706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29706 killed at Wed Oct 18 18:12:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29758 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29758 found at Wed Oct 18 18:12:43 UTC 2023 selfserv_9355 with PID 29758 started at Wed Oct 18 18:12:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1835: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29758 at Wed Oct 18 18:12:43 UTC 2023 kill -USR1 29758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29758 killed at Wed Oct 18 18:12:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29810 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29810 found at Wed Oct 18 18:12:43 UTC 2023 selfserv_9355 with PID 29810 started at Wed Oct 18 18:12:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1836: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 29810 at Wed Oct 18 18:12:44 UTC 2023 kill -USR1 29810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29810 killed at Wed Oct 18 18:12:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29862 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29862 found at Wed Oct 18 18:12:44 UTC 2023 selfserv_9355 with PID 29862 started at Wed Oct 18 18:12:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29862 at Wed Oct 18 18:12:44 UTC 2023 kill -USR1 29862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29862 killed at Wed Oct 18 18:12:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29914 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29914 found at Wed Oct 18 18:12:45 UTC 2023 selfserv_9355 with PID 29914 started at Wed Oct 18 18:12:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29914 at Wed Oct 18 18:12:45 UTC 2023 kill -USR1 29914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29914 killed at Wed Oct 18 18:12:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29966 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 29966 found at Wed Oct 18 18:12:45 UTC 2023 selfserv_9355 with PID 29966 started at Wed Oct 18 18:12:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1839: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 29966 at Wed Oct 18 18:12:46 UTC 2023 kill -USR1 29966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 29966 killed at Wed Oct 18 18:12:46 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30018 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30018 found at Wed Oct 18 18:12:46 UTC 2023 selfserv_9355 with PID 30018 started at Wed Oct 18 18:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1840: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30018 at Wed Oct 18 18:12:46 UTC 2023 kill -USR1 30018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30018 killed at Wed Oct 18 18:12:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30070 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30070 found at Wed Oct 18 18:12:46 UTC 2023 selfserv_9355 with PID 30070 started at Wed Oct 18 18:12:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1841: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30070 at Wed Oct 18 18:12:47 UTC 2023 kill -USR1 30070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30070 killed at Wed Oct 18 18:12:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30122 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30122 found at Wed Oct 18 18:12:47 UTC 2023 selfserv_9355 with PID 30122 started at Wed Oct 18 18:12:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30122 at Wed Oct 18 18:12:47 UTC 2023 kill -USR1 30122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30122 killed at Wed Oct 18 18:12:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30174 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30174 found at Wed Oct 18 18:12:48 UTC 2023 selfserv_9355 with PID 30174 started at Wed Oct 18 18:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30174 at Wed Oct 18 18:12:48 UTC 2023 kill -USR1 30174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30174 killed at Wed Oct 18 18:12:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30226 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30226 found at Wed Oct 18 18:12:48 UTC 2023 selfserv_9355 with PID 30226 started at Wed Oct 18 18:12:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1844: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30226 at Wed Oct 18 18:12:49 UTC 2023 kill -USR1 30226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30226 killed at Wed Oct 18 18:12:49 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30278 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30278 found at Wed Oct 18 18:12:49 UTC 2023 selfserv_9355 with PID 30278 started at Wed Oct 18 18:12:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1845: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30278 at Wed Oct 18 18:12:49 UTC 2023 kill -USR1 30278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30278 killed at Wed Oct 18 18:12:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30330 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30330 found at Wed Oct 18 18:12:50 UTC 2023 selfserv_9355 with PID 30330 started at Wed Oct 18 18:12:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1846: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30330 at Wed Oct 18 18:12:50 UTC 2023 kill -USR1 30330 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30330 killed at Wed Oct 18 18:12:50 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30382 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30382 found at Wed Oct 18 18:12:50 UTC 2023 selfserv_9355 with PID 30382 started at Wed Oct 18 18:12:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30382 at Wed Oct 18 18:12:50 UTC 2023 kill -USR1 30382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30382 killed at Wed Oct 18 18:12:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30434 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30434 found at Wed Oct 18 18:12:51 UTC 2023 selfserv_9355 with PID 30434 started at Wed Oct 18 18:12:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1848: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30434 at Wed Oct 18 18:12:51 UTC 2023 kill -USR1 30434 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30434 killed at Wed Oct 18 18:12:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30486 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30486 found at Wed Oct 18 18:12:51 UTC 2023 selfserv_9355 with PID 30486 started at Wed Oct 18 18:12:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30486 at Wed Oct 18 18:12:52 UTC 2023 kill -USR1 30486 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30486 killed at Wed Oct 18 18:12:52 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30538 found at Wed Oct 18 18:12:52 UTC 2023 selfserv_9355 with PID 30538 started at Wed Oct 18 18:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1850: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30538 at Wed Oct 18 18:12:52 UTC 2023 kill -USR1 30538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30538 killed at Wed Oct 18 18:12:52 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30590 found at Wed Oct 18 18:12:52 UTC 2023 selfserv_9355 with PID 30590 started at Wed Oct 18 18:12:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1851: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30590 at Wed Oct 18 18:12:53 UTC 2023 kill -USR1 30590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30590 killed at Wed Oct 18 18:12:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30642 found at Wed Oct 18 18:12:53 UTC 2023 selfserv_9355 with PID 30642 started at Wed Oct 18 18:12:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1852: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30642 at Wed Oct 18 18:12:54 UTC 2023 kill -USR1 30642 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30642 killed at Wed Oct 18 18:12:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30694 found at Wed Oct 18 18:12:54 UTC 2023 selfserv_9355 with PID 30694 started at Wed Oct 18 18:12:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30694 at Wed Oct 18 18:12:54 UTC 2023 kill -USR1 30694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30694 killed at Wed Oct 18 18:12:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30746 found at Wed Oct 18 18:12:55 UTC 2023 selfserv_9355 with PID 30746 started at Wed Oct 18 18:12:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1854: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30746 at Wed Oct 18 18:12:55 UTC 2023 kill -USR1 30746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30746 killed at Wed Oct 18 18:12:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30798 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30798 found at Wed Oct 18 18:12:55 UTC 2023 selfserv_9355 with PID 30798 started at Wed Oct 18 18:12:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30798 at Wed Oct 18 18:12:56 UTC 2023 kill -USR1 30798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30798 killed at Wed Oct 18 18:12:56 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30850 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30850 found at Wed Oct 18 18:12:56 UTC 2023 selfserv_9355 with PID 30850 started at Wed Oct 18 18:12:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1856: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30850 at Wed Oct 18 18:12:57 UTC 2023 kill -USR1 30850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30850 killed at Wed Oct 18 18:12:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30902 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30902 found at Wed Oct 18 18:12:57 UTC 2023 selfserv_9355 with PID 30902 started at Wed Oct 18 18:12:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 30902 at Wed Oct 18 18:12:57 UTC 2023 kill -USR1 30902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30902 killed at Wed Oct 18 18:12:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30954 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 30954 found at Wed Oct 18 18:12:58 UTC 2023 selfserv_9355 with PID 30954 started at Wed Oct 18 18:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1858: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 30954 at Wed Oct 18 18:12:58 UTC 2023 kill -USR1 30954 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 30954 killed at Wed Oct 18 18:12:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:12:58 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31006 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31006 found at Wed Oct 18 18:12:58 UTC 2023 selfserv_9355 with PID 31006 started at Wed Oct 18 18:12:58 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31006 at Wed Oct 18 18:12:59 UTC 2023 kill -USR1 31006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31006 killed at Wed Oct 18 18:12:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:12:59 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31058 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31058 found at Wed Oct 18 18:12:59 UTC 2023 selfserv_9355 with PID 31058 started at Wed Oct 18 18:12:59 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1860: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31058 at Wed Oct 18 18:12:59 UTC 2023 kill -USR1 31058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31058 killed at Wed Oct 18 18:13:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:13:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31110 found at Wed Oct 18 18:13:00 UTC 2023 selfserv_9355 with PID 31110 started at Wed Oct 18 18:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31110 at Wed Oct 18 18:13:00 UTC 2023 kill -USR1 31110 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31110 killed at Wed Oct 18 18:13:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:13:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31162 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31162 found at Wed Oct 18 18:13:00 UTC 2023 selfserv_9355 with PID 31162 started at Wed Oct 18 18:13:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1862: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31162 at Wed Oct 18 18:13:01 UTC 2023 kill -USR1 31162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31162 killed at Wed Oct 18 18:13:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:13:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31215 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31215 found at Wed Oct 18 18:13:01 UTC 2023 selfserv_9355 with PID 31215 started at Wed Oct 18 18:13:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31215 at Wed Oct 18 18:13:02 UTC 2023 kill -USR1 31215 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31215 killed at Wed Oct 18 18:13:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:13:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31267 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31267 found at Wed Oct 18 18:13:02 UTC 2023 selfserv_9355 with PID 31267 started at Wed Oct 18 18:13:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1864: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31267 at Wed Oct 18 18:13:02 UTC 2023 kill -USR1 31267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31267 killed at Wed Oct 18 18:13:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:13:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31321 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31321 found at Wed Oct 18 18:13:03 UTC 2023 selfserv_9355 with PID 31321 started at Wed Oct 18 18:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1865: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31321 at Wed Oct 18 18:13:03 UTC 2023 kill -USR1 31321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31321 killed at Wed Oct 18 18:13:03 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:13:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31379 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31379 found at Wed Oct 18 18:13:03 UTC 2023 selfserv_9355 with PID 31379 started at Wed Oct 18 18:13:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1866: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31379 at Wed Oct 18 18:13:04 UTC 2023 kill -USR1 31379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31379 killed at Wed Oct 18 18:13:04 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31437 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31437 found at Wed Oct 18 18:13:04 UTC 2023 selfserv_9355 with PID 31437 started at Wed Oct 18 18:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31437 at Wed Oct 18 18:13:04 UTC 2023 kill -USR1 31437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31437 killed at Wed Oct 18 18:13:04 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:13:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31495 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31495 found at Wed Oct 18 18:13:04 UTC 2023 selfserv_9355 with PID 31495 started at Wed Oct 18 18:13:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1868: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31495 at Wed Oct 18 18:13:04 UTC 2023 kill -USR1 31495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31495 killed at Wed Oct 18 18:13:05 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:13:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31553 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31553 found at Wed Oct 18 18:13:05 UTC 2023 selfserv_9355 with PID 31553 started at Wed Oct 18 18:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31553 at Wed Oct 18 18:13:05 UTC 2023 kill -USR1 31553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31553 killed at Wed Oct 18 18:13:05 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 18:13:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31611 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31611 found at Wed Oct 18 18:13:05 UTC 2023 selfserv_9355 with PID 31611 started at Wed Oct 18 18:13:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1870: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31611 at Wed Oct 18 18:13:05 UTC 2023 kill -USR1 31611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31611 killed at Wed Oct 18 18:13:06 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:13:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31669 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31669 found at Wed Oct 18 18:13:06 UTC 2023 selfserv_9355 with PID 31669 started at Wed Oct 18 18:13:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1871: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31669 at Wed Oct 18 18:13:06 UTC 2023 kill -USR1 31669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31669 killed at Wed Oct 18 18:13:06 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:13:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31727 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31727 found at Wed Oct 18 18:13:06 UTC 2023 selfserv_9355 with PID 31727 started at Wed Oct 18 18:13:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1872: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31727 at Wed Oct 18 18:13:06 UTC 2023 kill -USR1 31727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31727 killed at Wed Oct 18 18:13:07 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:13:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31785 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31785 found at Wed Oct 18 18:13:07 UTC 2023 selfserv_9355 with PID 31785 started at Wed Oct 18 18:13:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1873: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31785 at Wed Oct 18 18:13:07 UTC 2023 kill -USR1 31785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31785 killed at Wed Oct 18 18:13:07 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:13:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31843 found at Wed Oct 18 18:13:07 UTC 2023 selfserv_9355 with PID 31843 started at Wed Oct 18 18:13:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1874: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31843 at Wed Oct 18 18:13:07 UTC 2023 kill -USR1 31843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31843 killed at Wed Oct 18 18:13:07 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31901 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31901 found at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 with PID 31901 started at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1875: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 31901 at Wed Oct 18 18:13:08 UTC 2023 kill -USR1 31901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31901 killed at Wed Oct 18 18:13:08 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31943 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31943 found at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 with PID 31943 started at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1808: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 31943 at Wed Oct 18 18:13:08 UTC 2023 kill -USR1 31943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31943 killed at Wed Oct 18 18:13:08 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31986 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 31986 found at Wed Oct 18 18:13:08 UTC 2023 selfserv_9355 with PID 31986 started at Wed Oct 18 18:13:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1809: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 31986 at Wed Oct 18 18:13:09 UTC 2023 kill -USR1 31986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 31986 killed at Wed Oct 18 18:13:09 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 18:13:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32029 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32029 found at Wed Oct 18 18:13:09 UTC 2023 selfserv_9355 with PID 32029 started at Wed Oct 18 18:13:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1810: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 32029 at Wed Oct 18 18:13:09 UTC 2023 kill -USR1 32029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32029 killed at Wed Oct 18 18:13:09 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 18:13:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32071 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32071 found at Wed Oct 18 18:13:09 UTC 2023 selfserv_9355 with PID 32071 started at Wed Oct 18 18:13:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1811: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 32071 at Wed Oct 18 18:13:09 UTC 2023 kill -USR1 32071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32071 killed at Wed Oct 18 18:13:09 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32113 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32113 found at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 with PID 32113 started at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1812: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 32113 at Wed Oct 18 18:13:10 UTC 2023 kill -USR1 32113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32113 killed at Wed Oct 18 18:13:10 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32155 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32155 found at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 with PID 32155 started at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1813: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 32155 at Wed Oct 18 18:13:10 UTC 2023 kill -USR1 32155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32155 killed at Wed Oct 18 18:13:10 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32197 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32197 found at Wed Oct 18 18:13:10 UTC 2023 selfserv_9355 with PID 32197 started at Wed Oct 18 18:13:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1814: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 32197 at Wed Oct 18 18:13:11 UTC 2023 kill -USR1 32197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32197 killed at Wed Oct 18 18:13:11 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 18:13:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:13:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32239 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32239 found at Wed Oct 18 18:13:11 UTC 2023 selfserv_9355 with PID 32239 started at Wed Oct 18 18:13:11 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 18:13:11 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 18:14:35 UTC 2023 ssl.sh: #1815: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 32239 at Wed Oct 18 18:14:35 UTC 2023 kill -USR1 32239 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32239 killed at Wed Oct 18 18:14:35 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:14:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32312 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32312 found at Wed Oct 18 18:14:35 UTC 2023 selfserv_9355 with PID 32312 started at Wed Oct 18 18:14:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1816: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32312 at Wed Oct 18 18:14:36 UTC 2023 kill -USR1 32312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32312 killed at Wed Oct 18 18:14:36 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32354 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32354 found at Wed Oct 18 18:14:36 UTC 2023 selfserv_9355 with PID 32354 started at Wed Oct 18 18:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32354 at Wed Oct 18 18:14:36 UTC 2023 kill -USR1 32354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32354 killed at Wed Oct 18 18:14:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32393 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32393 found at Wed Oct 18 18:14:36 UTC 2023 selfserv_9355 with PID 32393 started at Wed Oct 18 18:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1818: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 32393 at Wed Oct 18 18:14:36 UTC 2023 kill -USR1 32393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32393 killed at Wed Oct 18 18:14:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32432 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32432 found at Wed Oct 18 18:14:37 UTC 2023 selfserv_9355 with PID 32432 started at Wed Oct 18 18:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32432 at Wed Oct 18 18:14:37 UTC 2023 kill -USR1 32432 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32432 killed at Wed Oct 18 18:14:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32471 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32471 found at Wed Oct 18 18:14:37 UTC 2023 selfserv_9355 with PID 32471 started at Wed Oct 18 18:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1820: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 32471 at Wed Oct 18 18:14:37 UTC 2023 kill -USR1 32471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32471 killed at Wed Oct 18 18:14:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32510 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32510 found at Wed Oct 18 18:14:37 UTC 2023 selfserv_9355 with PID 32510 started at Wed Oct 18 18:14:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32510 at Wed Oct 18 18:14:37 UTC 2023 kill -USR1 32510 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32510 killed at Wed Oct 18 18:14:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32549 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32549 found at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 with PID 32549 started at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32549 at Wed Oct 18 18:14:38 UTC 2023 kill -USR1 32549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32549 killed at Wed Oct 18 18:14:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32588 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32588 found at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 with PID 32588 started at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32588 at Wed Oct 18 18:14:38 UTC 2023 kill -USR1 32588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32588 killed at Wed Oct 18 18:14:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32627 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32627 found at Wed Oct 18 18:14:38 UTC 2023 selfserv_9355 with PID 32627 started at Wed Oct 18 18:14:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32627 at Wed Oct 18 18:14:39 UTC 2023 kill -USR1 32627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32627 killed at Wed Oct 18 18:14:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32666 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32666 found at Wed Oct 18 18:14:39 UTC 2023 selfserv_9355 with PID 32666 started at Wed Oct 18 18:14:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32666 at Wed Oct 18 18:14:39 UTC 2023 kill -USR1 32666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32666 killed at Wed Oct 18 18:14:39 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32705 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32705 found at Wed Oct 18 18:14:39 UTC 2023 selfserv_9355 with PID 32705 started at Wed Oct 18 18:14:39 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1826: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 32705 at Wed Oct 18 18:14:39 UTC 2023 kill -USR1 32705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32705 killed at Wed Oct 18 18:14:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32745 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 32745 found at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 with PID 32745 started at Wed Oct 18 18:14:40 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1827: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 32745 at Wed Oct 18 18:14:40 UTC 2023 kill -USR1 32745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 32745 killed at Wed Oct 18 18:14:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 317 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 317 found at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 with PID 317 started at Wed Oct 18 18:14:40 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1828: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 317 at Wed Oct 18 18:14:40 UTC 2023 kill -USR1 317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 317 killed at Wed Oct 18 18:14:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 364 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 364 found at Wed Oct 18 18:14:40 UTC 2023 selfserv_9355 with PID 364 started at Wed Oct 18 18:14:40 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1829: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 364 at Wed Oct 18 18:14:41 UTC 2023 kill -USR1 364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 364 killed at Wed Oct 18 18:14:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 404 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 404 found at Wed Oct 18 18:14:41 UTC 2023 selfserv_9355 with PID 404 started at Wed Oct 18 18:14:41 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1830: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 404 at Wed Oct 18 18:14:41 UTC 2023 kill -USR1 404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 404 killed at Wed Oct 18 18:14:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 446 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 446 found at Wed Oct 18 18:14:41 UTC 2023 selfserv_9355 with PID 446 started at Wed Oct 18 18:14:41 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1831: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 446 at Wed Oct 18 18:14:41 UTC 2023 kill -USR1 446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 446 killed at Wed Oct 18 18:14:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 487 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 487 found at Wed Oct 18 18:14:42 UTC 2023 selfserv_9355 with PID 487 started at Wed Oct 18 18:14:42 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1832: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 487 at Wed Oct 18 18:14:42 UTC 2023 kill -USR1 487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 487 killed at Wed Oct 18 18:14:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 529 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 529 found at Wed Oct 18 18:14:42 UTC 2023 selfserv_9355 with PID 529 started at Wed Oct 18 18:14:42 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1833: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 529 at Wed Oct 18 18:14:42 UTC 2023 kill -USR1 529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 529 killed at Wed Oct 18 18:14:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:14:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 587 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 587 found at Wed Oct 18 18:14:42 UTC 2023 selfserv_9355 with PID 587 started at Wed Oct 18 18:14:42 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1834: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 587 at Wed Oct 18 18:14:43 UTC 2023 kill -USR1 587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 587 killed at Wed Oct 18 18:14:43 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9355 starting at Wed Oct 18 18:14:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 636 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 636 found at Wed Oct 18 18:14:43 UTC 2023 selfserv_9355 with PID 636 started at Wed Oct 18 18:14:43 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1835: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1836: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1837: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1838: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1839: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1840: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1841: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1842: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1843: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1844: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1846: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1847: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1848: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1849: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1850: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1851: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1852: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1853: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1854: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1855: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1856: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1857: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1858: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1859: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1860: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1861: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1862: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1863: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1864: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1865: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1866: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1867: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1868: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1869: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1870: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1871: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1872: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1873: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1874: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1875: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1876: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1877: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1878: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1879: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1880: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1882: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1883: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1884: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1885: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 636 at Wed Oct 18 18:14:52 UTC 2023 kill -USR1 636 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 636 killed at Wed Oct 18 18:14:52 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:14:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:14:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 1207 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 1207 found at Wed Oct 18 18:14:52 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 1207 started at Wed Oct 18 18:14:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1886: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1887: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1888: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1889: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1890: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1891: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1892: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1893: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1894: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1895: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1896: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1897: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1898: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1899: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1900: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1960: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1961: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 1207 at Wed Oct 18 18:15:05 UTC 2023 kill -USR1 1207 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 1207 killed at Wed Oct 18 18:15:05 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2017 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2017 found at Wed Oct 18 18:15:05 UTC 2023 selfserv_9355 with PID 2017 started at Wed Oct 18 18:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2017 at Wed Oct 18 18:15:05 UTC 2023 kill -USR1 2017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2017 killed at Wed Oct 18 18:15:05 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2069 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2069 found at Wed Oct 18 18:15:05 UTC 2023 selfserv_9355 with PID 2069 started at Wed Oct 18 18:15:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2069 at Wed Oct 18 18:15:06 UTC 2023 kill -USR1 2069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2069 killed at Wed Oct 18 18:15:06 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2121 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2121 found at Wed Oct 18 18:15:06 UTC 2023 selfserv_9355 with PID 2121 started at Wed Oct 18 18:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1964: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2121 at Wed Oct 18 18:15:06 UTC 2023 kill -USR1 2121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2121 killed at Wed Oct 18 18:15:06 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2173 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2173 found at Wed Oct 18 18:15:06 UTC 2023 selfserv_9355 with PID 2173 started at Wed Oct 18 18:15:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1965: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2173 at Wed Oct 18 18:15:07 UTC 2023 kill -USR1 2173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2173 killed at Wed Oct 18 18:15:07 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2225 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2225 found at Wed Oct 18 18:15:07 UTC 2023 selfserv_9355 with PID 2225 started at Wed Oct 18 18:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1966: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2225 at Wed Oct 18 18:15:07 UTC 2023 kill -USR1 2225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2225 killed at Wed Oct 18 18:15:07 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2277 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2277 found at Wed Oct 18 18:15:07 UTC 2023 selfserv_9355 with PID 2277 started at Wed Oct 18 18:15:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2277 at Wed Oct 18 18:15:08 UTC 2023 kill -USR1 2277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2277 killed at Wed Oct 18 18:15:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2329 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2329 found at Wed Oct 18 18:15:08 UTC 2023 selfserv_9355 with PID 2329 started at Wed Oct 18 18:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2329 at Wed Oct 18 18:15:08 UTC 2023 kill -USR1 2329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2329 killed at Wed Oct 18 18:15:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:08 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:08 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2381 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2381 found at Wed Oct 18 18:15:09 UTC 2023 selfserv_9355 with PID 2381 started at Wed Oct 18 18:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2381 at Wed Oct 18 18:15:09 UTC 2023 kill -USR1 2381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2381 killed at Wed Oct 18 18:15:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:09 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2433 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2433 found at Wed Oct 18 18:15:09 UTC 2023 selfserv_9355 with PID 2433 started at Wed Oct 18 18:15:09 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1970: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2433 at Wed Oct 18 18:15:09 UTC 2023 kill -USR1 2433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2433 killed at Wed Oct 18 18:15:10 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2485 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2485 found at Wed Oct 18 18:15:10 UTC 2023 selfserv_9355 with PID 2485 started at Wed Oct 18 18:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1971: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2485 at Wed Oct 18 18:15:10 UTC 2023 kill -USR1 2485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2485 killed at Wed Oct 18 18:15:10 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2537 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2537 found at Wed Oct 18 18:15:10 UTC 2023 selfserv_9355 with PID 2537 started at Wed Oct 18 18:15:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1972: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2537 at Wed Oct 18 18:15:11 UTC 2023 kill -USR1 2537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2537 killed at Wed Oct 18 18:15:11 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2589 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2589 found at Wed Oct 18 18:15:11 UTC 2023 selfserv_9355 with PID 2589 started at Wed Oct 18 18:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2589 at Wed Oct 18 18:15:11 UTC 2023 kill -USR1 2589 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2589 killed at Wed Oct 18 18:15:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2641 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2641 found at Wed Oct 18 18:15:11 UTC 2023 selfserv_9355 with PID 2641 started at Wed Oct 18 18:15:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2641 at Wed Oct 18 18:15:12 UTC 2023 kill -USR1 2641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2641 killed at Wed Oct 18 18:15:12 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2693 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2693 found at Wed Oct 18 18:15:12 UTC 2023 selfserv_9355 with PID 2693 started at Wed Oct 18 18:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1975: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2693 at Wed Oct 18 18:15:12 UTC 2023 kill -USR1 2693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2693 killed at Wed Oct 18 18:15:12 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2745 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2745 found at Wed Oct 18 18:15:12 UTC 2023 selfserv_9355 with PID 2745 started at Wed Oct 18 18:15:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1976: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2745 at Wed Oct 18 18:15:13 UTC 2023 kill -USR1 2745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2745 killed at Wed Oct 18 18:15:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2808 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2808 found at Wed Oct 18 18:15:13 UTC 2023 selfserv_9355 with PID 2808 started at Wed Oct 18 18:15:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1977: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2808 at Wed Oct 18 18:15:13 UTC 2023 kill -USR1 2808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2808 killed at Wed Oct 18 18:15:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2867 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2867 found at Wed Oct 18 18:15:14 UTC 2023 selfserv_9355 with PID 2867 started at Wed Oct 18 18:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1978: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 2867 at Wed Oct 18 18:15:14 UTC 2023 kill -USR1 2867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2867 killed at Wed Oct 18 18:15:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2921 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2921 found at Wed Oct 18 18:15:14 UTC 2023 selfserv_9355 with PID 2921 started at Wed Oct 18 18:15:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2921 at Wed Oct 18 18:15:14 UTC 2023 kill -USR1 2921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2921 killed at Wed Oct 18 18:15:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2973 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 2973 found at Wed Oct 18 18:15:15 UTC 2023 selfserv_9355 with PID 2973 started at Wed Oct 18 18:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 2973 at Wed Oct 18 18:15:15 UTC 2023 kill -USR1 2973 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 2973 killed at Wed Oct 18 18:15:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3025 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3025 found at Wed Oct 18 18:15:15 UTC 2023 selfserv_9355 with PID 3025 started at Wed Oct 18 18:15:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1981: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3025 at Wed Oct 18 18:15:16 UTC 2023 kill -USR1 3025 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3025 killed at Wed Oct 18 18:15:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3081 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3081 found at Wed Oct 18 18:15:16 UTC 2023 selfserv_9355 with PID 3081 started at Wed Oct 18 18:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3081 at Wed Oct 18 18:15:16 UTC 2023 kill -USR1 3081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3081 killed at Wed Oct 18 18:15:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:16 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:16 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3165 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3165 found at Wed Oct 18 18:15:17 UTC 2023 selfserv_9355 with PID 3165 started at Wed Oct 18 18:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1983: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3165 at Wed Oct 18 18:15:17 UTC 2023 kill -USR1 3165 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3165 killed at Wed Oct 18 18:15:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3217 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3217 found at Wed Oct 18 18:15:17 UTC 2023 selfserv_9355 with PID 3217 started at Wed Oct 18 18:15:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1984: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3217 at Wed Oct 18 18:15:17 UTC 2023 kill -USR1 3217 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3217 killed at Wed Oct 18 18:15:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3269 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3269 found at Wed Oct 18 18:15:18 UTC 2023 selfserv_9355 with PID 3269 started at Wed Oct 18 18:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3269 at Wed Oct 18 18:15:18 UTC 2023 kill -USR1 3269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3269 killed at Wed Oct 18 18:15:18 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:18 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3321 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3321 found at Wed Oct 18 18:15:18 UTC 2023 selfserv_9355 with PID 3321 started at Wed Oct 18 18:15:18 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3321 at Wed Oct 18 18:15:19 UTC 2023 kill -USR1 3321 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3321 killed at Wed Oct 18 18:15:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3373 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3373 found at Wed Oct 18 18:15:19 UTC 2023 selfserv_9355 with PID 3373 started at Wed Oct 18 18:15:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1987: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3373 at Wed Oct 18 18:15:19 UTC 2023 kill -USR1 3373 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3373 killed at Wed Oct 18 18:15:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3425 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3425 found at Wed Oct 18 18:15:20 UTC 2023 selfserv_9355 with PID 3425 started at Wed Oct 18 18:15:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1988: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3425 at Wed Oct 18 18:15:20 UTC 2023 kill -USR1 3425 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3425 killed at Wed Oct 18 18:15:20 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3477 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3477 found at Wed Oct 18 18:15:20 UTC 2023 selfserv_9355 with PID 3477 started at Wed Oct 18 18:15:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1989: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3477 at Wed Oct 18 18:15:21 UTC 2023 kill -USR1 3477 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3477 killed at Wed Oct 18 18:15:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3533 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3533 found at Wed Oct 18 18:15:21 UTC 2023 selfserv_9355 with PID 3533 started at Wed Oct 18 18:15:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1990: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3533 at Wed Oct 18 18:15:21 UTC 2023 kill -USR1 3533 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3533 killed at Wed Oct 18 18:15:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3590 found at Wed Oct 18 18:15:22 UTC 2023 selfserv_9355 with PID 3590 started at Wed Oct 18 18:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3590 at Wed Oct 18 18:15:22 UTC 2023 kill -USR1 3590 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3590 killed at Wed Oct 18 18:15:22 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3642 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3642 found at Wed Oct 18 18:15:22 UTC 2023 selfserv_9355 with PID 3642 started at Wed Oct 18 18:15:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3642 at Wed Oct 18 18:15:23 UTC 2023 kill -USR1 3642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3642 killed at Wed Oct 18 18:15:23 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3694 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3694 found at Wed Oct 18 18:15:23 UTC 2023 selfserv_9355 with PID 3694 started at Wed Oct 18 18:15:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1993: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3694 at Wed Oct 18 18:15:23 UTC 2023 kill -USR1 3694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3694 killed at Wed Oct 18 18:15:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3746 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3746 found at Wed Oct 18 18:15:23 UTC 2023 selfserv_9355 with PID 3746 started at Wed Oct 18 18:15:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1994: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3746 at Wed Oct 18 18:15:24 UTC 2023 kill -USR1 3746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3746 killed at Wed Oct 18 18:15:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3799 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3799 found at Wed Oct 18 18:15:24 UTC 2023 selfserv_9355 with PID 3799 started at Wed Oct 18 18:15:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1995: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 3799 at Wed Oct 18 18:15:24 UTC 2023 kill -USR1 3799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3799 killed at Wed Oct 18 18:15:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:24 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:24 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3851 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3851 found at Wed Oct 18 18:15:25 UTC 2023 selfserv_9355 with PID 3851 started at Wed Oct 18 18:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3851 at Wed Oct 18 18:15:25 UTC 2023 kill -USR1 3851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3851 killed at Wed Oct 18 18:15:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3903 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3903 found at Wed Oct 18 18:15:25 UTC 2023 selfserv_9355 with PID 3903 started at Wed Oct 18 18:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3903 at Wed Oct 18 18:15:25 UTC 2023 kill -USR1 3903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3903 killed at Wed Oct 18 18:15:25 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3955 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 3955 found at Wed Oct 18 18:15:26 UTC 2023 selfserv_9355 with PID 3955 started at Wed Oct 18 18:15:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1998: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 3955 at Wed Oct 18 18:15:26 UTC 2023 kill -USR1 3955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 3955 killed at Wed Oct 18 18:15:26 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4008 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4008 found at Wed Oct 18 18:15:26 UTC 2023 selfserv_9355 with PID 4008 started at Wed Oct 18 18:15:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1999: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4008 at Wed Oct 18 18:15:26 UTC 2023 kill -USR1 4008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4008 killed at Wed Oct 18 18:15:26 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4060 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4060 found at Wed Oct 18 18:15:27 UTC 2023 selfserv_9355 with PID 4060 started at Wed Oct 18 18:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2000: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4060 at Wed Oct 18 18:15:27 UTC 2023 kill -USR1 4060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4060 killed at Wed Oct 18 18:15:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4112 found at Wed Oct 18 18:15:27 UTC 2023 selfserv_9355 with PID 4112 started at Wed Oct 18 18:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4112 at Wed Oct 18 18:15:27 UTC 2023 kill -USR1 4112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4112 killed at Wed Oct 18 18:15:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4164 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4164 found at Wed Oct 18 18:15:28 UTC 2023 selfserv_9355 with PID 4164 started at Wed Oct 18 18:15:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2002: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4164 at Wed Oct 18 18:15:28 UTC 2023 kill -USR1 4164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4164 killed at Wed Oct 18 18:15:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4216 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4216 found at Wed Oct 18 18:15:28 UTC 2023 selfserv_9355 with PID 4216 started at Wed Oct 18 18:15:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4216 at Wed Oct 18 18:15:28 UTC 2023 kill -USR1 4216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4216 killed at Wed Oct 18 18:15:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4268 found at Wed Oct 18 18:15:29 UTC 2023 selfserv_9355 with PID 4268 started at Wed Oct 18 18:15:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2004: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4268 at Wed Oct 18 18:15:29 UTC 2023 kill -USR1 4268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4268 killed at Wed Oct 18 18:15:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4320 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4320 found at Wed Oct 18 18:15:29 UTC 2023 selfserv_9355 with PID 4320 started at Wed Oct 18 18:15:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2005: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4320 at Wed Oct 18 18:15:30 UTC 2023 kill -USR1 4320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4320 killed at Wed Oct 18 18:15:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4372 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4372 found at Wed Oct 18 18:15:30 UTC 2023 selfserv_9355 with PID 4372 started at Wed Oct 18 18:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2006: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4372 at Wed Oct 18 18:15:30 UTC 2023 kill -USR1 4372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4372 killed at Wed Oct 18 18:15:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4424 found at Wed Oct 18 18:15:30 UTC 2023 selfserv_9355 with PID 4424 started at Wed Oct 18 18:15:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4424 at Wed Oct 18 18:15:31 UTC 2023 kill -USR1 4424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4424 killed at Wed Oct 18 18:15:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4476 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4476 found at Wed Oct 18 18:15:31 UTC 2023 selfserv_9355 with PID 4476 started at Wed Oct 18 18:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2008: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4476 at Wed Oct 18 18:15:31 UTC 2023 kill -USR1 4476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4476 killed at Wed Oct 18 18:15:31 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4528 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4528 found at Wed Oct 18 18:15:31 UTC 2023 selfserv_9355 with PID 4528 started at Wed Oct 18 18:15:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4528 at Wed Oct 18 18:15:32 UTC 2023 kill -USR1 4528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4528 killed at Wed Oct 18 18:15:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4580 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4580 found at Wed Oct 18 18:15:32 UTC 2023 selfserv_9355 with PID 4580 started at Wed Oct 18 18:15:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2010: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4580 at Wed Oct 18 18:15:32 UTC 2023 kill -USR1 4580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4580 killed at Wed Oct 18 18:15:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4632 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4632 found at Wed Oct 18 18:15:33 UTC 2023 selfserv_9355 with PID 4632 started at Wed Oct 18 18:15:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4632 at Wed Oct 18 18:15:33 UTC 2023 kill -USR1 4632 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4632 killed at Wed Oct 18 18:15:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4684 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4684 found at Wed Oct 18 18:15:33 UTC 2023 selfserv_9355 with PID 4684 started at Wed Oct 18 18:15:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2012: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4684 at Wed Oct 18 18:15:33 UTC 2023 kill -USR1 4684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4684 killed at Wed Oct 18 18:15:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4736 found at Wed Oct 18 18:15:34 UTC 2023 selfserv_9355 with PID 4736 started at Wed Oct 18 18:15:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4736 at Wed Oct 18 18:15:34 UTC 2023 kill -USR1 4736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4736 killed at Wed Oct 18 18:15:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4788 found at Wed Oct 18 18:15:34 UTC 2023 selfserv_9355 with PID 4788 started at Wed Oct 18 18:15:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2014: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4788 at Wed Oct 18 18:15:35 UTC 2023 kill -USR1 4788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4788 killed at Wed Oct 18 18:15:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4840 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4840 found at Wed Oct 18 18:15:35 UTC 2023 selfserv_9355 with PID 4840 started at Wed Oct 18 18:15:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4840 at Wed Oct 18 18:15:35 UTC 2023 kill -USR1 4840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4840 killed at Wed Oct 18 18:15:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:15:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4892 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4892 found at Wed Oct 18 18:15:36 UTC 2023 selfserv_9355 with PID 4892 started at Wed Oct 18 18:15:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2016: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 4892 at Wed Oct 18 18:15:36 UTC 2023 kill -USR1 4892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4892 killed at Wed Oct 18 18:15:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4944 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4944 found at Wed Oct 18 18:15:36 UTC 2023 selfserv_9355 with PID 4944 started at Wed Oct 18 18:15:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4944 at Wed Oct 18 18:15:37 UTC 2023 kill -USR1 4944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4944 killed at Wed Oct 18 18:15:37 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4996 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 4996 found at Wed Oct 18 18:15:37 UTC 2023 selfserv_9355 with PID 4996 started at Wed Oct 18 18:15:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2018: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 4996 at Wed Oct 18 18:15:37 UTC 2023 kill -USR1 4996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 4996 killed at Wed Oct 18 18:15:37 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:15:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5048 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5048 found at Wed Oct 18 18:15:38 UTC 2023 selfserv_9355 with PID 5048 started at Wed Oct 18 18:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2019: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5048 at Wed Oct 18 18:15:38 UTC 2023 kill -USR1 5048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5048 killed at Wed Oct 18 18:15:38 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:15:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5130 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5130 found at Wed Oct 18 18:15:38 UTC 2023 selfserv_9355 with PID 5130 started at Wed Oct 18 18:15:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5130 at Wed Oct 18 18:15:38 UTC 2023 kill -USR1 5130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5130 killed at Wed Oct 18 18:15:39 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5172 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5172 found at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 with PID 5172 started at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5172 at Wed Oct 18 18:15:39 UTC 2023 kill -USR1 5172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5172 killed at Wed Oct 18 18:15:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5211 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5211 found at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 with PID 5211 started at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1964: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 5211 at Wed Oct 18 18:15:39 UTC 2023 kill -USR1 5211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5211 killed at Wed Oct 18 18:15:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5250 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5250 found at Wed Oct 18 18:15:39 UTC 2023 selfserv_9355 with PID 5250 started at Wed Oct 18 18:15:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5250 at Wed Oct 18 18:15:40 UTC 2023 kill -USR1 5250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5250 killed at Wed Oct 18 18:15:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5289 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5289 found at Wed Oct 18 18:15:40 UTC 2023 selfserv_9355 with PID 5289 started at Wed Oct 18 18:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1966: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 5289 at Wed Oct 18 18:15:40 UTC 2023 kill -USR1 5289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5289 killed at Wed Oct 18 18:15:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5328 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5328 found at Wed Oct 18 18:15:40 UTC 2023 selfserv_9355 with PID 5328 started at Wed Oct 18 18:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5328 at Wed Oct 18 18:15:40 UTC 2023 kill -USR1 5328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5328 killed at Wed Oct 18 18:15:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5367 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5367 found at Wed Oct 18 18:15:41 UTC 2023 selfserv_9355 with PID 5367 started at Wed Oct 18 18:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5367 at Wed Oct 18 18:15:41 UTC 2023 kill -USR1 5367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5367 killed at Wed Oct 18 18:15:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5406 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5406 found at Wed Oct 18 18:15:41 UTC 2023 selfserv_9355 with PID 5406 started at Wed Oct 18 18:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5406 at Wed Oct 18 18:15:41 UTC 2023 kill -USR1 5406 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5406 killed at Wed Oct 18 18:15:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5445 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5445 found at Wed Oct 18 18:15:41 UTC 2023 selfserv_9355 with PID 5445 started at Wed Oct 18 18:15:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1970: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5445 at Wed Oct 18 18:15:42 UTC 2023 kill -USR1 5445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5445 killed at Wed Oct 18 18:15:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5484 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5484 found at Wed Oct 18 18:15:42 UTC 2023 selfserv_9355 with PID 5484 started at Wed Oct 18 18:15:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1971: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5484 at Wed Oct 18 18:15:42 UTC 2023 kill -USR1 5484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5484 killed at Wed Oct 18 18:15:42 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5523 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5523 found at Wed Oct 18 18:15:42 UTC 2023 selfserv_9355 with PID 5523 started at Wed Oct 18 18:15:42 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1972: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5523 at Wed Oct 18 18:15:42 UTC 2023 kill -USR1 5523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5523 killed at Wed Oct 18 18:15:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:42 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:42 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5563 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5563 found at Wed Oct 18 18:15:43 UTC 2023 selfserv_9355 with PID 5563 started at Wed Oct 18 18:15:43 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1973: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5563 at Wed Oct 18 18:15:43 UTC 2023 kill -USR1 5563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5563 killed at Wed Oct 18 18:15:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5603 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5603 found at Wed Oct 18 18:15:43 UTC 2023 selfserv_9355 with PID 5603 started at Wed Oct 18 18:15:43 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1974: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5603 at Wed Oct 18 18:15:43 UTC 2023 kill -USR1 5603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5603 killed at Wed Oct 18 18:15:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:43 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:43 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5643 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5643 found at Wed Oct 18 18:15:43 UTC 2023 selfserv_9355 with PID 5643 started at Wed Oct 18 18:15:43 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1975: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 5643 at Wed Oct 18 18:15:43 UTC 2023 kill -USR1 5643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5643 killed at Wed Oct 18 18:15:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5683 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5683 found at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 with PID 5683 started at Wed Oct 18 18:15:44 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1976: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5683 at Wed Oct 18 18:15:44 UTC 2023 kill -USR1 5683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5683 killed at Wed Oct 18 18:15:44 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5723 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5723 found at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 with PID 5723 started at Wed Oct 18 18:15:44 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1977: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5723 at Wed Oct 18 18:15:44 UTC 2023 kill -USR1 5723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5723 killed at Wed Oct 18 18:15:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:44 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5763 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5763 found at Wed Oct 18 18:15:44 UTC 2023 selfserv_9355 with PID 5763 started at Wed Oct 18 18:15:44 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1978: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5763 at Wed Oct 18 18:15:45 UTC 2023 kill -USR1 5763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5763 killed at Wed Oct 18 18:15:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5803 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5803 found at Wed Oct 18 18:15:45 UTC 2023 selfserv_9355 with PID 5803 started at Wed Oct 18 18:15:45 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1979: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5803 at Wed Oct 18 18:15:45 UTC 2023 kill -USR1 5803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5803 killed at Wed Oct 18 18:15:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:15:45 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:45 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5843 found at Wed Oct 18 18:15:45 UTC 2023 selfserv_9355 with PID 5843 started at Wed Oct 18 18:15:45 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1980: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 5843 at Wed Oct 18 18:15:45 UTC 2023 kill -USR1 5843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5843 killed at Wed Oct 18 18:15:46 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -fips false -force FIPS mode disabled. ssl.sh: #1981: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1982: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1983: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1984: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1985: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1986: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -fips true -force FIPS mode enabled. ssl.sh: #1987: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #1988: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1989: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1990: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #1991: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1992: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 18:15:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 5965 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 5965 found at Wed Oct 18 18:15:47 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 5965 started at Wed Oct 18 18:15:47 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1993: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1994: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1995: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1996: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1997: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1998: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1999: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2000: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2001: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2002: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2030: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2031: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2036: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2037: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2042: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2043: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 5965 at Wed Oct 18 18:15:55 UTC 2023 kill -USR1 5965 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 5965 killed at Wed Oct 18 18:15:56 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:15:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 6514 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 6514 found at Wed Oct 18 18:15:56 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 6514 started at Wed Oct 18 18:15:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2048: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2049: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2054: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2055: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2059: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2063: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2067: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2071: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2075: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2077: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2078: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2079: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2080: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2081: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2082: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2083: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2084: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2085: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2086: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2087: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2088: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2089: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2090: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2091: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2092: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2093: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2094: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2095: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2096: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2097: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2098: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2099: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2100: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2101: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2102: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2105: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2106: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2107: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2108: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2109: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2110: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2111: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2112: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2113: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2114: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2115: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2116: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2117: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2118: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2119: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 6514 at Wed Oct 18 18:16:11 UTC 2023 kill -USR1 6514 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 6514 killed at Wed Oct 18 18:16:11 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 18:16:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7311 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7311 found at Wed Oct 18 18:16:11 UTC 2023 selfserv_9355 with PID 7311 started at Wed Oct 18 18:16:11 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2120: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2121: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7311 at Wed Oct 18 18:16:11 UTC 2023 kill -USR1 7311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7311 killed at Wed Oct 18 18:16:11 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:16:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7389 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7389 found at Wed Oct 18 18:16:12 UTC 2023 selfserv_9355 with PID 7389 started at Wed Oct 18 18:16:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2120: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7389 at Wed Oct 18 18:16:12 UTC 2023 kill -USR1 7389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7389 killed at Wed Oct 18 18:16:12 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:16:12 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7441 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7441 found at Wed Oct 18 18:16:12 UTC 2023 selfserv_9355 with PID 7441 started at Wed Oct 18 18:16:12 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2121: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7441 at Wed Oct 18 18:16:36 UTC 2023 kill -USR1 7441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7441 killed at Wed Oct 18 18:16:36 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:16:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7504 found at Wed Oct 18 18:16:37 UTC 2023 selfserv_9355 with PID 7504 started at Wed Oct 18 18:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2122: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7504 at Wed Oct 18 18:16:37 UTC 2023 kill -USR1 7504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7504 killed at Wed Oct 18 18:16:37 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:16:37 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7568 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7568 found at Wed Oct 18 18:16:37 UTC 2023 selfserv_9355 with PID 7568 started at Wed Oct 18 18:16:37 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2123: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7568 at Wed Oct 18 18:16:38 UTC 2023 kill -USR1 7568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7568 killed at Wed Oct 18 18:16:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:16:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7620 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7620 found at Wed Oct 18 18:16:38 UTC 2023 selfserv_9355 with PID 7620 started at Wed Oct 18 18:16:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2124: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7620 at Wed Oct 18 18:17:01 UTC 2023 kill -USR1 7620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7620 killed at Wed Oct 18 18:17:01 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7672 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7672 found at Wed Oct 18 18:17:02 UTC 2023 selfserv_9355 with PID 7672 started at Wed Oct 18 18:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2125: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7672 at Wed Oct 18 18:17:02 UTC 2023 kill -USR1 7672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7672 killed at Wed Oct 18 18:17:02 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7736 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7736 found at Wed Oct 18 18:17:02 UTC 2023 selfserv_9355 with PID 7736 started at Wed Oct 18 18:17:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2126: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7736 at Wed Oct 18 18:17:03 UTC 2023 kill -USR1 7736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7736 killed at Wed Oct 18 18:17:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:17:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7788 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7788 found at Wed Oct 18 18:17:03 UTC 2023 selfserv_9355 with PID 7788 started at Wed Oct 18 18:17:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2127: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7788 at Wed Oct 18 18:17:27 UTC 2023 kill -USR1 7788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7788 killed at Wed Oct 18 18:17:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7851 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7851 found at Wed Oct 18 18:17:28 UTC 2023 selfserv_9355 with PID 7851 started at Wed Oct 18 18:17:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2128: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 7851 at Wed Oct 18 18:17:28 UTC 2023 kill -USR1 7851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7851 killed at Wed Oct 18 18:17:28 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7915 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7915 found at Wed Oct 18 18:17:28 UTC 2023 selfserv_9355 with PID 7915 started at Wed Oct 18 18:17:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2129: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7915 at Wed Oct 18 18:17:29 UTC 2023 kill -USR1 7915 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7915 killed at Wed Oct 18 18:17:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:17:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7967 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 7967 found at Wed Oct 18 18:17:29 UTC 2023 selfserv_9355 with PID 7967 started at Wed Oct 18 18:17:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 7967 at Wed Oct 18 18:17:54 UTC 2023 kill -USR1 7967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 7967 killed at Wed Oct 18 18:17:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8019 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8019 found at Wed Oct 18 18:17:54 UTC 2023 selfserv_9355 with PID 8019 started at Wed Oct 18 18:17:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8019 at Wed Oct 18 18:17:54 UTC 2023 kill -USR1 8019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8019 killed at Wed Oct 18 18:17:54 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:17:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8083 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8083 found at Wed Oct 18 18:17:55 UTC 2023 selfserv_9355 with PID 8083 started at Wed Oct 18 18:17:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2132: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8083 at Wed Oct 18 18:17:55 UTC 2023 kill -USR1 8083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8083 killed at Wed Oct 18 18:17:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:17:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:17:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8135 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8135 found at Wed Oct 18 18:17:55 UTC 2023 selfserv_9355 with PID 8135 started at Wed Oct 18 18:17:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2133: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8135 at Wed Oct 18 18:18:19 UTC 2023 kill -USR1 8135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8135 killed at Wed Oct 18 18:18:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:18:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8187 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8187 found at Wed Oct 18 18:18:19 UTC 2023 selfserv_9355 with PID 8187 started at Wed Oct 18 18:18:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8187 at Wed Oct 18 18:18:19 UTC 2023 kill -USR1 8187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8187 killed at Wed Oct 18 18:18:19 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:18:19 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:19 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8243 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8243 found at Wed Oct 18 18:18:20 UTC 2023 selfserv_9355 with PID 8243 started at Wed Oct 18 18:18:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8243 at Wed Oct 18 18:18:20 UTC 2023 kill -USR1 8243 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8243 killed at Wed Oct 18 18:18:20 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:18:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8303 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8303 found at Wed Oct 18 18:18:20 UTC 2023 selfserv_9355 with PID 8303 started at Wed Oct 18 18:18:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2136: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8303 at Wed Oct 18 18:18:21 UTC 2023 kill -USR1 8303 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8303 killed at Wed Oct 18 18:18:21 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:18:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8359 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8359 found at Wed Oct 18 18:18:21 UTC 2023 selfserv_9355 with PID 8359 started at Wed Oct 18 18:18:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8359 at Wed Oct 18 18:18:21 UTC 2023 kill -USR1 8359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8359 killed at Wed Oct 18 18:18:21 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:18:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8419 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8419 found at Wed Oct 18 18:18:21 UTC 2023 selfserv_9355 with PID 8419 started at Wed Oct 18 18:18:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2138: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8419 at Wed Oct 18 18:18:46 UTC 2023 kill -USR1 8419 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8419 killed at Wed Oct 18 18:18:46 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:18:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8478 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8478 found at Wed Oct 18 18:18:46 UTC 2023 selfserv_9355 with PID 8478 started at Wed Oct 18 18:18:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2139: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8478 at Wed Oct 18 18:18:46 UTC 2023 kill -USR1 8478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8478 killed at Wed Oct 18 18:18:46 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:18:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:18:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8538 found at Wed Oct 18 18:18:47 UTC 2023 selfserv_9355 with PID 8538 started at Wed Oct 18 18:18:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2140: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8538 at Wed Oct 18 18:19:10 UTC 2023 kill -USR1 8538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8538 killed at Wed Oct 18 18:19:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:19:10 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:19:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8590 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8590 found at Wed Oct 18 18:19:10 UTC 2023 selfserv_9355 with PID 8590 started at Wed Oct 18 18:19:10 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8590 at Wed Oct 18 18:19:10 UTC 2023 kill -USR1 8590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8590 killed at Wed Oct 18 18:19:11 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:19:11 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:19:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8650 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8650 found at Wed Oct 18 18:19:11 UTC 2023 selfserv_9355 with PID 8650 started at Wed Oct 18 18:19:11 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8650 at Wed Oct 18 18:19:35 UTC 2023 kill -USR1 8650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8650 killed at Wed Oct 18 18:19:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:19:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:19:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8713 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8713 found at Wed Oct 18 18:19:35 UTC 2023 selfserv_9355 with PID 8713 started at Wed Oct 18 18:19:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8713 at Wed Oct 18 18:19:36 UTC 2023 kill -USR1 8713 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8713 killed at Wed Oct 18 18:19:36 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:19:36 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:19:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8773 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8773 found at Wed Oct 18 18:19:36 UTC 2023 selfserv_9355 with PID 8773 started at Wed Oct 18 18:19:36 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2144: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8773 at Wed Oct 18 18:20:00 UTC 2023 kill -USR1 8773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8773 killed at Wed Oct 18 18:20:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:20:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8825 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8825 found at Wed Oct 18 18:20:00 UTC 2023 selfserv_9355 with PID 8825 started at Wed Oct 18 18:20:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8825 at Wed Oct 18 18:20:01 UTC 2023 kill -USR1 8825 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8825 killed at Wed Oct 18 18:20:01 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:20:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8885 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8885 found at Wed Oct 18 18:20:01 UTC 2023 selfserv_9355 with PID 8885 started at Wed Oct 18 18:20:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2146: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 8885 at Wed Oct 18 18:20:25 UTC 2023 kill -USR1 8885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8885 killed at Wed Oct 18 18:20:25 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:20:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8947 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8947 found at Wed Oct 18 18:20:25 UTC 2023 selfserv_9355 with PID 8947 started at Wed Oct 18 18:20:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8947 at Wed Oct 18 18:20:25 UTC 2023 kill -USR1 8947 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8947 killed at Wed Oct 18 18:20:25 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:20:25 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:25 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8999 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 8999 found at Wed Oct 18 18:20:26 UTC 2023 selfserv_9355 with PID 8999 started at Wed Oct 18 18:20:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2148: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 8999 at Wed Oct 18 18:20:26 UTC 2023 kill -USR1 8999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 8999 killed at Wed Oct 18 18:20:26 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:20:26 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9052 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9052 found at Wed Oct 18 18:20:26 UTC 2023 selfserv_9355 with PID 9052 started at Wed Oct 18 18:20:26 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2149: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9052 at Wed Oct 18 18:20:27 UTC 2023 kill -USR1 9052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9052 killed at Wed Oct 18 18:20:27 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:20:27 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9110 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9110 found at Wed Oct 18 18:20:27 UTC 2023 selfserv_9355 with PID 9110 started at Wed Oct 18 18:20:27 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2150: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9110 at Wed Oct 18 18:20:27 UTC 2023 kill -USR1 9110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9110 killed at Wed Oct 18 18:20:27 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:20:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9168 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9168 found at Wed Oct 18 18:20:28 UTC 2023 selfserv_9355 with PID 9168 started at Wed Oct 18 18:20:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2151: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9168 at Wed Oct 18 18:20:28 UTC 2023 kill -USR1 9168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9168 killed at Wed Oct 18 18:20:28 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:20:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9226 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9226 found at Wed Oct 18 18:20:28 UTC 2023 selfserv_9355 with PID 9226 started at Wed Oct 18 18:20:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2152: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9226 at Wed Oct 18 18:20:28 UTC 2023 kill -USR1 9226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9226 killed at Wed Oct 18 18:20:28 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:20:28 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:28 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9284 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9284 found at Wed Oct 18 18:20:29 UTC 2023 selfserv_9355 with PID 9284 started at Wed Oct 18 18:20:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2153: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9284 at Wed Oct 18 18:20:29 UTC 2023 kill -USR1 9284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9284 killed at Wed Oct 18 18:20:29 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9355 starting at Wed Oct 18 18:20:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9342 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9342 found at Wed Oct 18 18:20:29 UTC 2023 selfserv_9355 with PID 9342 started at Wed Oct 18 18:20:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2154: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9342 at Wed Oct 18 18:20:29 UTC 2023 kill -USR1 9342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9342 killed at Wed Oct 18 18:20:29 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9355 starting at Wed Oct 18 18:20:29 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:29 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9400 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9400 found at Wed Oct 18 18:20:30 UTC 2023 selfserv_9355 with PID 9400 started at Wed Oct 18 18:20:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2155: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9400 at Wed Oct 18 18:20:30 UTC 2023 kill -USR1 9400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9400 killed at Wed Oct 18 18:20:30 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9355 starting at Wed Oct 18 18:20:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9458 found at Wed Oct 18 18:20:30 UTC 2023 selfserv_9355 with PID 9458 started at Wed Oct 18 18:20:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2156: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9458 at Wed Oct 18 18:20:30 UTC 2023 kill -USR1 9458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9458 killed at Wed Oct 18 18:20:30 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:20:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9516 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9516 found at Wed Oct 18 18:20:31 UTC 2023 selfserv_9355 with PID 9516 started at Wed Oct 18 18:20:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2157: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9516 at Wed Oct 18 18:20:31 UTC 2023 kill -USR1 9516 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9516 killed at Wed Oct 18 18:20:31 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9355 starting at Wed Oct 18 18:20:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9574 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9574 found at Wed Oct 18 18:20:31 UTC 2023 selfserv_9355 with PID 9574 started at Wed Oct 18 18:20:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2158: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9574 at Wed Oct 18 18:20:31 UTC 2023 kill -USR1 9574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9574 killed at Wed Oct 18 18:20:31 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9355 starting at Wed Oct 18 18:20:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9633 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9633 found at Wed Oct 18 18:20:32 UTC 2023 selfserv_9355 with PID 9633 started at Wed Oct 18 18:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2159: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 9633 at Wed Oct 18 18:20:32 UTC 2023 kill -USR1 9633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9633 killed at Wed Oct 18 18:20:32 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9355 starting at Wed Oct 18 18:20:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9675 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9675 found at Wed Oct 18 18:20:32 UTC 2023 selfserv_9355 with PID 9675 started at Wed Oct 18 18:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2120: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 9675 at Wed Oct 18 18:20:32 UTC 2023 kill -USR1 9675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9675 killed at Wed Oct 18 18:20:32 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9355 starting at Wed Oct 18 18:20:32 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9717 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9717 found at Wed Oct 18 18:20:32 UTC 2023 selfserv_9355 with PID 9717 started at Wed Oct 18 18:20:32 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2121: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9355 with PID 9717 at Wed Oct 18 18:20:32 UTC 2023 kill -USR1 9717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9717 killed at Wed Oct 18 18:20:33 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9355 starting at Wed Oct 18 18:20:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9759 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9759 found at Wed Oct 18 18:20:33 UTC 2023 selfserv_9355 with PID 9759 started at Wed Oct 18 18:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2122: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 9759 at Wed Oct 18 18:20:33 UTC 2023 kill -USR1 9759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9759 killed at Wed Oct 18 18:20:33 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9355 starting at Wed Oct 18 18:20:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9801 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9801 found at Wed Oct 18 18:20:33 UTC 2023 selfserv_9355 with PID 9801 started at Wed Oct 18 18:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2123: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 9801 at Wed Oct 18 18:20:33 UTC 2023 kill -USR1 9801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9801 killed at Wed Oct 18 18:20:33 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9355 starting at Wed Oct 18 18:20:33 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:33 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9843 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9843 found at Wed Oct 18 18:20:34 UTC 2023 selfserv_9355 with PID 9843 started at Wed Oct 18 18:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2124: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 9843 at Wed Oct 18 18:20:34 UTC 2023 kill -USR1 9843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9843 killed at Wed Oct 18 18:20:34 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9355 starting at Wed Oct 18 18:20:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9885 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9885 found at Wed Oct 18 18:20:34 UTC 2023 selfserv_9355 with PID 9885 started at Wed Oct 18 18:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2125: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 9885 at Wed Oct 18 18:20:34 UTC 2023 kill -USR1 9885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9885 killed at Wed Oct 18 18:20:34 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9355 starting at Wed Oct 18 18:20:34 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9927 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9927 found at Wed Oct 18 18:20:34 UTC 2023 selfserv_9355 with PID 9927 started at Wed Oct 18 18:20:34 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #2126: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9355 with PID 9927 at Wed Oct 18 18:20:34 UTC 2023 kill -USR1 9927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9927 killed at Wed Oct 18 18:20:35 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9355 starting at Wed Oct 18 18:20:35 UTC 2023 selfserv_9355 -D -p 9355 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:20:35 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9969 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 9969 found at Wed Oct 18 18:20:35 UTC 2023 selfserv_9355 with PID 9969 started at Wed Oct 18 18:20:35 UTC 2023 strsclnt -q -p 9355 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 18:20:35 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 18:22:00 UTC 2023 ssl.sh: #2127: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9355 with PID 9969 at Wed Oct 18 18:22:00 UTC 2023 kill -USR1 9969 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 9969 killed at Wed Oct 18 18:22:00 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:22:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10031 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10031 found at Wed Oct 18 18:22:00 UTC 2023 selfserv_9355 with PID 10031 started at Wed Oct 18 18:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2128: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10031 at Wed Oct 18 18:22:00 UTC 2023 kill -USR1 10031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10031 killed at Wed Oct 18 18:22:00 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:00 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10073 found at Wed Oct 18 18:22:00 UTC 2023 selfserv_9355 with PID 10073 started at Wed Oct 18 18:22:00 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10073 at Wed Oct 18 18:22:01 UTC 2023 kill -USR1 10073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10073 killed at Wed Oct 18 18:22:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10112 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10112 found at Wed Oct 18 18:22:01 UTC 2023 selfserv_9355 with PID 10112 started at Wed Oct 18 18:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10112 at Wed Oct 18 18:22:01 UTC 2023 kill -USR1 10112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10112 killed at Wed Oct 18 18:22:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:01 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10151 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10151 found at Wed Oct 18 18:22:01 UTC 2023 selfserv_9355 with PID 10151 started at Wed Oct 18 18:22:01 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10151 at Wed Oct 18 18:22:01 UTC 2023 kill -USR1 10151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10151 killed at Wed Oct 18 18:22:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10190 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10190 found at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 with PID 10190 started at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2132: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 10190 at Wed Oct 18 18:22:02 UTC 2023 kill -USR1 10190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10190 killed at Wed Oct 18 18:22:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10229 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10229 found at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 with PID 10229 started at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10229 at Wed Oct 18 18:22:02 UTC 2023 kill -USR1 10229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10229 killed at Wed Oct 18 18:22:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10268 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10268 found at Wed Oct 18 18:22:02 UTC 2023 selfserv_9355 with PID 10268 started at Wed Oct 18 18:22:02 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10268 at Wed Oct 18 18:22:03 UTC 2023 kill -USR1 10268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10268 killed at Wed Oct 18 18:22:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10307 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10307 found at Wed Oct 18 18:22:03 UTC 2023 selfserv_9355 with PID 10307 started at Wed Oct 18 18:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10307 at Wed Oct 18 18:22:03 UTC 2023 kill -USR1 10307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10307 killed at Wed Oct 18 18:22:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10346 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10346 found at Wed Oct 18 18:22:03 UTC 2023 selfserv_9355 with PID 10346 started at Wed Oct 18 18:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2136: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10346 at Wed Oct 18 18:22:03 UTC 2023 kill -USR1 10346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10346 killed at Wed Oct 18 18:22:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:03 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:03 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10385 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10385 found at Wed Oct 18 18:22:04 UTC 2023 selfserv_9355 with PID 10385 started at Wed Oct 18 18:22:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10385 at Wed Oct 18 18:22:04 UTC 2023 kill -USR1 10385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10385 killed at Wed Oct 18 18:22:04 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10424 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10424 found at Wed Oct 18 18:22:04 UTC 2023 selfserv_9355 with PID 10424 started at Wed Oct 18 18:22:04 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2138: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10424 at Wed Oct 18 18:22:04 UTC 2023 kill -USR1 10424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10424 killed at Wed Oct 18 18:22:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:04 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:04 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10464 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10464 found at Wed Oct 18 18:22:04 UTC 2023 selfserv_9355 with PID 10464 started at Wed Oct 18 18:22:04 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2139: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10464 at Wed Oct 18 18:22:04 UTC 2023 kill -USR1 10464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10464 killed at Wed Oct 18 18:22:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10504 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10504 found at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 with PID 10504 started at Wed Oct 18 18:22:05 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2140: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10504 at Wed Oct 18 18:22:05 UTC 2023 kill -USR1 10504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10504 killed at Wed Oct 18 18:22:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10544 found at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 with PID 10544 started at Wed Oct 18 18:22:05 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2141: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 10544 at Wed Oct 18 18:22:05 UTC 2023 kill -USR1 10544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10544 killed at Wed Oct 18 18:22:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:05 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10584 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10584 found at Wed Oct 18 18:22:05 UTC 2023 selfserv_9355 with PID 10584 started at Wed Oct 18 18:22:06 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2142: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10584 at Wed Oct 18 18:22:06 UTC 2023 kill -USR1 10584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10584 killed at Wed Oct 18 18:22:06 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10624 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10624 found at Wed Oct 18 18:22:06 UTC 2023 selfserv_9355 with PID 10624 started at Wed Oct 18 18:22:06 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2143: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10624 at Wed Oct 18 18:22:06 UTC 2023 kill -USR1 10624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10624 killed at Wed Oct 18 18:22:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10664 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10664 found at Wed Oct 18 18:22:06 UTC 2023 selfserv_9355 with PID 10664 started at Wed Oct 18 18:22:06 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2144: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10664 at Wed Oct 18 18:22:06 UTC 2023 kill -USR1 10664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10664 killed at Wed Oct 18 18:22:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10704 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10704 found at Wed Oct 18 18:22:07 UTC 2023 selfserv_9355 with PID 10704 started at Wed Oct 18 18:22:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2145: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10704 at Wed Oct 18 18:22:07 UTC 2023 kill -USR1 10704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10704 killed at Wed Oct 18 18:22:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:22:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10744 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10744 found at Wed Oct 18 18:22:07 UTC 2023 selfserv_9355 with PID 10744 started at Wed Oct 18 18:22:07 UTC 2023 strsclnt -q -p 9355 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2146: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 10744 at Wed Oct 18 18:22:07 UTC 2023 kill -USR1 10744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10744 killed at Wed Oct 18 18:22:07 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9355 starting at Wed Oct 18 18:22:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 10784 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 10784 found at Wed Oct 18 18:22:07 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 10784 started at Wed Oct 18 18:22:07 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2147: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2148: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2149: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2150: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2151: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2152: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2153: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2154: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2155: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2156: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9355 with PID 10784 at Wed Oct 18 18:22:16 UTC 2023 kill -USR1 10784 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 10784 killed at Wed Oct 18 18:22:17 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9355 starting at Wed Oct 18 18:22:17 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.27434\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: exiting with return code 0 kill -0 11333 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 11333 found at Wed Oct 18 18:22:17 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv_9355 with PID 11333 started at Wed Oct 18 18:22:17 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2247: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2248: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2253: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2254: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2259: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2260: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2265: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2266: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2271: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2272: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9355 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9355 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2273: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 11333 at Wed Oct 18 18:22:29 UTC 2023 kill -USR1 11333 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 11333 killed at Wed Oct 18 18:22:29 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:22:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12167 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12167 found at Wed Oct 18 18:22:30 UTC 2023 selfserv_9355 with PID 12167 started at Wed Oct 18 18:22:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2274: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12167 at Wed Oct 18 18:22:30 UTC 2023 kill -USR1 12167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12167 killed at Wed Oct 18 18:22:30 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:22:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12219 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12219 found at Wed Oct 18 18:22:30 UTC 2023 selfserv_9355 with PID 12219 started at Wed Oct 18 18:22:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2275: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12219 at Wed Oct 18 18:22:55 UTC 2023 kill -USR1 12219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12219 killed at Wed Oct 18 18:22:55 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:22:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12271 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12271 found at Wed Oct 18 18:22:56 UTC 2023 selfserv_9355 with PID 12271 started at Wed Oct 18 18:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2276: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12271 at Wed Oct 18 18:22:56 UTC 2023 kill -USR1 12271 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12271 killed at Wed Oct 18 18:22:56 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:22:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12335 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12335 found at Wed Oct 18 18:22:56 UTC 2023 selfserv_9355 with PID 12335 started at Wed Oct 18 18:22:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2277: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12335 at Wed Oct 18 18:22:57 UTC 2023 kill -USR1 12335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12335 killed at Wed Oct 18 18:22:57 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:22:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:22:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12387 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12387 found at Wed Oct 18 18:22:57 UTC 2023 selfserv_9355 with PID 12387 started at Wed Oct 18 18:22:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2278: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12387 at Wed Oct 18 18:23:20 UTC 2023 kill -USR1 12387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12387 killed at Wed Oct 18 18:23:20 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:23:20 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12439 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12439 found at Wed Oct 18 18:23:20 UTC 2023 selfserv_9355 with PID 12439 started at Wed Oct 18 18:23:20 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12439 at Wed Oct 18 18:23:21 UTC 2023 kill -USR1 12439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12439 killed at Wed Oct 18 18:23:21 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:23:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12507 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12507 found at Wed Oct 18 18:23:21 UTC 2023 selfserv_9355 with PID 12507 started at Wed Oct 18 18:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2280: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12507 at Wed Oct 18 18:23:21 UTC 2023 kill -USR1 12507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12507 killed at Wed Oct 18 18:23:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:23:21 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12559 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12559 found at Wed Oct 18 18:23:21 UTC 2023 selfserv_9355 with PID 12559 started at Wed Oct 18 18:23:21 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2281: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12559 at Wed Oct 18 18:23:47 UTC 2023 kill -USR1 12559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12559 killed at Wed Oct 18 18:23:47 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:23:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12618 found at Wed Oct 18 18:23:47 UTC 2023 selfserv_9355 with PID 12618 started at Wed Oct 18 18:23:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2282: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12618 at Wed Oct 18 18:23:47 UTC 2023 kill -USR1 12618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12618 killed at Wed Oct 18 18:23:47 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:23:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12682 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12682 found at Wed Oct 18 18:23:47 UTC 2023 selfserv_9355 with PID 12682 started at Wed Oct 18 18:23:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2283: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12682 at Wed Oct 18 18:23:48 UTC 2023 kill -USR1 12682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12682 killed at Wed Oct 18 18:23:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:23:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:23:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12734 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12734 found at Wed Oct 18 18:23:48 UTC 2023 selfserv_9355 with PID 12734 started at Wed Oct 18 18:23:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2284: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12734 at Wed Oct 18 18:24:13 UTC 2023 kill -USR1 12734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12734 killed at Wed Oct 18 18:24:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:13 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:13 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12786 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12786 found at Wed Oct 18 18:24:14 UTC 2023 selfserv_9355 with PID 12786 started at Wed Oct 18 18:24:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2285: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12786 at Wed Oct 18 18:24:14 UTC 2023 kill -USR1 12786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12786 killed at Wed Oct 18 18:24:14 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:14 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12850 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12850 found at Wed Oct 18 18:24:14 UTC 2023 selfserv_9355 with PID 12850 started at Wed Oct 18 18:24:14 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2286: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12850 at Wed Oct 18 18:24:15 UTC 2023 kill -USR1 12850 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12850 killed at Wed Oct 18 18:24:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:24:15 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12902 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12902 found at Wed Oct 18 18:24:15 UTC 2023 selfserv_9355 with PID 12902 started at Wed Oct 18 18:24:15 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2287: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 12902 at Wed Oct 18 18:24:38 UTC 2023 kill -USR1 12902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12902 killed at Wed Oct 18 18:24:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:38 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12965 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 12965 found at Wed Oct 18 18:24:38 UTC 2023 selfserv_9355 with PID 12965 started at Wed Oct 18 18:24:38 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2288: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 12965 at Wed Oct 18 18:24:39 UTC 2023 kill -USR1 12965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 12965 killed at Wed Oct 18 18:24:39 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13021 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13021 found at Wed Oct 18 18:24:39 UTC 2023 selfserv_9355 with PID 13021 started at Wed Oct 18 18:24:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13021 at Wed Oct 18 18:24:39 UTC 2023 kill -USR1 13021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13021 killed at Wed Oct 18 18:24:39 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:39 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:39 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13077 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13077 found at Wed Oct 18 18:24:40 UTC 2023 selfserv_9355 with PID 13077 started at Wed Oct 18 18:24:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2290: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13077 at Wed Oct 18 18:24:40 UTC 2023 kill -USR1 13077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13077 killed at Wed Oct 18 18:24:40 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:24:40 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13133 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13133 found at Wed Oct 18 18:24:40 UTC 2023 selfserv_9355 with PID 13133 started at Wed Oct 18 18:24:40 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13133 at Wed Oct 18 18:24:40 UTC 2023 kill -USR1 13133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13133 killed at Wed Oct 18 18:24:41 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:24:41 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:24:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13193 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13193 found at Wed Oct 18 18:24:41 UTC 2023 selfserv_9355 with PID 13193 started at Wed Oct 18 18:24:41 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2292: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13193 at Wed Oct 18 18:25:06 UTC 2023 kill -USR1 13193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13193 killed at Wed Oct 18 18:25:06 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:25:06 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13245 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13245 found at Wed Oct 18 18:25:06 UTC 2023 selfserv_9355 with PID 13245 started at Wed Oct 18 18:25:06 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13245 at Wed Oct 18 18:25:06 UTC 2023 kill -USR1 13245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13245 killed at Wed Oct 18 18:25:07 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:25:07 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13305 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13305 found at Wed Oct 18 18:25:07 UTC 2023 selfserv_9355 with PID 13305 started at Wed Oct 18 18:25:07 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2294: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13305 at Wed Oct 18 18:25:30 UTC 2023 kill -USR1 13305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13305 killed at Wed Oct 18 18:25:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:25:30 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13368 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13368 found at Wed Oct 18 18:25:30 UTC 2023 selfserv_9355 with PID 13368 started at Wed Oct 18 18:25:30 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13368 at Wed Oct 18 18:25:31 UTC 2023 kill -USR1 13368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13368 killed at Wed Oct 18 18:25:31 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:25:31 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13428 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13428 found at Wed Oct 18 18:25:31 UTC 2023 selfserv_9355 with PID 13428 started at Wed Oct 18 18:25:31 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13428 at Wed Oct 18 18:25:56 UTC 2023 kill -USR1 13428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13428 killed at Wed Oct 18 18:25:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:25:56 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13480 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13480 found at Wed Oct 18 18:25:56 UTC 2023 selfserv_9355 with PID 13480 started at Wed Oct 18 18:25:56 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13480 at Wed Oct 18 18:25:57 UTC 2023 kill -USR1 13480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13480 killed at Wed Oct 18 18:25:57 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:25:57 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:25:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13544 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13544 found at Wed Oct 18 18:25:57 UTC 2023 selfserv_9355 with PID 13544 started at Wed Oct 18 18:25:57 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2298: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13544 at Wed Oct 18 18:26:22 UTC 2023 kill -USR1 13544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13544 killed at Wed Oct 18 18:26:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:26:22 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13602 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13602 found at Wed Oct 18 18:26:22 UTC 2023 selfserv_9355 with PID 13602 started at Wed Oct 18 18:26:22 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13602 at Wed Oct 18 18:26:23 UTC 2023 kill -USR1 13602 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13602 killed at Wed Oct 18 18:26:23 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9355 starting at Wed Oct 18 18:26:23 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13665 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13665 found at Wed Oct 18 18:26:23 UTC 2023 selfserv_9355 with PID 13665 started at Wed Oct 18 18:26:23 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2300: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 13665 at Wed Oct 18 18:26:46 UTC 2023 kill -USR1 13665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13665 killed at Wed Oct 18 18:26:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:26:46 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13719 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13719 found at Wed Oct 18 18:26:46 UTC 2023 selfserv_9355 with PID 13719 started at Wed Oct 18 18:26:46 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13719 at Wed Oct 18 18:26:47 UTC 2023 kill -USR1 13719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13719 killed at Wed Oct 18 18:26:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:26:47 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13771 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13771 found at Wed Oct 18 18:26:47 UTC 2023 selfserv_9355 with PID 13771 started at Wed Oct 18 18:26:47 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2302: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13771 at Wed Oct 18 18:26:47 UTC 2023 kill -USR1 13771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13771 killed at Wed Oct 18 18:26:48 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9355 starting at Wed Oct 18 18:26:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.27434\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13823 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13823 found at Wed Oct 18 18:26:48 UTC 2023 selfserv_9355 with PID 13823 started at Wed Oct 18 18:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2303: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13823 at Wed Oct 18 18:26:48 UTC 2023 kill -USR1 13823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13823 killed at Wed Oct 18 18:26:48 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9355 starting at Wed Oct 18 18:26:48 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13905 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13905 found at Wed Oct 18 18:26:48 UTC 2023 selfserv_9355 with PID 13905 started at Wed Oct 18 18:26:48 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2274: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13905 at Wed Oct 18 18:26:49 UTC 2023 kill -USR1 13905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13905 killed at Wed Oct 18 18:26:49 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13947 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13947 found at Wed Oct 18 18:26:49 UTC 2023 selfserv_9355 with PID 13947 started at Wed Oct 18 18:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2275: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 13947 at Wed Oct 18 18:26:49 UTC 2023 kill -USR1 13947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13947 killed at Wed Oct 18 18:26:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13986 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 13986 found at Wed Oct 18 18:26:49 UTC 2023 selfserv_9355 with PID 13986 started at Wed Oct 18 18:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2276: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 13986 at Wed Oct 18 18:26:49 UTC 2023 kill -USR1 13986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 13986 killed at Wed Oct 18 18:26:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:49 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:49 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14025 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14025 found at Wed Oct 18 18:26:50 UTC 2023 selfserv_9355 with PID 14025 started at Wed Oct 18 18:26:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14025 at Wed Oct 18 18:26:50 UTC 2023 kill -USR1 14025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14025 killed at Wed Oct 18 18:26:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14064 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14064 found at Wed Oct 18 18:26:50 UTC 2023 selfserv_9355 with PID 14064 started at Wed Oct 18 18:26:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2278: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9355 with PID 14064 at Wed Oct 18 18:26:50 UTC 2023 kill -USR1 14064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14064 killed at Wed Oct 18 18:26:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:50 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14103 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14103 found at Wed Oct 18 18:26:50 UTC 2023 selfserv_9355 with PID 14103 started at Wed Oct 18 18:26:50 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14103 at Wed Oct 18 18:26:50 UTC 2023 kill -USR1 14103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14103 killed at Wed Oct 18 18:26:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14142 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14142 found at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 with PID 14142 started at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14142 at Wed Oct 18 18:26:51 UTC 2023 kill -USR1 14142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14142 killed at Wed Oct 18 18:26:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14181 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14181 found at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 with PID 14181 started at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2281: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14181 at Wed Oct 18 18:26:51 UTC 2023 kill -USR1 14181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14181 killed at Wed Oct 18 18:26:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14220 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14220 found at Wed Oct 18 18:26:51 UTC 2023 selfserv_9355 with PID 14220 started at Wed Oct 18 18:26:51 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2282: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14220 at Wed Oct 18 18:26:52 UTC 2023 kill -USR1 14220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14220 killed at Wed Oct 18 18:26:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14259 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14259 found at Wed Oct 18 18:26:52 UTC 2023 selfserv_9355 with PID 14259 started at Wed Oct 18 18:26:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2283: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14259 at Wed Oct 18 18:26:52 UTC 2023 kill -USR1 14259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14259 killed at Wed Oct 18 18:26:52 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:52 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:52 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14298 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14298 found at Wed Oct 18 18:26:52 UTC 2023 selfserv_9355 with PID 14298 started at Wed Oct 18 18:26:52 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2284: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14298 at Wed Oct 18 18:26:52 UTC 2023 kill -USR1 14298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14298 killed at Wed Oct 18 18:26:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14338 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14338 found at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 with PID 14338 started at Wed Oct 18 18:26:53 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2285: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14338 at Wed Oct 18 18:26:53 UTC 2023 kill -USR1 14338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14338 killed at Wed Oct 18 18:26:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14378 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14378 found at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 with PID 14378 started at Wed Oct 18 18:26:53 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2286: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14378 at Wed Oct 18 18:26:53 UTC 2023 kill -USR1 14378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14378 killed at Wed Oct 18 18:26:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:53 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14418 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14418 found at Wed Oct 18 18:26:53 UTC 2023 selfserv_9355 with PID 14418 started at Wed Oct 18 18:26:53 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2287: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9355 with PID 14418 at Wed Oct 18 18:26:54 UTC 2023 kill -USR1 14418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14418 killed at Wed Oct 18 18:26:54 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14458 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14458 found at Wed Oct 18 18:26:54 UTC 2023 selfserv_9355 with PID 14458 started at Wed Oct 18 18:26:54 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2288: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14458 at Wed Oct 18 18:26:54 UTC 2023 kill -USR1 14458 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14458 killed at Wed Oct 18 18:26:54 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:54 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:54 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14498 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14498 found at Wed Oct 18 18:26:54 UTC 2023 selfserv_9355 with PID 14498 started at Wed Oct 18 18:26:54 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2289: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14498 at Wed Oct 18 18:26:54 UTC 2023 kill -USR1 14498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14498 killed at Wed Oct 18 18:26:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14538 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14538 found at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 with PID 14538 started at Wed Oct 18 18:26:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2290: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14538 at Wed Oct 18 18:26:55 UTC 2023 kill -USR1 14538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14538 killed at Wed Oct 18 18:26:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14578 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14578 found at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 with PID 14578 started at Wed Oct 18 18:26:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2291: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14578 at Wed Oct 18 18:26:55 UTC 2023 kill -USR1 14578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14578 killed at Wed Oct 18 18:26:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9355 starting at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 -D -p 9355 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.27434\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9355 at Wed Oct 18 18:26:55 UTC 2023 tstclnt -p 9355 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14618 >/dev/null 2>/dev/null No server to kill selfserv_9355 with PID 14618 found at Wed Oct 18 18:26:55 UTC 2023 selfserv_9355 with PID 14618 started at Wed Oct 18 18:26:55 UTC 2023 strsclnt -q -p 9355 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2292: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9355 with PID 14618 at Wed Oct 18 18:26:56 UTC 2023 kill -USR1 14618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9355 -b -p 9355 2>/dev/null; selfserv_9355 with PID 14618 killed at Wed Oct 18 18:26:56 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -fips false -force FIPS mode disabled. ssl.sh: #2293: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #2294: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2295: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2296: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2297: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2298: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 18:26:56 UTC 2023 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64= NSS_CYCLES="standard pkix upgradedb sharedb threadunsafe" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}" NSS_SSL_TESTS="crl iopr policy normal_normal fips_normal normal_fips" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 22238 Failed: 36 Failed with core: 0 ASan failures: 0 Unknown status: 0 error: Bad exit status from /var/tmp/rpm-tmp.WZVkiM (%check) Bad exit status from /var/tmp/rpm-tmp.WZVkiM (%check) RPM build errors: Child return code was: 1 EXCEPTION: [Error()] Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/mockbuild/trace_decorator.py", line 88, in trace result = func(*args, **kw) File "/usr/lib/python2.7/site-packages/mockbuild/util.py", line 547, in do raise exception.Error("Command failed. See logs for output.\n # %s" % (command,), child.returncode) Error: Command failed. See logs for output. # bash --login -c /usr/bin/rpmbuild -bb --target armv7hl --nodeps /builddir/build/SPECS/nss.spec